From null at suse.de Mon Nov 3 08:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 08:30:10 -0000 Subject: SUSE-SU-2025:3911-1: moderate: Security update for rav1e Message-ID: <176215861064.14862.14881881142318786258@smelt2.prg2.suse.org> # Security update for rav1e Announcement ID: SUSE-SU-2025:3911-1 Release Date: 2025-11-02T12:18:39Z Rating: moderate References: * bsc#1196972 Cross-References: * CVE-2022-24713 CVSS scores: * CVE-2022-24713 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2022-24713 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability can now be installed. ## Description: This update for rav1e fixes the following issues: * CVE-2022-24713: Updated crate regex to 1.5.5 that resolves a ReDoS issue (bsc#1196972) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3911=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rav1e-0.5.1+0-150400.3.6.1 * rav1e-debugsource-0.5.1+0-150400.3.6.1 * librav1e0-0.5.1+0-150400.3.6.1 * rav1e-devel-0.5.1+0-150400.3.6.1 * librav1e0-debuginfo-0.5.1+0-150400.3.6.1 * rav1e-debuginfo-0.5.1+0-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * librav1e0-32bit-debuginfo-0.5.1+0-150400.3.6.1 * librav1e0-32bit-0.5.1+0-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * librav1e0-64bit-0.5.1+0-150400.3.6.1 * librav1e0-64bit-debuginfo-0.5.1+0-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2022-24713.html * https://bugzilla.suse.com/show_bug.cgi?id=1196972 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 08:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 08:30:16 -0000 Subject: SUSE-SU-2025:3910-1: important: Security update for poppler Message-ID: <176215861617.14862.10920543837004773261@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:3910-1 Release Date: 2025-11-02T12:18:24Z Rating: important References: * bsc#1250908 * bsc#1251940 Cross-References: * CVE-2025-43718 * CVE-2025-52885 CVSS scores: * CVE-2025-43718 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-43718 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-43718 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43718 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-52885 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-52885 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-52885 ( NVD ): 6.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-43718: fixed uncontrolled recursion in the regex-based metadata parser when processing specially crafted PDF files (bsc#1250908) * CVE-2025-52885: improved pointer handling that could have led to dangling pointers when the vector is resized (bsc#1251940) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3910=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3910=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3910=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3910=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3910=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3910=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3910=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3910=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3910=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3910=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3910=1 ## Package List: * SUSE Manager Proxy 4.3 LTS (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * typelib-1_0-Poppler-0_18-0.79.0-150200.3.46.1 * libpoppler-glib8-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * libpoppler-devel-0.79.0-150200.3.46.1 * libpoppler-cpp0-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler-glib-devel-0.79.0-150200.3.46.1 * poppler-tools-0.79.0-150200.3.46.1 * libpoppler-cpp0-debuginfo-0.79.0-150200.3.46.1 * libpoppler-glib8-debuginfo-0.79.0-150200.3.46.1 * poppler-tools-debuginfo-0.79.0-150200.3.46.1 * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.46.1 * poppler-debugsource-0.79.0-150200.3.46.1 * libpoppler89-0.79.0-150200.3.46.1 ## References: * https://www.suse.com/security/cve/CVE-2025-43718.html * https://www.suse.com/security/cve/CVE-2025-52885.html * https://bugzilla.suse.com/show_bug.cgi?id=1250908 * https://bugzilla.suse.com/show_bug.cgi?id=1251940 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 08:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 08:30:21 -0000 Subject: SUSE-SU-2025:3909-1: important: Security update for xorg-x11-server Message-ID: <176215862106.14862.14817896184852145603@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:3909-1 Release Date: 2025-11-02T12:16:51Z Rating: important References: * bsc#1251958 * bsc#1251959 * bsc#1251960 Cross-References: * CVE-2025-62229 * CVE-2025-62230 * CVE-2025-62231 CVSS scores: * CVE-2025-62229 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62229 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62229 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-62230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62230 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62230 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-62231 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-62231 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-62231 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves three vulnerabilities can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * Fixed use-after-free in XPresentNotify structures creation (CVE-2025-62229, bsc#1251958) * Fixed use-after-free in Xkb client resource removal (CVE-2025-62230, bsc#1251959) * Fixed value overflow in Xkb extension XkbSetCompatMap() (CVE-2025-62231, bsc#1251960) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3909=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3909=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3909=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3909=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3909=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3909=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3909=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3909=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-source-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-sdk-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * xorg-x11-server-1.20.3-150400.38.63.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.63.1 * xorg-x11-server-extra-1.20.3-150400.38.63.1 * xorg-x11-server-debugsource-1.20.3-150400.38.63.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62229.html * https://www.suse.com/security/cve/CVE-2025-62230.html * https://www.suse.com/security/cve/CVE-2025-62231.html * https://bugzilla.suse.com/show_bug.cgi?id=1251958 * https://bugzilla.suse.com/show_bug.cgi?id=1251959 * https://bugzilla.suse.com/show_bug.cgi?id=1251960 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 08:30:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 08:30:29 -0000 Subject: SUSE-SU-2025:3905-1: important: Security update for webkit2gtk3 Message-ID: <176215862960.14862.15679504045282221199@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:3905-1 Release Date: 2025-11-01T06:27:20Z Rating: important References: * bsc#1250439 * bsc#1250440 * bsc#1250441 * bsc#1250442 * bsc#1251975 Cross-References: * CVE-2025-43272 * CVE-2025-43342 * CVE-2025-43343 * CVE-2025-43356 * CVE-2025-43368 CVSS scores: * CVE-2025-43272 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43272 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43342 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-43342 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-43343 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43343 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43343 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-43356 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43356 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43368 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43368 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2025-43343: Fixed an issue where processing maliciously crafted web content may lead to an unexpected process crash (bsc#1251975) * CVE-2025-43272: Fixed an issue where processing maliciously crafted web content may lead to an unexpected Safari crash (bsc#1250439) * CVE-2025-43342: Fixed an issue where processing maliciously crafted web content may lead to an unexpected process crash (bsc#1250440) * CVE-2025-43356: Fixed an issue where websites may be able to access sensor information without user consent (bsc#1250441) * CVE-2025-43368: Fixed an issue where processing maliciously crafted web content may lead to an unexpected Safari crash (bsc#1250442) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3905=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3905=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-WebKit2WebExtension-4_0-2.50.1-4.44.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.1-4.44.1 * typelib-1_0-JavaScriptCore-4_0-2.50.1-4.44.1 * webkit2gtk-4_0-injected-bundles-2.50.1-4.44.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.1-4.44.1 * typelib-1_0-WebKit2-4_0-2.50.1-4.44.1 * libjavascriptcoregtk-4_0-18-2.50.1-4.44.1 * webkit2gtk3-devel-2.50.1-4.44.1 * webkit2gtk3-debugsource-2.50.1-4.44.1 * libwebkit2gtk-4_0-37-2.50.1-4.44.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libwebkit2gtk3-lang-2.50.1-4.44.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.1-4.44.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.1-4.44.1 * typelib-1_0-WebKit2WebExtension-4_0-2.50.1-4.44.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.1-4.44.1 * typelib-1_0-JavaScriptCore-4_0-2.50.1-4.44.1 * webkit2gtk-4_0-injected-bundles-2.50.1-4.44.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.1-4.44.1 * typelib-1_0-WebKit2-4_0-2.50.1-4.44.1 * libjavascriptcoregtk-4_0-18-2.50.1-4.44.1 * webkit2gtk3-devel-2.50.1-4.44.1 * webkit2gtk3-debugsource-2.50.1-4.44.1 * libwebkit2gtk-4_0-37-2.50.1-4.44.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libwebkit2gtk3-lang-2.50.1-4.44.1 ## References: * https://www.suse.com/security/cve/CVE-2025-43272.html * https://www.suse.com/security/cve/CVE-2025-43342.html * https://www.suse.com/security/cve/CVE-2025-43343.html * https://www.suse.com/security/cve/CVE-2025-43356.html * https://www.suse.com/security/cve/CVE-2025-43368.html * https://bugzilla.suse.com/show_bug.cgi?id=1250439 * https://bugzilla.suse.com/show_bug.cgi?id=1250440 * https://bugzilla.suse.com/show_bug.cgi?id=1250441 * https://bugzilla.suse.com/show_bug.cgi?id=1250442 * https://bugzilla.suse.com/show_bug.cgi?id=1251975 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 08:30:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 08:30:31 -0000 Subject: SUSE-SU-2025:3904-1: important: Security update for strongswan Message-ID: <176215863179.14862.3153952191538172067@smelt2.prg2.suse.org> # Security update for strongswan Announcement ID: SUSE-SU-2025:3904-1 Release Date: 2025-11-01T06:27:10Z Rating: important References: * bsc#1251941 Cross-References: * CVE-2025-62291 CVSS scores: * CVE-2025-62291 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for strongswan fixes the following issues: * CVE-2025-62291: fixed buffer overflow when handling EAP-MSCHAPv2 failure requests (bsc#1251941) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3904=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3904=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * strongswan-ipsec-5.1.3-26.29.1 * strongswan-ipsec-debuginfo-5.1.3-26.29.1 * strongswan-hmac-5.1.3-26.29.1 * strongswan-5.1.3-26.29.1 * strongswan-debugsource-5.1.3-26.29.1 * strongswan-libs0-debuginfo-5.1.3-26.29.1 * strongswan-libs0-5.1.3-26.29.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * strongswan-doc-5.1.3-26.29.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * strongswan-ipsec-5.1.3-26.29.1 * strongswan-ipsec-debuginfo-5.1.3-26.29.1 * strongswan-hmac-5.1.3-26.29.1 * strongswan-5.1.3-26.29.1 * strongswan-debugsource-5.1.3-26.29.1 * strongswan-libs0-debuginfo-5.1.3-26.29.1 * strongswan-libs0-5.1.3-26.29.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * strongswan-doc-5.1.3-26.29.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251941 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 12:30:06 -0000 Subject: SUSE-SU-2025:3919-1: important: Security update for nodejs18 Message-ID: <176217300644.19606.9590459447628456977@smelt2.prg2.suse.org> # Security update for nodejs18 Announcement ID: SUSE-SU-2025:3919-1 Release Date: 2025-11-03T10:32:00Z Rating: important References: * bsc#1246818 Cross-References: * CVE-2025-7783 CVSS scores: * CVE-2025-7783 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:L/SI:L/SA:N * CVE-2025-7783 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-7783 ( NVD ): 9.4 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for nodejs18 fixes the following issues: * CVE-2025-7783: Switched away from Math.random() in boundary values for multipart form-encoded data (bsc#1246818) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3919=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * nodejs18-debuginfo-18.20.8-8.41.1 * nodejs18-18.20.8-8.41.1 * nodejs18-devel-18.20.8-8.41.1 * npm18-18.20.8-8.41.1 * nodejs18-debugsource-18.20.8-8.41.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * nodejs18-docs-18.20.8-8.41.1 ## References: * https://www.suse.com/security/cve/CVE-2025-7783.html * https://bugzilla.suse.com/show_bug.cgi?id=1246818 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 12:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 12:30:10 -0000 Subject: SUSE-SU-2025:3918-1: moderate: Security update for ImageMagick Message-ID: <176217301058.19606.16174964798158507735@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:3918-1 Release Date: 2025-11-03T10:31:34Z Rating: moderate References: * bsc#1252282 Cross-References: * CVE-2025-62171 CVSS scores: * CVE-2025-62171 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-62171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-62171 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62171 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-62171: Fixed incomplete fix for integer overflow in BMP Decoder (bsc#1252282). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3918=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * ImageMagick-debugsource-6.8.8.1-71.215.1 * libMagick++-devel-6.8.8.1-71.215.1 * ImageMagick-devel-6.8.8.1-71.215.1 * ImageMagick-config-6-upstream-6.8.8.1-71.215.1 * libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.215.1 * libMagickWand-6_Q16-1-6.8.8.1-71.215.1 * libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.215.1 * ImageMagick-debuginfo-6.8.8.1-71.215.1 * libMagickCore-6_Q16-1-6.8.8.1-71.215.1 * ImageMagick-config-6-SUSE-6.8.8.1-71.215.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62171.html * https://bugzilla.suse.com/show_bug.cgi?id=1252282 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 12:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 12:30:13 -0000 Subject: SUSE-SU-2025:3917-1: important: Security update for openssl-3-livepatches Message-ID: <176217301326.19606.903845405787616170@smelt2.prg2.suse.org> # Security update for openssl-3-livepatches Announcement ID: SUSE-SU-2025:3917-1 Release Date: 2025-11-03T09:58:09Z Rating: important References: * bsc#1250410 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3-livepatches fixes the following issues: * livepatch for CVE-2025-9230: Out-of-bounds read & write in RFC 3211 KEK Unwrap (bsc#1250410). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3917=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le x86_64) * openssl-3-livepatches-debugsource-0.2-150700.16.3.2 * openssl-3-livepatches-debuginfo-0.2-150700.16.3.2 * openssl-3-livepatches-0.2-150700.16.3.2 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 3 20:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 03 Nov 2025 20:30:07 -0000 Subject: SUSE-SU-2025:3926-1: important: Security update for the Linux Kernel (Live Patch 72 for SLE 12 SP5) Message-ID: <176220180765.15633.9518881532323340698@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 72 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:3926-1 Release Date: 2025-11-03T18:03:58Z Rating: important References: * bsc#1249847 Cross-References: * CVE-2022-50252 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_272 fixes one issue. The following security issue was fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3926=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_272-default-3-4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://bugzilla.suse.com/show_bug.cgi?id=1249847 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 08:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 04 Nov 2025 08:30:07 -0000 Subject: SUSE-SU-2025:3927-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) Message-ID: <176224500774.15345.12795631015570801553@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:3927-1 Release Date: 2025-11-04T07:04:21Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_38 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3927=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3927=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_38-default-10-150600.4.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-10-150600.4.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-10-150600.4.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_38-default-10-150600.4.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-10-150600.4.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-10-150600.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 12:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 04 Nov 2025 12:30:08 -0000 Subject: SUSE-SU-2025:3935-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) Message-ID: <176225940823.15633.3677498587150741394@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:3935-1 Release Date: 2025-11-04T11:34:01Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_33 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3935=1 SUSE-2025-3933=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3935=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3933=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-15-150600.4.1 * kernel-livepatch-6_4_0-150600_23_33-default-15-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-15-150600.4.1 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-15-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-15-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-15-150600.4.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-15-150600.4.1 * kernel-livepatch-6_4_0-150600_23_33-default-15-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-15-150600.4.1 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-15-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-15-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-15-150600.4.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 12:30:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 04 Nov 2025 12:30:29 -0000 Subject: SUSE-SU-2025:2588-1: important: Security update for the Linux Kernel Message-ID: <176225942931.15633.16048110902662452819@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:2588-1 Release Date: 2025-11-04T09:39:30Z Rating: important References: * bsc#1206051 * bsc#1221829 * bsc#1233551 * bsc#1234480 * bsc#1234863 * bsc#1236104 * bsc#1236333 * bsc#1238160 * bsc#1239644 * bsc#1242417 * bsc#1244523 * bsc#1245217 * bsc#1245431 * bsc#1246000 * bsc#1246029 * bsc#1246037 * bsc#1246045 * bsc#1246073 * bsc#1246186 * bsc#1246287 * bsc#1246555 Cross-References: * CVE-2022-49138 * CVE-2022-49770 * CVE-2023-52923 * CVE-2023-52927 * CVE-2024-26643 * CVE-2024-53057 * CVE-2024-53164 * CVE-2024-57947 * CVE-2025-37797 * CVE-2025-38079 * CVE-2025-38181 * CVE-2025-38200 * CVE-2025-38206 * CVE-2025-38212 * CVE-2025-38213 * CVE-2025-38257 * CVE-2025-38289 CVSS scores: * CVE-2022-49138 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49138 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49138 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52927 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26643 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57947 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37797 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38079 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38079 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38181 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38200 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38206 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38206 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38212 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38212 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38213 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38289 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 17 vulnerabilities and has four security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2588=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.116.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.116.1 * kernel-default-livepatch-5.14.21-150500.55.116.1 * kernel-default-livepatch-devel-5.14.21-150500.55.116.1 * kernel-livepatch-5_14_21-150500_55_116-default-1-150500.11.3.1 * kernel-default-debugsource-5.14.21-150500.55.116.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-1-150500.11.3.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-1-150500.11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49138.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26643.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-38079.html * https://www.suse.com/security/cve/CVE-2025-38181.html * https://www.suse.com/security/cve/CVE-2025-38200.html * https://www.suse.com/security/cve/CVE-2025-38206.html * https://www.suse.com/security/cve/CVE-2025-38212.html * https://www.suse.com/security/cve/CVE-2025-38213.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://www.suse.com/security/cve/CVE-2025-38289.html * https://bugzilla.suse.com/show_bug.cgi?id=1206051 * https://bugzilla.suse.com/show_bug.cgi?id=1221829 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1238160 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1244523 * https://bugzilla.suse.com/show_bug.cgi?id=1245217 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1246000 * https://bugzilla.suse.com/show_bug.cgi?id=1246029 * https://bugzilla.suse.com/show_bug.cgi?id=1246037 * https://bugzilla.suse.com/show_bug.cgi?id=1246045 * https://bugzilla.suse.com/show_bug.cgi?id=1246073 * https://bugzilla.suse.com/show_bug.cgi?id=1246186 * https://bugzilla.suse.com/show_bug.cgi?id=1246287 * https://bugzilla.suse.com/show_bug.cgi?id=1246555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 12:30:33 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 04 Nov 2025 12:30:33 -0000 Subject: SUSE-SU-2025:3932-1: important: Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) Message-ID: <176225943356.15633.7160887634224123513@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:3932-1 Release Date: 2025-11-04T09:04:27Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_53 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3928=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3932=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3932=1 SUSE-2025-3928=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_10-debugsource-9-150600.4.1 * kernel-livepatch-6_4_0-150600_23_47-default-9-150600.4.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-8-150600.4.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-9-150600.4.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-8-150600.4.1 * kernel-livepatch-6_4_0-150600_23_53-default-8-150600.4.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_10-debugsource-9-150600.4.1 * kernel-livepatch-6_4_0-150600_23_47-default-9-150600.4.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-8-150600.4.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-9-150600.4.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-8-150600.4.1 * kernel-livepatch-6_4_0-150600_23_53-default-8-150600.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 04 Nov 2025 16:30:06 -0000 Subject: SUSE-SU-2025:3936-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) Message-ID: <176227380602.15345.12848908744925107261@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:3936-1 Release Date: 2025-11-04T12:04:18Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_42 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3936=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3936=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-10-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-10-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-10-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-10-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 4 16:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 04 Nov 2025 16:30:11 -0000 Subject: SUSE-SU-2025:3937-1: moderate: Security update for govulncheck-vulndb Message-ID: <176227381163.15345.11493003600779343478@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:3937-1 Release Date: 2025-11-04T12:47:51Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20251029T215107 2025-10-29T21:51:07Z. (jsc#PED-11136): * GO-2025-4006 * GO-2025-4007 * GO-2025-4008 * GO-2025-4009 * GO-2025-4010 * GO-2025-4011 * GO-2025-4012 * GO-2025-4013 * GO-2025-4014 * GO-2025-4015 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3937=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3937=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20251029T215107-150000.1.113.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20251029T215107-150000.1.113.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 08:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 08:30:06 -0000 Subject: SUSE-SU-2025:3941-1: important: Security update for tiff Message-ID: <176233140699.3980.13685014940553173737@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:3941-1 Release Date: 2025-11-05T07:16:02Z Rating: important References: * bsc#1250413 Cross-References: * CVE-2025-9900 CVSS scores: * CVE-2025-9900 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9900 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9900 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2025-9900: Fixed Write-What-Where in libtiff via TIFFReadRGBAImageOriented (bsc#1250413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3941=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3941=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3941=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3941=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3941=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3941=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3941=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3941=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3941=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3941=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3941=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3941=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3941=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3941=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3941=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3941=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3941=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3941=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3941=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3941=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3941=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * Basesystem Module 15-SP6 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * Basesystem Module 15-SP7 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libtiff5-32bit-4.0.9-150000.45.60.1 * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libtiff5-32bit-4.0.9-150000.45.60.1 * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Manager Server 4.3 LTS (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libtiff-devel-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * tiff-debugsource-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * SUSE Enterprise Storage 7.1 (x86_64) * libtiff5-32bit-debuginfo-4.0.9-150000.45.60.1 * libtiff5-32bit-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * tiff-debugsource-4.0.9-150000.45.60.1 * libtiff5-4.0.9-150000.45.60.1 * tiff-debuginfo-4.0.9-150000.45.60.1 * libtiff5-debuginfo-4.0.9-150000.45.60.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9900.html * https://bugzilla.suse.com/show_bug.cgi?id=1250413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:12 -0000 Subject: SUSE-SU-2025:3951-1: important: Security update for runc Message-ID: <176234581265.10768.12318388767310516516@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:3951-1 Release Date: 2025-11-05T10:23:34Z Rating: important References: * bsc#1252232 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for runc fixes the following issues: * CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252232). * CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252232). * CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252232). Update to runc v1.2.7. * Upstream changelog is available from ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3951=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3951=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * runc-1.2.7-16.67.1 * runc-debuginfo-1.2.7-16.67.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * runc-1.2.7-16.67.1 * runc-debuginfo-1.2.7-16.67.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:15 -0000 Subject: SUSE-SU-2025:3950-1: important: Security update for runc Message-ID: <176234581545.10768.9945362881063727089@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:3950-1 Release Date: 2025-11-05T10:23:26Z Rating: important References: * bsc#1252232 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for runc fixes the following issues: * CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252232). * CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252232). * CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252232). Update to runc v1.2.7. * Upstream changelog is available from ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3950=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3950=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3950=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3950=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3950=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3950=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3950=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3950=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3950=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3950=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3950=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3950=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3950=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-3950=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3950=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3950=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3950=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3950=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3950=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3950=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3950=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3950=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.2.7-150000.80.1 * runc-1.2.7-150000.80.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:18 -0000 Subject: SUSE-SU-2025:3949-1: moderate: Security update for colord Message-ID: <176234581840.10768.1506702998977674019@smelt2.prg2.suse.org> # Security update for colord Announcement ID: SUSE-SU-2025:3949-1 Release Date: 2025-11-05T10:05:06Z Rating: moderate References: * bsc#1250750 Cross-References: * CVE-2021-42523 CVSS scores: * CVE-2021-42523 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2021-42523 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for colord fixes the following issues: * CVE-2021-42523: The original fix was wrong and did not properly free the error, resulting in a crash that has now been addressed (bsc#1250750). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3949=1 openSUSE-SLE-15.6-2025-3949=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3949=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3949=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3949=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3949=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3949=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3949=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-3949=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-3949=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * colord-debuginfo-1.4.6-150600.3.8.1 * libcolord2-1.4.6-150600.3.8.1 * libcolorhug2-1.4.6-150600.3.8.1 * colord-1.4.6-150600.3.8.1 * typelib-1_0-Colord-1_0-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * libcolord-devel-1.4.6-150600.3.8.1 * libcolord2-debuginfo-1.4.6-150600.3.8.1 * colord-color-profiles-1.4.6-150600.3.8.1 * typelib-1_0-Colorhug-1_0-1.4.6-150600.3.8.1 * libcolorhug2-debuginfo-1.4.6-150600.3.8.1 * openSUSE Leap 15.6 (noarch) * colord-lang-1.4.6-150600.3.8.1 * openSUSE Leap 15.6 (x86_64) * libcolord2-32bit-1.4.6-150600.3.8.1 * libcolord2-32bit-debuginfo-1.4.6-150600.3.8.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libcolord2-64bit-debuginfo-1.4.6-150600.3.8.1 * libcolord2-64bit-1.4.6-150600.3.8.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * colord-debuginfo-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * libcolord2-1.4.6-150600.3.8.1 * libcolord2-debuginfo-1.4.6-150600.3.8.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * colord-debuginfo-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * libcolord2-1.4.6-150600.3.8.1 * libcolord2-debuginfo-1.4.6-150600.3.8.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * colord-debuginfo-1.4.6-150600.3.8.1 * libcolorhug2-1.4.6-150600.3.8.1 * typelib-1_0-Colord-1_0-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * libcolord-devel-1.4.6-150600.3.8.1 * colord-color-profiles-1.4.6-150600.3.8.1 * typelib-1_0-Colorhug-1_0-1.4.6-150600.3.8.1 * libcolorhug2-debuginfo-1.4.6-150600.3.8.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * colord-debuginfo-1.4.6-150600.3.8.1 * libcolorhug2-1.4.6-150600.3.8.1 * typelib-1_0-Colord-1_0-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * libcolord-devel-1.4.6-150600.3.8.1 * colord-color-profiles-1.4.6-150600.3.8.1 * typelib-1_0-Colorhug-1_0-1.4.6-150600.3.8.1 * libcolorhug2-debuginfo-1.4.6-150600.3.8.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * colord-debuginfo-1.4.6-150600.3.8.1 * libcolord2-1.4.6-150600.3.8.1 * libcolorhug2-1.4.6-150600.3.8.1 * colord-1.4.6-150600.3.8.1 * typelib-1_0-Colord-1_0-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * libcolord-devel-1.4.6-150600.3.8.1 * libcolord2-debuginfo-1.4.6-150600.3.8.1 * colord-color-profiles-1.4.6-150600.3.8.1 * typelib-1_0-Colorhug-1_0-1.4.6-150600.3.8.1 * libcolorhug2-debuginfo-1.4.6-150600.3.8.1 * SUSE Package Hub 15 15-SP6 (noarch) * colord-lang-1.4.6-150600.3.8.1 * SUSE Package Hub 15 15-SP6 (aarch64_ilp32) * libcolord2-64bit-debuginfo-1.4.6-150600.3.8.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * colord-debuginfo-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * colord-1.4.6-150600.3.8.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * colord-debuginfo-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * colord-1.4.6-150600.3.8.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch) * colord-lang-1.4.6-150600.3.8.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * colord-debuginfo-1.4.6-150600.3.8.1 * colord-debugsource-1.4.6-150600.3.8.1 * colord-1.4.6-150600.3.8.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * colord-lang-1.4.6-150600.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2021-42523.html * https://bugzilla.suse.com/show_bug.cgi?id=1250750 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:21 -0000 Subject: SUSE-SU-2025:2990-1: moderate: Security update for ffmpeg Message-ID: <176234582135.10768.11359708753719178423@smelt2.prg2.suse.org> # Security update for ffmpeg Announcement ID: SUSE-SU-2025:2990-1 Release Date: 2025-11-05T09:07:15Z Rating: moderate References: * bsc#1246790 Cross-References: * CVE-2025-7700 CVSS scores: * CVE-2025-7700 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-7700 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ffmpeg fixes the following issues: * CVE-2025-7700: Fixed NULL Pointer Dereference in FFmpeg ALS Decoder (libavcodec/alsdec.c) (bsc#1246790). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2990=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2990=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2990=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2990=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2990=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2990=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2990=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2990=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2990=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2990=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2990=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2990=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libavresample-devel-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libavresample-devel-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libavresample-devel-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libavresample-devel-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavresample3-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * libavresample3-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libswresample2-debuginfo-3.4.2-150200.11.67.1 * libavutil-devel-3.4.2-150200.11.67.1 * libavformat57-debuginfo-3.4.2-150200.11.67.1 * libswresample2-3.4.2-150200.11.67.1 * libavformat57-3.4.2-150200.11.67.1 * libavcodec57-debuginfo-3.4.2-150200.11.67.1 * libswresample-devel-3.4.2-150200.11.67.1 * ffmpeg-debugsource-3.4.2-150200.11.67.1 * libavcodec57-3.4.2-150200.11.67.1 * libpostproc-devel-3.4.2-150200.11.67.1 * libpostproc54-3.4.2-150200.11.67.1 * libswscale-devel-3.4.2-150200.11.67.1 * libavutil55-debuginfo-3.4.2-150200.11.67.1 * libpostproc54-debuginfo-3.4.2-150200.11.67.1 * libswscale4-3.4.2-150200.11.67.1 * libswscale4-debuginfo-3.4.2-150200.11.67.1 * libavutil55-3.4.2-150200.11.67.1 * ffmpeg-debuginfo-3.4.2-150200.11.67.1 ## References: * https://www.suse.com/security/cve/CVE-2025-7700.html * https://bugzilla.suse.com/show_bug.cgi?id=1246790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:28 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:28 -0000 Subject: SUSE-SU-2025:3947-1: moderate: Security update for jasper Message-ID: <176234582883.10768.3210346729523184474@smelt2.prg2.suse.org> # Security update for jasper Announcement ID: SUSE-SU-2025:3947-1 Release Date: 2025-11-05T08:18:00Z Rating: moderate References: * bsc#1218802 * bsc#1247901 * bsc#1247902 * bsc#1247904 Cross-References: * CVE-2023-51257 * CVE-2025-8835 * CVE-2025-8836 * CVE-2025-8837 CVSS scores: * CVE-2023-51257 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2023-51257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-51257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-8835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-8835 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8835 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8836 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8836 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8836 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8836 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8837 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-8837 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-8837 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8837 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-8837 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for jasper fixes the following issues: * Update to 4.2.8: * CVE-2025-8837: Fixed a bug in the JPC decoder that could cause bad memory accesses if the debug level is set sufficiently high (bsc#1247901). * CVE-2025-8836: Added some missing range checking on several coding parameters in the JPC encoder (bsc#1247902). * CVE-2025-8835: Added a check for a missing color component in the jas_image_chclrspc function (bsc#1247904). * CVE-2023-51257: Fixed invalid memory write bug (bsc#1218802). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3947=1 openSUSE-SLE-15.6-2025-3947=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3947=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3947=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * jasper-4.2.8-150600.4.5.1 * jasper-debugsource-4.2.8-150600.4.5.1 * libjasper7-debuginfo-4.2.8-150600.4.5.1 * libjasper-devel-4.2.8-150600.4.5.1 * libjasper7-4.2.8-150600.4.5.1 * jasper-debuginfo-4.2.8-150600.4.5.1 * openSUSE Leap 15.6 (x86_64) * libjasper7-32bit-4.2.8-150600.4.5.1 * libjasper7-32bit-debuginfo-4.2.8-150600.4.5.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libjasper7-64bit-debuginfo-4.2.8-150600.4.5.1 * libjasper7-64bit-4.2.8-150600.4.5.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * jasper-debugsource-4.2.8-150600.4.5.1 * libjasper7-debuginfo-4.2.8-150600.4.5.1 * libjasper-devel-4.2.8-150600.4.5.1 * libjasper7-4.2.8-150600.4.5.1 * jasper-debuginfo-4.2.8-150600.4.5.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * jasper-debugsource-4.2.8-150600.4.5.1 * libjasper7-debuginfo-4.2.8-150600.4.5.1 * libjasper-devel-4.2.8-150600.4.5.1 * libjasper7-4.2.8-150600.4.5.1 * jasper-debuginfo-4.2.8-150600.4.5.1 ## References: * https://www.suse.com/security/cve/CVE-2023-51257.html * https://www.suse.com/security/cve/CVE-2025-8835.html * https://www.suse.com/security/cve/CVE-2025-8836.html * https://www.suse.com/security/cve/CVE-2025-8837.html * https://bugzilla.suse.com/show_bug.cgi?id=1218802 * https://bugzilla.suse.com/show_bug.cgi?id=1247901 * https://bugzilla.suse.com/show_bug.cgi?id=1247902 * https://bugzilla.suse.com/show_bug.cgi?id=1247904 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:33 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:33 -0000 Subject: SUSE-SU-2025:3946-1: moderate: Security update for openjpeg Message-ID: <176234583331.10768.1158896414110310806@smelt2.prg2.suse.org> # Security update for openjpeg Announcement ID: SUSE-SU-2025:3946-1 Release Date: 2025-11-05T08:17:30Z Rating: moderate References: * bsc#1227410 * bsc#1250467 Cross-References: * CVE-2023-39327 CVSS scores: * CVE-2023-39327 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2023-39327 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for openjpeg fixes the following issues: * CVE-2023-39327: Fixed that malicious files can cause a large loop that continuously prints warning messages on the terminal (bsc#1227410). Other bug fixes: * Ensure no bundled libraries are used (bsc#1250467). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3946=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3946=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3946=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openjpeg-debugsource-1.5.2-150000.4.15.1 * openjpeg-debuginfo-1.5.2-150000.4.15.1 * libopenjpeg1-1.5.2-150000.4.15.1 * openjpeg-devel-1.5.2-150000.4.15.1 * libopenjpeg1-debuginfo-1.5.2-150000.4.15.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * openjpeg-debugsource-1.5.2-150000.4.15.1 * openjpeg-debuginfo-1.5.2-150000.4.15.1 * libopenjpeg1-1.5.2-150000.4.15.1 * openjpeg-1.5.2-150000.4.15.1 * openjpeg-devel-1.5.2-150000.4.15.1 * libopenjpeg1-debuginfo-1.5.2-150000.4.15.1 * openSUSE Leap 15.6 (x86_64) * openjpeg-devel-32bit-1.5.2-150000.4.15.1 * libopenjpeg1-32bit-1.5.2-150000.4.15.1 * libopenjpeg1-32bit-debuginfo-1.5.2-150000.4.15.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openjpeg-debugsource-1.5.2-150000.4.15.1 * openjpeg-debuginfo-1.5.2-150000.4.15.1 * libopenjpeg1-1.5.2-150000.4.15.1 * openjpeg-devel-1.5.2-150000.4.15.1 * libopenjpeg1-debuginfo-1.5.2-150000.4.15.1 ## References: * https://www.suse.com/security/cve/CVE-2023-39327.html * https://bugzilla.suse.com/show_bug.cgi?id=1227410 * https://bugzilla.suse.com/show_bug.cgi?id=1250467 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:35 -0000 Subject: SUSE-SU-2025:3945-1: low: Security update for poppler Message-ID: <176234583596.10768.560784926895487678@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:3945-1 Release Date: 2025-11-05T08:16:53Z Rating: low References: * bsc#1240687 Cross-References: * CVE-2025-3154 CVSS scores: * CVE-2025-3154 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3154 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-3154 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-3154: Fixed out-of-bounds array write due to invalid VerticesPerRow (bsc#1240687). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3945=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpoppler-glib8-debuginfo-0.43.0-16.67.1 * libpoppler-qt4-4-debuginfo-0.43.0-16.67.1 * libpoppler-glib8-0.43.0-16.67.1 * libpoppler-glib-devel-0.43.0-16.67.1 * libpoppler60-0.43.0-16.67.1 * poppler-tools-debuginfo-0.43.0-16.67.1 * libpoppler-qt4-devel-0.43.0-16.67.1 * poppler-tools-0.43.0-16.67.1 * libpoppler-qt4-4-0.43.0-16.67.1 * poppler-debugsource-0.43.0-16.67.1 * libpoppler60-debuginfo-0.43.0-16.67.1 * libpoppler-devel-0.43.0-16.67.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3154.html * https://bugzilla.suse.com/show_bug.cgi?id=1240687 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:40 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:40 -0000 Subject: SUSE-SU-2025:3944-1: moderate: Security update for sccache Message-ID: <176234584020.10768.2104939652857455417@smelt2.prg2.suse.org> # Security update for sccache Announcement ID: SUSE-SU-2025:3944-1 Release Date: 2025-11-05T08:16:38Z Rating: moderate References: * bsc#1248003 Cross-References: * CVE-2025-55159 CVSS scores: * CVE-2025-55159 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-55159 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-55159 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for sccache fixes the following issues: * CVE-2025-55159 - updated slab with the uninit memory access fix (bsc#1248003) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3944=1 openSUSE-SLE-15.6-2025-3944=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3944=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3944=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * sccache-debuginfo-0.4.2~4-150600.10.6.1 * sccache-0.4.2~4-150600.10.6.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * sccache-debuginfo-0.4.2~4-150600.10.6.1 * sccache-0.4.2~4-150600.10.6.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * sccache-debuginfo-0.4.2~4-150600.10.6.1 * sccache-0.4.2~4-150600.10.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55159.html * https://bugzilla.suse.com/show_bug.cgi?id=1248003 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:30:53 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:30:53 -0000 Subject: SUSE-SU-2025:3943-1: moderate: Security update for qatengine, qatlib Message-ID: <176234585303.10768.1294425563613509308@smelt2.prg2.suse.org> # Security update for qatengine, qatlib Announcement ID: SUSE-SU-2025:3943-1 Release Date: 2025-11-05T08:16:21Z Rating: moderate References: * bsc#1233363 * bsc#1233365 * bsc#1233366 Cross-References: * CVE-2024-28885 * CVE-2024-31074 * CVE-2024-33617 CVSS scores: * CVE-2024-28885 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28885 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for qatengine, qatlib fixes the following issues: Note that the 1.6.1 release included in 1.7.0 fixes the following vulnerabilities: * bsc#1233363 (CVE-2024-28885) * bsc#1233365 (CVE-2024-31074) * bsc#1233366 (CVE-2024-33617) Update to 1.7.0: * ipp-crypto name change to cryptography-primitives * QAT_SW GCM memory leak fix in cleanup function * Update limitation section in README for v1.7.0 release * Fix build with OPENSSL_NO_ENGINE * Fix for build issues with qatprovider in qatlib * Bug fixes and README updates to v1.7.0 * Remove qat_contig_mem driver support * Add support for building QAT Engine ENGINE and PROVIDER modules with QuicTLS 3.x libraries * Fix for DSA issue with openssl3.2 * Fix missing lower bounds check on index i * Enabled SW Fallback support for FBSD * Fix for segfault issue when SHIM config section is unavailable * Fix for Coverity & Resource leak * Fix for RSA failure with SVM enabled in openssl-3.2 * SM3 Memory Leak Issue Fix * Fix qatprovider lib name issue with system openssl Update to 1.6.0: * Fix issue with make depend for QAT_SW * QAT_HW GCM Memleak fix & bug fixes * QAT2.0 FreeBSD14 intree driver support * Fix OpenSSL 3.2 compatibility issues * Optimize hex dump logging * Clear job tlv on error * QAT_HW RSA Encrypt and Decrypt provider support * QAT_HW AES-CCM Provider support * Add ECDH keymgmt support for provider * Fix QAT_HW SM2 memory leak * Enable qaeMemFreeNonZeroNUMA() for qatlib * Fix polling issue for the process that doesn't have QAT_HW instance * Fix SHA3 qctx initialization issue & potential memleak * Fix compilation error in SM2 with qat_contig_mem * Update year in copyright information to 2024 Update to 1.5.0: * use new --enable-qat_insecure_algorithms to avoid regressions * improve support for SM{2,3,4} ciphers * improve SW fallback support * many bug fixes, refactorisations and documentation updates qatlib was updated to 24.09.0: * Improved performance scaling in multi-thread applications * Set core affinity mapping based on NUMA (libnuma now required for building) * bug fixes, see https://github.com/intel/qatlib#resolved-issues version update to 24.02.0: * Support DC NS (NoSession) APIs * Support Symmetric Crypto SM3 & SM4 * Support Asymmetric Crypto SM2 * Support DC CompressBound APIs * Bug Fixes. See Resolved section in README.md update to 23.11.0: * use new --enable-legacy-algorithms to avoid regressions * add support for data compression chaining (hash then compress) * add support for additional configuration profiles * add support DC NS (NoSession) APIs * add support DC CompressBound APIs * add Support for Chinese SM{2,3,4} ciphers * bump shared library major to 4 * refactoring, bug fixes and documentation updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3943=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3943=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3943=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3943=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3943=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * libqatzip3-debuginfo-1.1.0-150500.3.2.1 * qatzip-devel-1.1.0-150500.3.2.1 * qatengine-debugsource-1.7.0-150500.3.3.1 * libqatzip3-1.1.0-150500.3.2.1 * libqat4-24.09.0-150500.3.3.1 * qatlib-debuginfo-24.09.0-150500.3.3.1 * qatzip-debuginfo-1.1.0-150500.3.2.1 * qatengine-1.7.0-150500.3.3.1 * qatlib-debugsource-24.09.0-150500.3.3.1 * qatlib-24.09.0-150500.3.3.1 * libusdm0-24.09.0-150500.3.3.1 * qatzip-1.1.0-150500.3.2.1 * libqat4-debuginfo-24.09.0-150500.3.3.1 * qatzip-debugsource-1.1.0-150500.3.2.1 * libusdm0-debuginfo-24.09.0-150500.3.3.1 * qatengine-debuginfo-1.7.0-150500.3.3.1 * qatlib-devel-24.09.0-150500.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libusdm0-debuginfo-24.09.0-150500.3.3.1 * qatzip-devel-1.1.0-150500.3.2.1 * qatengine-debugsource-1.7.0-150500.3.3.1 * libqatzip3-1.1.0-150500.3.2.1 * libqat4-24.09.0-150500.3.3.1 * qatlib-debuginfo-24.09.0-150500.3.3.1 * qatzip-debuginfo-1.1.0-150500.3.2.1 * qatengine-1.7.0-150500.3.3.1 * qatlib-debugsource-24.09.0-150500.3.3.1 * qatlib-24.09.0-150500.3.3.1 * libusdm0-24.09.0-150500.3.3.1 * qatzip-1.1.0-150500.3.2.1 * libqat4-debuginfo-24.09.0-150500.3.3.1 * qatzip-debugsource-1.1.0-150500.3.2.1 * libqatzip3-debuginfo-1.1.0-150500.3.2.1 * qatengine-debuginfo-1.7.0-150500.3.3.1 * qatlib-devel-24.09.0-150500.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libusdm0-debuginfo-24.09.0-150500.3.3.1 * qatzip-devel-1.1.0-150500.3.2.1 * qatengine-debugsource-1.7.0-150500.3.3.1 * libqatzip3-1.1.0-150500.3.2.1 * libqat4-24.09.0-150500.3.3.1 * qatlib-debuginfo-24.09.0-150500.3.3.1 * qatzip-debuginfo-1.1.0-150500.3.2.1 * qatengine-1.7.0-150500.3.3.1 * qatlib-debugsource-24.09.0-150500.3.3.1 * qatlib-24.09.0-150500.3.3.1 * libusdm0-24.09.0-150500.3.3.1 * qatzip-1.1.0-150500.3.2.1 * libqat4-debuginfo-24.09.0-150500.3.3.1 * qatzip-debugsource-1.1.0-150500.3.2.1 * libqatzip3-debuginfo-1.1.0-150500.3.2.1 * qatengine-debuginfo-1.7.0-150500.3.3.1 * qatlib-devel-24.09.0-150500.3.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libusdm0-debuginfo-24.09.0-150500.3.3.1 * qatzip-devel-1.1.0-150500.3.2.1 * qatengine-debugsource-1.7.0-150500.3.3.1 * libqatzip3-1.1.0-150500.3.2.1 * libqat4-24.09.0-150500.3.3.1 * qatlib-debuginfo-24.09.0-150500.3.3.1 * qatzip-debuginfo-1.1.0-150500.3.2.1 * qatengine-1.7.0-150500.3.3.1 * qatlib-debugsource-24.09.0-150500.3.3.1 * qatlib-24.09.0-150500.3.3.1 * libusdm0-24.09.0-150500.3.3.1 * qatzip-1.1.0-150500.3.2.1 * libqat4-debuginfo-24.09.0-150500.3.3.1 * qatzip-debugsource-1.1.0-150500.3.2.1 * libqatzip3-debuginfo-1.1.0-150500.3.2.1 * qatengine-debuginfo-1.7.0-150500.3.3.1 * qatlib-devel-24.09.0-150500.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libusdm0-debuginfo-24.09.0-150500.3.3.1 * qatzip-devel-1.1.0-150500.3.2.1 * qatengine-debugsource-1.7.0-150500.3.3.1 * libqatzip3-1.1.0-150500.3.2.1 * libqat4-24.09.0-150500.3.3.1 * qatlib-debuginfo-24.09.0-150500.3.3.1 * qatzip-debuginfo-1.1.0-150500.3.2.1 * qatengine-1.7.0-150500.3.3.1 * qatlib-debugsource-24.09.0-150500.3.3.1 * qatlib-24.09.0-150500.3.3.1 * libusdm0-24.09.0-150500.3.3.1 * qatzip-1.1.0-150500.3.2.1 * libqat4-debuginfo-24.09.0-150500.3.3.1 * qatzip-debugsource-1.1.0-150500.3.2.1 * libqatzip3-debuginfo-1.1.0-150500.3.2.1 * qatengine-debuginfo-1.7.0-150500.3.3.1 * qatlib-devel-24.09.0-150500.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28885.html * https://www.suse.com/security/cve/CVE-2024-31074.html * https://www.suse.com/security/cve/CVE-2024-33617.html * https://bugzilla.suse.com/show_bug.cgi?id=1233363 * https://bugzilla.suse.com/show_bug.cgi?id=1233365 * https://bugzilla.suse.com/show_bug.cgi?id=1233366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 12:31:00 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 12:31:00 -0000 Subject: SUSE-SU-2025:3942-1: moderate: Security update for qatengine, qatlib Message-ID: <176234586082.10768.5638324733712419912@smelt2.prg2.suse.org> # Security update for qatengine, qatlib Announcement ID: SUSE-SU-2025:3942-1 Release Date: 2025-11-05T08:16:03Z Rating: moderate References: * bsc#1233363 * bsc#1233365 * bsc#1233366 Cross-References: * CVE-2024-28885 * CVE-2024-31074 * CVE-2024-33617 CVSS scores: * CVE-2024-28885 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28885 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves three vulnerabilities can now be installed. ## Description: This update for qatengine, qatlib fixes the following issues: Note that the 1.6.1 release included in 1.7.0 fixes the following vulnerabilities: * bsc#1233363 (CVE-2024-28885) * bsc#1233365 (CVE-2024-31074) * bsc#1233366 (CVE-2024-33617) Update to 1.7.0: * ipp-crypto name change to cryptography-primitives * QAT_SW GCM memory leak fix in cleanup function * Update limitation section in README for v1.7.0 release * Fix build with OPENSSL_NO_ENGINE * Fix for build issues with qatprovider in qatlib * Bug fixes and README updates to v1.7.0 * Remove qat_contig_mem driver support * Add support for building QAT Engine ENGINE and PROVIDER modules with QuicTLS 3.x libraries * Fix for DSA issue with openssl3.2 * Fix missing lower bounds check on index i * Enabled SW Fallback support for FBSD * Fix for segfault issue when SHIM config section is unavailable * Fix for Coverity & Resource leak * Fix for RSA failure with SVM enabled in openssl-3.2 * SM3 Memory Leak Issue Fix * Fix qatprovider lib name issue with system openssl Update to 1.6.0: * Fix issue with make depend for QAT_SW * QAT_HW GCM Memleak fix & bug fixes * QAT2.0 FreeBSD14 intree driver support * Fix OpenSSL 3.2 compatibility issues * Optimize hex dump logging * Clear job tlv on error * QAT_HW RSA Encrypt and Decrypt provider support * QAT_HW AES-CCM Provider support * Add ECDH keymgmt support for provider * Fix QAT_HW SM2 memory leak * Enable qaeMemFreeNonZeroNUMA() for qatlib * Fix polling issue for the process that doesn't have QAT_HW instance * Fix SHA3 qctx initialization issue & potential memleak * Fix compilation error in SM2 with qat_contig_mem * Update year in copyright information to 2024 Update to 1.5.0: * use new --enable-qat_insecure_algorithms to avoid regressions * improve support for SM{2,3,4} ciphers * improve SW fallback support * many bug fixes, refactorisations and documentation updates * update to 0.6.18: * Fix address sanitizer issues * Fix issues with Babassl & Openssl3.0 * Add QAT_HW SM4 CBC support * Refactor ECX provider code into single file * Fix QAT_HW AES-GCM bad mac record & memleak * Fix SHA3 memory leak * Fix sm4-cbc build error with system default OpenSSL * Symmetric performance Optimization & memleak fixes * Bug fix, README & v0.6.18 Version update * Please refer README (Software requirements section) for dependent libraries release version and other information. * update to v0.6.17: * Add security policy - c1a7a96 * Add dependancy update tool file - 522c41d * Release v0.6.17 version update - c1a7a96 * Enable QAT_SW RSA & ECDSA support for BoringSSL - 1035e82 * Fix QAT_SW SM2 ECDSA Performance issue - f44a564 * CPP check and Makefile Bug fixes - 98ccbe8 * Fix buffer overflow issue with SHA3 and ECX - cab65f3 * Update version and README for v0.6.16 - 1c95fd7 * Split --with-qat_sw_install_dir into seperate configures - d5f5656 * Add seperate err files for Boringssl - 1a09627 * Fix QAT_HW & QAT_SW AES-GCM issue with s_server in provider - c775f5c * Fix issue with disable flags in provider - 2e00636 * Fix coredump issue in provider with qat_sw gcm - 6703c13 * Fix err files regeneration failure - 510f3dc * Add Provider Support for ChachaPoly and SM2 - a98e51d * Bug Fixes in testapp and with disable flags. - 0945535 * QAT HW&SW Co-existence dynamic mechanism support. - 5baf5aa * Fix issue with SIGUSR1 during reload. - 00ea833 * Refactor qat_hw instances based on Sym/Asym capabilities. - bb10128 * Replace deprecated pthread_yield with sched_yield. - d514406 * BoringSSL support for RSA and ECDSA. - 41c67c7 * Fix s_server lseek forever issue with qatprovider. - cb3db21 * Fix aes-cbc failure issue in testapp. - a530427 * Fix glibc version test - 2461966 * Fix issue with generator param and ECDSA verify. - c51fc17 * Provider Support for DSA, DH, HKDF, PRF, SHA3 & aes-cbc - 7cc5eb9 * Fix testapp issues and optimization - e7c2ba8 * Optimize setup and clear async event notification - 573fe48 * Fix Nginx worker process core dump in QAT_SW with pkill/killall - 4eb4473 * Add Cofactor to take optimized path in ECDH API - 9a23c7e * Fix double free issue with QAT_SW - 1a16708 * Add thread mapping to specific QAT_HW instance - 5ee799a * OpenSSL 3.0 Provider Support - 38086fa * Update README and version to v0.6.12 - dca2957 * Fixed worker process hung forever after nginx reload - bfe97aa * Remove OpenSSL 1.1.0 Support - da8682a * Add QAT_SW SM2 ECDH & SM3 support - 04a6af2 * QAT_SW ECDSA SM2 sign and verify Support - d44ae7e * Disable SM3, Bug fixes, Readme & version update - d995046 qatlib was updated to: Update to 24.09.0: * Improved performance scaling in multi-thread applications * Set core affinity mapping based on NUMA (libnuma now required for building) * bug fixes, see https://github.com/intel/qatlib#resolved-issues Version update to 24.02.0 * Support DC NS (NoSession) APIs * Support Symmetric Crypto SM3 & SM4 * Support Asymmetric Crypto SM2 * Support DC CompressBound APIs * Bug Fixes. See Resolved section in README.md Update to 23.11.0: * use new --enable-legacy-algorithms to avoid regressions * add support for data compression chaining (hash then compress) * add support for additional configuration profiles * add support DC NS (NoSession) APIs * add support DC CompressBound APIs * add Support for Chinese SM{2,3,4} ciphers * bump shared library major to 4 * refactoring, bug fixes and documentation updates Update to 22.07.2: * Changed from yasm to nasm for assembly compilation * Added configuration option to use C implementation of soft CRC implementation instead of asm * Added support for pkg-config * Added missing lock around accesses to some global data in qatmgr * Fix for QATE-86605 ? improve error checking on size param used by qatmgr debug function. * Fix for issue #10 * Fixed link to Programmer's Guide * Added support for Compression LZ4 and LZ4s algorithms * Added support for Compression end-to-end integrity checks * Added support for PKE Generic Point Multiply APIs * Added support for CPM2.0b * Updated library to support new version of QAT APIs * Updated qat service to allow compression only and crypto only configurations * Created qatlib-tests rpm package * Added option to configure script to skip building sample code ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3942=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3942=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3942=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3942=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3942=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3942=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3942=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3942=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Manager Server 4.3 LTS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libqat4-24.09.0-150400.3.6.1 * qatzip-debugsource-1.1.0-150400.3.3.1 * libqatzip3-1.1.0-150400.3.3.1 * qatlib-debugsource-24.09.0-150400.3.6.1 * libqat4-debuginfo-24.09.0-150400.3.6.1 * qatzip-1.1.0-150400.3.3.1 * qatengine-debugsource-1.7.0-150400.3.6.1 * qatlib-24.09.0-150400.3.6.1 * libqatzip3-debuginfo-1.1.0-150400.3.3.1 * libusdm0-debuginfo-24.09.0-150400.3.6.1 * qatlib-debuginfo-24.09.0-150400.3.6.1 * qatzip-devel-1.1.0-150400.3.3.1 * qatengine-debuginfo-1.7.0-150400.3.6.1 * qatengine-1.7.0-150400.3.6.1 * qatlib-devel-24.09.0-150400.3.6.1 * libusdm0-24.09.0-150400.3.6.1 * qatzip-debuginfo-1.1.0-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28885.html * https://www.suse.com/security/cve/CVE-2024-31074.html * https://www.suse.com/security/cve/CVE-2024-33617.html * https://bugzilla.suse.com/show_bug.cgi?id=1233363 * https://bugzilla.suse.com/show_bug.cgi?id=1233365 * https://bugzilla.suse.com/show_bug.cgi?id=1233366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 16:30:06 -0000 Subject: SUSE-SU-2025:3957-1: important: Security update for tiff Message-ID: <176236020683.15345.17988433519333246099@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:3957-1 Release Date: 2025-11-05T15:45:43Z Rating: important References: * bsc#1248278 * bsc#1250413 Cross-References: * CVE-2025-8851 * CVE-2025-9900 CVSS scores: * CVE-2025-8851 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-8851 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-8851 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8851 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-9900 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9900 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9900 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for tiff fixes the following issues: Update to 4.7.1: * CVE-2025-8851: Fixed stack-based buffer overflow (bsc#1248278). * CVE-2025-9900: Fixed write-what-where via TIFFReadRGBAImageOriented (bsc#1250413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3957=1 openSUSE-SLE-15.6-2025-3957=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3957=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3957=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3957=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3957=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * libtiff6-32bit-4.7.1-150600.3.23.1 * libtiff-devel-32bit-4.7.1-150600.3.23.1 * libtiff6-32bit-debuginfo-4.7.1-150600.3.23.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * tiff-debuginfo-4.7.1-150600.3.23.1 * libtiff6-4.7.1-150600.3.23.1 * libtiff6-debuginfo-4.7.1-150600.3.23.1 * tiff-debugsource-4.7.1-150600.3.23.1 * libtiff-devel-4.7.1-150600.3.23.1 * tiff-4.7.1-150600.3.23.1 * openSUSE Leap 15.6 (noarch) * tiff-docs-4.7.1-150600.3.23.1 * libtiff-devel-docs-4.7.1-150600.3.23.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libtiff6-64bit-4.7.1-150600.3.23.1 * libtiff6-64bit-debuginfo-4.7.1-150600.3.23.1 * libtiff-devel-64bit-4.7.1-150600.3.23.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debuginfo-4.7.1-150600.3.23.1 * libtiff6-4.7.1-150600.3.23.1 * libtiff6-debuginfo-4.7.1-150600.3.23.1 * tiff-debugsource-4.7.1-150600.3.23.1 * libtiff-devel-4.7.1-150600.3.23.1 * Basesystem Module 15-SP6 (x86_64) * libtiff6-32bit-4.7.1-150600.3.23.1 * libtiff6-32bit-debuginfo-4.7.1-150600.3.23.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * tiff-debuginfo-4.7.1-150600.3.23.1 * libtiff6-4.7.1-150600.3.23.1 * libtiff6-debuginfo-4.7.1-150600.3.23.1 * tiff-debugsource-4.7.1-150600.3.23.1 * libtiff-devel-4.7.1-150600.3.23.1 * Basesystem Module 15-SP7 (x86_64) * libtiff6-32bit-4.7.1-150600.3.23.1 * libtiff6-32bit-debuginfo-4.7.1-150600.3.23.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.7.1-150600.3.23.1 * tiff-debuginfo-4.7.1-150600.3.23.1 * tiff-4.7.1-150600.3.23.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * tiff-debugsource-4.7.1-150600.3.23.1 * tiff-debuginfo-4.7.1-150600.3.23.1 * tiff-4.7.1-150600.3.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8851.html * https://www.suse.com/security/cve/CVE-2025-9900.html * https://bugzilla.suse.com/show_bug.cgi?id=1248278 * https://bugzilla.suse.com/show_bug.cgi?id=1250413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 16:30:09 -0000 Subject: SUSE-SU-2025:3956-1: moderate: Security update for ImageMagick Message-ID: <176236020967.15345.11661713861834562466@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:3956-1 Release Date: 2025-11-05T14:51:15Z Rating: moderate References: * bsc#1252749 Cross-References: * CVE-2025-62594 CVSS scores: * CVE-2025-62594 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-62594 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-62594 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-62594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-62594: Fixed unsigned underflow and division-by-zero that can lead to OOB pointer arithmetic and process crash. (bsc#1252749) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3956=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3956=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-devel-7.1.1.43-150700.3.22.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.43-150700.3.22.1 * libMagickCore-7_Q16HDRI10-7.1.1.43-150700.3.22.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.22.1 * libMagickWand-7_Q16HDRI10-7.1.1.43-150700.3.22.1 * ImageMagick-config-7-upstream-limited-7.1.1.43-150700.3.22.1 * ImageMagick-config-7-upstream-open-7.1.1.43-150700.3.22.1 * ImageMagick-debugsource-7.1.1.43-150700.3.22.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.22.1 * libMagick++-devel-7.1.1.43-150700.3.22.1 * ImageMagick-7.1.1.43-150700.3.22.1 * libMagick++-7_Q16HDRI5-7.1.1.43-150700.3.22.1 * ImageMagick-config-7-upstream-secure-7.1.1.43-150700.3.22.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.22.1 * ImageMagick-config-7-upstream-websafe-7.1.1.43-150700.3.22.1 * ImageMagick-config-7-SUSE-7.1.1.43-150700.3.22.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perl-PerlMagick-debuginfo-7.1.1.43-150700.3.22.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.22.1 * ImageMagick-debugsource-7.1.1.43-150700.3.22.1 * perl-PerlMagick-7.1.1.43-150700.3.22.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62594.html * https://bugzilla.suse.com/show_bug.cgi?id=1252749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 16:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 16:30:12 -0000 Subject: SUSE-SU-2025:3955-1: moderate: Security update for sccache Message-ID: <176236021227.15345.7051862850276521072@smelt2.prg2.suse.org> # Security update for sccache Announcement ID: SUSE-SU-2025:3955-1 Release Date: 2025-11-05T14:47:30Z Rating: moderate References: * bsc#1248003 Cross-References: * CVE-2025-55159 CVSS scores: * CVE-2025-55159 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-55159 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-55159 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability can now be installed. ## Description: This update for sccache fixes the following issues: * CVE-2025-55159: updated slab with the uninit memory access fix (bsc#1248003) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3955=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * sccache-debugsource-0.4.2~4-150400.3.9.1 * sccache-0.4.2~4-150400.3.9.1 * sccache-debuginfo-0.4.2~4-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55159.html * https://bugzilla.suse.com/show_bug.cgi?id=1248003 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 5 16:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 05 Nov 2025 16:30:16 -0000 Subject: SUSE-SU-2025:3954-1: moderate: Security update for aws-efs-utils Message-ID: <176236021645.15345.7869504842670362054@smelt2.prg2.suse.org> # Security update for aws-efs-utils Announcement ID: SUSE-SU-2025:3954-1 Release Date: 2025-11-05T14:06:41Z Rating: moderate References: * bsc#1240044 * bsc#1248055 * bsc#1249851 Cross-References: * CVE-2020-35881 * CVE-2025-55159 CVSS scores: * CVE-2020-35881 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2020-35881 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55159 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-55159 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-55159 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for aws-efs-utils fixes the following issues: Update to version 2.3.3 (bsc#1240044). Security issues fixed: * CVE-2025-55159: slab: incorrect bounds check in `get_disjoint_mut` function can lead to potential crash due to out-of-bounds access (bsc#1248055). * CVE-2020-35881: traitobject: log4rs: out-of-bounds write due to fat pointer layout assumptions (bsc#1249851). Other issues fixed: * Build and install efs-proxy binary (bsc#1240044). * Fixed in version 2.3.3: * Add environment variable support for AWS profiles and regions * Regenerate Cargo.lock with rust 1.70.0 * Update circle-ci config * Fix AWS Env Variable Test and Code Style Issue * Remove CentOS 8 and Ubuntu 16.04 from verified Linux distribution list * Fixed in version 2.3.2: * Update version in amazon-efs-utils.spec to 2.3.1 * Fix incorrect package version * Fixed in version 2.3.1: * Fix backtrace version to resolve ubuntu and rhel build issues * Pin Cargo.lock to avoid unexpected error across images * Fixed in version 2.3.0: * Add support for pod-identity credentials in the credentials chain * Enable mounting with IPv6 when using with the 'stunnel' mount option * Fixed in version 2.2.1: * Update log4rs * Fixed in version 2.2.0 * Use region-specific domain suffixes for dns endpoints where missing * Merge PR #211 - Amend Debian control to use binary architecture * Fixed in version 2.1.0 * Add mount option for specifying region * Add new ISO regions to config file * Fixed in version 2.0.4 * Add retry logic to and increase timeout for EC2 metadata token retrieval requests * Fixed in version 2.0.3: * Upgrade py version * Replace deprecated usage of datetime * Fixed in version 2.0.2 * Check for efs-proxy PIDs when cleaning tunnel state files * Add PID to log entries * Fxied in version 2.0.1 * Disable Nagle's algorithm for efs-proxy TLS mounts to improve latencies * Fixed in version 2.0.0: * Replace stunnel, which provides TLS encryptions for mounts, with efs-proxy, a component built in-house at AWS. Efs-proxy lays the foundation for upcoming feature launches at EFS. * Fixed in version 1.36.0: * Support new mount option: crossaccount, conduct cross account mounts via ip address. Use client AZ-ID to choose mount target. * Fixed in version 1.35.2: * Revert "Add warning if using older Version" * Support MacOS Sonoma * Fixed in version 1.35.1: * Revert openssl requirement change * Revert "Update EFS Documentation: Clarify Current FIPS Compliance Status" * Update EFS Documentation: Clarify Current FIPS Compliance Status * test: Change repo urls in eol debian9 build * Check private key file size to skip generation * test: Fix pytest that failed since commit 3dd89ca * Fix should_check_efs_utils_version scope * Add warning if using old version * Add 'fsap' option as EFS-only option * Fixed in version 1.35.0: * Add parameters to allow mount fo pod impersonation feature in EFS CSI Driver * Updated the README with support of Oracle8 distribution * Readme troubleshooting section + table of contents * Add efs-utils Support for MacOS Ventura EC2 instances ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3954=1 SUSE-2025-3954=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3954=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3954=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * aws-efs-utils-debuginfo-2.3.3-150600.17.6.1 * aws-efs-utils-2.3.3-150600.17.6.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * aws-efs-utils-2.3.3-150600.17.6.1 * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * aws-efs-utils-2.3.3-150600.17.6.1 ## References: * https://www.suse.com/security/cve/CVE-2020-35881.html * https://www.suse.com/security/cve/CVE-2025-55159.html * https://bugzilla.suse.com/show_bug.cgi?id=1240044 * https://bugzilla.suse.com/show_bug.cgi?id=1248055 * https://bugzilla.suse.com/show_bug.cgi?id=1249851 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 12:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 12:30:16 -0000 Subject: SUSE-SU-2025:3966-1: moderate: Security update for fetchmail Message-ID: <176243221645.13789.8034434706201127697@smelt2.prg2.suse.org> # Security update for fetchmail Announcement ID: SUSE-SU-2025:3966-1 Release Date: 2025-11-06T10:48:18Z Rating: moderate References: * bsc#1251194 Cross-References: * CVE-2025-61962 CVSS scores: * CVE-2025-61962 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61962 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for fetchmail fixes the following issues: * CVE-2025-61962: fixed a denial of service condition (bsc#1251194) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3966=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * fetchmail-debuginfo-6.3.26-13.21.1 * fetchmail-6.3.26-13.21.1 * fetchmail-debugsource-6.3.26-13.21.1 * fetchmailconf-6.3.26-13.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61962.html * https://bugzilla.suse.com/show_bug.cgi?id=1251194 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 12:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 12:30:21 -0000 Subject: SUSE-SU-2025:3965-1: important: Security update for java-1_8_0-ibm Message-ID: <176243222100.13789.13272396361627081223@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2025:3965-1 Release Date: 2025-11-06T10:48:06Z Rating: important References: * bsc#1252414 * bsc#1252417 * bsc#1252418 * bsc#1252758 Cross-References: * CVE-2025-53057 * CVE-2025-53066 * CVE-2025-61748 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-61748 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-61748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-61748 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: * CVE-2025-53057: Fixed an issue where an unauthenticated attacker can achieve unauthorized creation, deletion or modification access to critical data (bsc#1252414) * CVE-2025-53066: Fixed an issue where an unauthenticated attacker can achieve unauthorized access to critical data or complete access (bsc#1252417) * CVE-2025-61748: Fixed an issue where an unauthenticated attacker can achieve unauthorized update, insert or delete access to some resources (bsc#1252418) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3965=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3965=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3965=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3965=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3965=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3965=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3965=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3965=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-3965=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3965=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3965=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3965=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3965=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Enterprise Storage 7.1 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Enterprise Storage 7.1 (x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * openSUSE Leap 15.6 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * openSUSE Leap 15.6 (x86_64) * java-1_8_0-ibm-devel-32bit-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-32bit-1.8.0_sr8.55-150000.3.109.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * java-1_8_0-ibm-src-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-demo-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * Legacy Module 15-SP6 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * Legacy Module 15-SP6 (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * Legacy Module 15-SP6 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * Legacy Module 15-SP7 (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * Legacy Module 15-SP7 (ppc64le s390x x86_64) * java-1_8_0-ibm-src-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-demo-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * Legacy Module 15-SP7 (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-150000.3.109.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-plugin-1.8.0_sr8.55-150000.3.109.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-150000.3.109.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://www.suse.com/security/cve/CVE-2025-61748.html * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 * https://bugzilla.suse.com/show_bug.cgi?id=1252418 * https://bugzilla.suse.com/show_bug.cgi?id=1252758 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 12:30:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 12:30:25 -0000 Subject: SUSE-SU-2025:3964-1: important: Security update for java-1_8_0-ibm Message-ID: <176243222591.13789.8553235451722465791@smelt2.prg2.suse.org> # Security update for java-1_8_0-ibm Announcement ID: SUSE-SU-2025:3964-1 Release Date: 2025-11-06T10:46:54Z Rating: important References: * bsc#1252414 * bsc#1252417 * bsc#1252418 * bsc#1252758 Cross-References: * CVE-2025-53057 * CVE-2025-53066 * CVE-2025-61748 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-61748 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-61748 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-61748 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for java-1_8_0-ibm fixes the following issues: * CVE-2025-53057: Fixed an issue where an unauthenticated attacker can achieve unauthorized creation, deletion or modification access to critical data (bsc#1252414) * CVE-2025-53066: Fixed an issue where an unauthenticated attacker can achieve unauthorized access to critical data or complete access (bsc#1252417) * CVE-2025-61748: Fixed an issue where an unauthenticated attacker can achieve unauthorized update, insert or delete access to some resources (bsc#1252418) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3964=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3964=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-30.143.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-30.143.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-30.143.1 * java-1_8_0-ibm-devel-1.8.0_sr8.55-30.143.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (nosrc ppc64le s390x x86_64) * java-1_8_0-ibm-1.8.0_sr8.55-30.143.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * java-1_8_0-ibm-devel-1.8.0_sr8.55-30.143.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * java-1_8_0-ibm-plugin-1.8.0_sr8.55-30.143.1 * java-1_8_0-ibm-alsa-1.8.0_sr8.55-30.143.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://www.suse.com/security/cve/CVE-2025-61748.html * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 * https://bugzilla.suse.com/show_bug.cgi?id=1252418 * https://bugzilla.suse.com/show_bug.cgi?id=1252758 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 12:30:33 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 12:30:33 -0000 Subject: SUSE-SU-2025:3961-1: important: Security update for tiff Message-ID: <176243223319.13789.16768800339843220311@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:3961-1 Release Date: 2025-11-06T09:19:59Z Rating: important References: * bsc#1250413 Cross-References: * CVE-2025-9900 CVSS scores: * CVE-2025-9900 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9900 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9900 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2025-9900: Fixed Write-What-Where in libtiff via TIFFReadRGBAImageOriented (bsc#1250413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3961=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3961=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libtiff-devel-4.0.9-44.97.1 * tiff-debugsource-4.0.9-44.97.1 * tiff-4.0.9-44.97.1 * libtiff5-4.0.9-44.97.1 * tiff-debuginfo-4.0.9-44.97.1 * libtiff5-debuginfo-4.0.9-44.97.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libtiff5-32bit-4.0.9-44.97.1 * libtiff5-debuginfo-32bit-4.0.9-44.97.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libtiff-devel-4.0.9-44.97.1 * libtiff5-32bit-4.0.9-44.97.1 * libtiff5-debuginfo-32bit-4.0.9-44.97.1 * tiff-debugsource-4.0.9-44.97.1 * tiff-4.0.9-44.97.1 * libtiff5-4.0.9-44.97.1 * tiff-debuginfo-4.0.9-44.97.1 * libtiff5-debuginfo-4.0.9-44.97.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9900.html * https://bugzilla.suse.com/show_bug.cgi?id=1250413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 12:30:58 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 12:30:58 -0000 Subject: SUSE-SU-2025:20921-1: moderate: Recommended update of flake-pilot Message-ID: <176243225809.13789.14364842408638594687@smelt2.prg2.suse.org> # Recommended update of flake-pilot Announcement ID: SUSE-SU-2025:20921-1 Release Date: 2025-10-15T12:01:21Z Rating: moderate References: * bsc#1248004 Cross-References: * CVE-2025-55159 CVSS scores: * CVE-2025-55159 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-55159 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-55159 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for flake-pilot fixes the following issues: Update version to 3.1.22. * Fixes to use flakes as normal user Running a flake is a container based instance provisioning and startup. Some part of this process requires root permissions for example mounting the container instance store for the provisioning step. This commit fixes the required calls to be properly managed by sudo. * seed from entropy * Fix assignment of random sequence number We should use a seed for the sequence as described in https://rust- random.github.io/book/guide-seeding.html#a-simple-number In addition the logic when a random sequence number should be used was wrong and needed a fix regarding resume and attach type flakes which must not use a random sequence * Pass --init option for resume type flakes In resume mode a sleep command is used to keep the container open. However, without the --init option there is no signal handling available. This commit fixes it * Revert "kill prior remove when using %remove flag" This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2. no hard killing needed with the event loop entrypoint * Fixed CVE-2025-55159 slab: incorrect bounds check Update to slab 0.4.11 to fix the mentioned CVE. This Fixes bsc#1248004 * Apply clippy fixes * Create sequence number for the same invocation If a flake which is not a resume or attach flake is called twice with the same invocation arguments an error message is displayed to give this invocation a new name via the @NAME runtime option. This commit makes this more comfortable and automatically assigns a random sequence number for the call if no @NAME is given. * kill prior remove when using %remove flag In case the container instance should be removed via the %remove flag, send a kill first, followed by a force remove. The reason for this is because we use a never ending sleep command as entry point for resume type containers. If they should be removed the standard signal send on podman rm will not stop the sleep and after a period of 10 seconds podman sends a kill signal itself. We can speedup this process as we know the entry point command and send the kill signal first followed by the remove which saves us some wait time spent in podman otherwise. * Fix clippy hints variables can be used directly in the format! string * Prune old images after load Make sure no image references stay in the registry ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-2=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-2=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * flake-pilot-3.1.22-160000.1.1 * flake-pilot-podman-3.1.22-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 s390x x86_64) * flake-pilot-debuginfo-3.1.22-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * flake-pilot-3.1.22-160000.1.1 * flake-pilot-podman-3.1.22-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * flake-pilot-debuginfo-3.1.22-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55159.html * https://bugzilla.suse.com/show_bug.cgi?id=1248004 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 16:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 16:30:05 -0000 Subject: SUSE-SU-2025:3970-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP6) Message-ID: <176244660566.13748.16835125071424661556@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:3970-1 Release Date: 2025-11-06T12:03:46Z Rating: important References: * bsc#1248631 Cross-References: * CVE-2025-38664 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_70 fixes one issue. The following security issue was fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3970=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3970=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_70-default-3-150600.2.1 * kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-3-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_15-debugsource-3-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_70-default-3-150600.2.1 * kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-3-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_15-debugsource-3-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 16:30:09 -0000 Subject: SUSE-SU-2025:3978-1: moderate: Security update for ImageMagick Message-ID: <176244660912.13748.2626631429289179930@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:3978-1 Release Date: 2025-11-06T15:43:22Z Rating: moderate References: * bsc#1252749 Cross-References: * CVE-2025-62594 CVSS scores: * CVE-2025-62594 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-62594 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-62594 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-62594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-62594: Fixed unsigned underflow and division-by-zero that can lead to OOB pointer arithmetic and process crash. (bsc#1252749) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3978=1 openSUSE-SLE-15.6-2025-3978=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3978=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3978=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.29.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.29.1 * ImageMagick-7.1.1.21-150600.3.29.1 * perl-PerlMagick-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.29.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.29.1 * ImageMagick-extra-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.29.1 * libMagick++-devel-7.1.1.21-150600.3.29.1 * ImageMagick-extra-debuginfo-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.29.1 * ImageMagick-devel-7.1.1.21-150600.3.29.1 * ImageMagick-debugsource-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.29.1 * openSUSE Leap 15.6 (x86_64) * ImageMagick-devel-32bit-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.29.1 * libMagick++-devel-32bit-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.29.1 * openSUSE Leap 15.6 (noarch) * ImageMagick-doc-7.1.1.21-150600.3.29.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.29.1 * libMagick++-devel-64bit-7.1.1.21-150600.3.29.1 * ImageMagick-devel-64bit-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.29.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.29.1 * ImageMagick-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.29.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.29.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.29.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.29.1 * libMagick++-devel-7.1.1.21-150600.3.29.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.29.1 * ImageMagick-devel-7.1.1.21-150600.3.29.1 * ImageMagick-debugsource-7.1.1.21-150600.3.29.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.29.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.29.1 * perl-PerlMagick-7.1.1.21-150600.3.29.1 * ImageMagick-debugsource-7.1.1.21-150600.3.29.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.29.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62594.html * https://bugzilla.suse.com/show_bug.cgi?id=1252749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 6 16:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 06 Nov 2025 16:30:16 -0000 Subject: SUSE-SU-2025:3976-1: important: Security update for bind Message-ID: <176244661607.13748.9136839704697986373@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:3976-1 Release Date: 2025-11-06T13:14:41Z Rating: important References: * bsc#1252379 Cross-References: * CVE-2025-40778 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3976=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3976=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * bind-utils-9.11.22-3.65.1 * liblwres161-debuginfo-9.11.22-3.65.1 * libisccc161-9.11.22-3.65.1 * libdns1110-9.11.22-3.65.1 * bind-chrootenv-9.11.22-3.65.1 * libirs161-debuginfo-9.11.22-3.65.1 * libdns1110-debuginfo-9.11.22-3.65.1 * bind-utils-debuginfo-9.11.22-3.65.1 * libisccfg163-9.11.22-3.65.1 * libisccc161-debuginfo-9.11.22-3.65.1 * libisc1107-debuginfo-9.11.22-3.65.1 * bind-debuginfo-9.11.22-3.65.1 * bind-debugsource-9.11.22-3.65.1 * libisc1107-9.11.22-3.65.1 * bind-devel-9.11.22-3.65.1 * libirs161-9.11.22-3.65.1 * libbind9-161-debuginfo-9.11.22-3.65.1 * libisccfg163-debuginfo-9.11.22-3.65.1 * liblwres161-9.11.22-3.65.1 * bind-9.11.22-3.65.1 * libbind9-161-9.11.22-3.65.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * python-bind-9.11.22-3.65.1 * bind-doc-9.11.22-3.65.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libisc1107-32bit-9.11.22-3.65.1 * libisc1107-debuginfo-32bit-9.11.22-3.65.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * bind-utils-9.11.22-3.65.1 * liblwres161-debuginfo-9.11.22-3.65.1 * libisccc161-9.11.22-3.65.1 * libdns1110-9.11.22-3.65.1 * bind-chrootenv-9.11.22-3.65.1 * libirs161-debuginfo-9.11.22-3.65.1 * libdns1110-debuginfo-9.11.22-3.65.1 * bind-utils-debuginfo-9.11.22-3.65.1 * libisccfg163-9.11.22-3.65.1 * libisccc161-debuginfo-9.11.22-3.65.1 * libisc1107-debuginfo-9.11.22-3.65.1 * libbind9-161-9.11.22-3.65.1 * libisc1107-debuginfo-32bit-9.11.22-3.65.1 * bind-debuginfo-9.11.22-3.65.1 * bind-debugsource-9.11.22-3.65.1 * libisc1107-9.11.22-3.65.1 * bind-devel-9.11.22-3.65.1 * libirs161-9.11.22-3.65.1 * libbind9-161-debuginfo-9.11.22-3.65.1 * libisccfg163-debuginfo-9.11.22-3.65.1 * liblwres161-9.11.22-3.65.1 * bind-9.11.22-3.65.1 * libisc1107-32bit-9.11.22-3.65.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * python-bind-9.11.22-3.65.1 * bind-doc-9.11.22-3.65.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://bugzilla.suse.com/show_bug.cgi?id=1252379 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 08:30:08 -0000 Subject: SUSE-SU-2025:3983-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) Message-ID: <176250420811.25472.15115289216405454965@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:3983-1 Release Date: 2025-11-06T21:33:47Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_60 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3984=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3983=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3983=1 SUSE-2025-3984=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_13-debugsource-7-150600.4.1 * kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-7-150600.4.1 * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_60-default-7-150600.4.1 * kernel-livepatch-6_4_0-150600_23_50-default-8-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-8-150600.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_13-debugsource-7-150600.4.1 * kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-7-150600.4.1 * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_60-default-7-150600.4.1 * kernel-livepatch-6_4_0-150600_23_50-default-8-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-8-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 12:30:06 -0000 Subject: SUSE-SU-2025:3986-1: low: Security update for gpg2 Message-ID: <176251860628.13598.6193335343731002682@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2025:3986-1 Release Date: 2025-11-07T10:31:14Z Rating: low References: * bsc#1239119 Cross-References: * CVE-2025-30258 CVSS scores: * CVE-2025-30258 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-30258 ( SUSE ): 2.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L * CVE-2025-30258 ( NVD ): 2.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L * CVE-2025-30258 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-30258: fixed a verification denial of service due to a malicious subkey in the keyring (bsc#1239119) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3986=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3986=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3986=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3986=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3986=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3986=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3986=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3986=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * dirmngr-2.2.27-150300.3.13.1 * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * dirmngr-debuginfo-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * openSUSE Leap 15.3 (noarch) * gpg2-lang-2.2.27-150300.3.13.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * gpg2-debuginfo-2.2.27-150300.3.13.1 * gpg2-debugsource-2.2.27-150300.3.13.1 * gpg2-2.2.27-150300.3.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30258.html * https://bugzilla.suse.com/show_bug.cgi?id=1239119 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 12:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 12:30:08 -0000 Subject: SUSE-SU-2025:3985-1: moderate: Security update for ImageMagick Message-ID: <176251860887.13598.4464418405166133336@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:3985-1 Release Date: 2025-11-07T10:30:54Z Rating: moderate References: * bsc#1252749 Cross-References: * CVE-2025-62594 CVSS scores: * CVE-2025-62594 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-62594 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H * CVE-2025-62594 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-62594 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-62594: Fixed unsigned underflow and division-by-zero that can lead to OOB pointer arithmetic and process crash. (bsc#1252749) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3985=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3985=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3985=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.51.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.51.1 * ImageMagick-7.1.0.9-150400.6.51.1 * ImageMagick-debugsource-7.1.0.9-150400.6.51.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.51.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.51.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.51.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.51.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.51.1 * libMagick++-devel-7.1.0.9-150400.6.51.1 * ImageMagick-extra-7.1.0.9-150400.6.51.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.51.1 * perl-PerlMagick-7.1.0.9-150400.6.51.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.51.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.51.1 * ImageMagick-devel-7.1.0.9-150400.6.51.1 * ImageMagick-extra-debuginfo-7.1.0.9-150400.6.51.1 * openSUSE Leap 15.4 (x86_64) * libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.51.1 * ImageMagick-devel-32bit-7.1.0.9-150400.6.51.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.51.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.51.1 * libMagick++-devel-32bit-7.1.0.9-150400.6.51.1 * libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.51.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.0.9-150400.6.51.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.51.1 * openSUSE Leap 15.4 (noarch) * ImageMagick-doc-7.1.0.9-150400.6.51.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.51.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.51.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.0.9-150400.6.51.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.0.9-150400.6.51.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.0.9-150400.6.51.1 * libMagick++-devel-64bit-7.1.0.9-150400.6.51.1 * libMagick++-7_Q16HDRI5-64bit-7.1.0.9-150400.6.51.1 * ImageMagick-devel-64bit-7.1.0.9-150400.6.51.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.51.1 * ImageMagick-debugsource-7.1.0.9-150400.6.51.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.51.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.51.1 * ImageMagick-debugsource-7.1.0.9-150400.6.51.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.51.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62594.html * https://bugzilla.suse.com/show_bug.cgi?id=1252749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 16:30:08 -0000 Subject: SUSE-SU-2025:3995-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) Message-ID: <176253300810.13748.6139121490055476920@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:3995-1 Release Date: 2025-11-07T15:33:41Z Rating: important References: * bsc#1247737 * bsc#1248176 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38453 * CVE-2025-38511 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_53_6 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38511: drm/xe/pf: Clear all LMTT pages on alloc (bsc#1248176). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247737). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3995=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_6-default-7-150700.4.1 * kernel-livepatch-6_4_0-150700_53_6-default-debuginfo-7-150700.4.1 * kernel-livepatch-SLE15-SP7_Update_2-debugsource-7-150700.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1247737 * https://bugzilla.suse.com/show_bug.cgi?id=1248176 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 16:30:11 -0000 Subject: SUSE-SU-2025:3987-1: important: Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) Message-ID: <176253301107.13748.9700094402396190375@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 3 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:3987-1 Release Date: 2025-11-07T13:03:43Z Rating: important References: * bsc#1248631 * bsc#1249207 Cross-References: * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_53_11 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3987=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_11-default-3-150700.4.1 * kernel-livepatch-6_4_0-150700_53_11-default-debuginfo-3-150700.4.1 * kernel-livepatch-SLE15-SP7_Update_3-debugsource-3-150700.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 16:30:15 -0000 Subject: SUSE-SU-2025:3997-1: important: Security update for java-17-openjdk Message-ID: <176253301570.13748.1923356058082242313@smelt2.prg2.suse.org> # Security update for java-17-openjdk Announcement ID: SUSE-SU-2025:3997-1 Release Date: 2025-11-07T15:51:02Z Rating: important References: * bsc#1246806 * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for java-17-openjdk fixes the following issues: Upgrade to upstream tag jdk-17.0.17+10 (October 2025 CPU): * CVE-2025-53057: Fixed unauthenticated attacker can achieve unauthorized creation, deletion or modification access to critical data (bsc#1252414). * CVE-2025-53066: Fixed unauthenticated attacker can achive unauthorized access to critical data or complete access (bsc#1252417). Other bug fixes: * Do not embed rebuild counter (bsc#1246806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3997=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3997=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3997=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-3997=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3997=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3997=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3997=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3997=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3997=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3997=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3997=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3997=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3997=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3997=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3997=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3997=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-src-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-jmods-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * openSUSE Leap 15.4 (noarch) * java-17-openjdk-javadoc-17.0.17.0-150400.3.60.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-src-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-jmods-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * openSUSE Leap 15.6 (noarch) * java-17-openjdk-javadoc-17.0.17.0-150400.3.60.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * java-17-openjdk-devel-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-17.0.17.0-150400.3.60.2 * java-17-openjdk-17.0.17.0-150400.3.60.2 * java-17-openjdk-demo-17.0.17.0-150400.3.60.2 * java-17-openjdk-headless-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-devel-17.0.17.0-150400.3.60.2 * java-17-openjdk-debuginfo-17.0.17.0-150400.3.60.2 * java-17-openjdk-debugsource-17.0.17.0-150400.3.60.2 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1246806 * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 16:30:20 -0000 Subject: SUSE-SU-2025:3996-1: important: Security update for java-11-openjdk Message-ID: <176253302024.13748.11187085912339307693@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2025:3996-1 Release Date: 2025-11-07T15:49:28Z Rating: important References: * bsc#1246806 * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Upgrade to upstream tag jdk-11.0.29+7 (October 2025 CPU): * CVE-2025-53057: Fixed unauthenticated attacker can achieve unauthorized creation, deletion or modification access to critical data (bsc#1252414). * CVE-2025-53066: Fixed unauthenticated attacker can achive unauthorized access to critical data or complete access (bsc#1252417). Other bug fixes: * Do not embed rebuild counter (bsc#1246806) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3996=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3996=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3996=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3996=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-3996=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3996=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3996=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3996=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3996=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3996=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3996=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3996=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3996=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3996=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3996=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3996=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3996=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-src-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-jmods-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * openSUSE Leap 15.6 (noarch) * java-11-openjdk-javadoc-11.0.29.0-150000.3.132.2 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Package Hub 15 15-SP6 (noarch) * java-11-openjdk-javadoc-11.0.29.0-150000.3.132.2 * SUSE Package Hub 15 15-SP7 (noarch) * java-11-openjdk-javadoc-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-11-openjdk-debuginfo-11.0.29.0-150000.3.132.2 * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * SUSE Manager Proxy 4.3 LTS (x86_64) * java-11-openjdk-headless-11.0.29.0-150000.3.132.2 * java-11-openjdk-demo-11.0.29.0-150000.3.132.2 * java-11-openjdk-devel-11.0.29.0-150000.3.132.2 * java-11-openjdk-debugsource-11.0.29.0-150000.3.132.2 * java-11-openjdk-11.0.29.0-150000.3.132.2 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1246806 * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 16:30:38 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 16:30:38 -0000 Subject: SUSE-SU-2025:3989-1: moderate: Security update for tiff Message-ID: <176253303801.13748.12748237802697674531@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:3989-1 Release Date: 2025-11-07T13:44:30Z Rating: moderate References: * bsc#1248278 Cross-References: * CVE-2025-8851 CVSS scores: * CVE-2025-8851 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-8851 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-8851 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8851 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for tiff fixes the following issues: * CVE-2025-8851: Fixed stack-based buffer overflow vulnerability in tools/tiffcrop.c function readSeparateStripsIntoBuffer() by implementing additional error handling (bsc#1248278). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3989=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * tiff-4.0.9-44.106.1 * tiff-debugsource-4.0.9-44.106.1 * libtiff-devel-4.0.9-44.106.1 * libtiff5-debuginfo-4.0.9-44.106.1 * libtiff5-debuginfo-32bit-4.0.9-44.106.1 * libtiff5-32bit-4.0.9-44.106.1 * libtiff5-4.0.9-44.106.1 * tiff-debuginfo-4.0.9-44.106.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8851.html * https://bugzilla.suse.com/show_bug.cgi?id=1248278 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 20:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 20:30:06 -0000 Subject: SUSE-SU-2025:4000-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) Message-ID: <176254740675.13789.12186986955573115006@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:4000-1 Release Date: 2025-11-07T17:04:40Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_25 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4000=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-4000=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_25-default-19-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_5-debugsource-19-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-19-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_25-default-19-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_5-debugsource-19-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-19-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 7 20:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 07 Nov 2025 20:30:09 -0000 Subject: SUSE-SU-2025:3998-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP7) Message-ID: <176254740916.13789.16594592079562613094@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:3998-1 Release Date: 2025-11-07T16:04:09Z Rating: important References: * bsc#1248631 Cross-References: * CVE-2025-38664 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_53_16 fixes one issue. The following security issue was fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3998=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_16-default-3-150700.4.1 * kernel-livepatch-SLE15-SP7_Update_4-debugsource-3-150700.4.1 * kernel-livepatch-6_4_0-150700_53_16-default-debuginfo-3-150700.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 08:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 08:30:09 -0000 Subject: SUSE-SU-2025:4005-1: important: Security update for java-1_8_0-openj9 Message-ID: <176276340976.13598.12720718765042772289@smelt2.prg2.suse.org> # Security update for java-1_8_0-openj9 Announcement ID: SUSE-SU-2025:4005-1 Release Date: 2025-11-10T01:04:28Z Rating: important References: * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openj9 fixes the following issues: Update to OpenJDK 8u472 build 08 with OpenJDK 0.56.0 virtual machine (including Oracle October 2025 CPU changes): * CVE-2025-53057: Fixed unauthenticated attacker achieving unauthorized access to critical data or complete access (bsc#1252414) * CVE-2025-53066: Fixed unauthenticated attacker achieving unauthorized creation, deletion or modification access to critical data (bsc#1252417) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4005=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4005=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4005=1 ## Package List: * SUSE Package Hub 15 15-SP6 (ppc64le s390x) * java-1_8_0-openj9-src-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-demo-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-debugsource-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-headless-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-demo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-devel-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-accessibility-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-headless-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-devel-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-1.8.0.472-150200.3.60.3 * SUSE Package Hub 15 15-SP7 (ppc64le s390x) * java-1_8_0-openj9-src-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-demo-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-debugsource-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-headless-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-demo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-devel-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-accessibility-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-headless-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-devel-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-1.8.0.472-150200.3.60.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openj9-src-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-demo-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-debugsource-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-headless-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-demo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-devel-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-accessibility-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-debuginfo-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-headless-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-devel-1.8.0.472-150200.3.60.3 * java-1_8_0-openj9-1.8.0.472-150200.3.60.3 * openSUSE Leap 15.6 (noarch) * java-1_8_0-openj9-javadoc-1.8.0.472-150200.3.60.3 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 08:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 08:30:14 -0000 Subject: SUSE-SU-2025:4004-1: important: Security update for the Linux Kernel (Live Patch 61 for SLE 15 SP3) Message-ID: <176276341427.13598.8360742361451342823@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 61 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:4004-1 Release Date: 2025-11-09T07:03:52Z Rating: important References: * bsc#1248631 * bsc#1249841 * bsc#1249847 Cross-References: * CVE-2022-50248 * CVE-2022-50252 * CVE-2025-38664 CVSS scores: * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_218 fixes several issues. The following security issues were fixed: * CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249841). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4004=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-4004=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_61-debugsource-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_218-default-debuginfo-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_218-default-2-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_218-preempt-2-150300.2.1 * kernel-livepatch-5_3_18-150300_59_218-preempt-debuginfo-2-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_218-default-2-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249841 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 08:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 08:30:17 -0000 Subject: SUSE-SU-2025:4003-1: important: Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5) Message-ID: <176276341750.13598.8912579780262760424@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:4003-1 Release Date: 2025-11-09T06:04:02Z Rating: important References: * bsc#1248631 * bsc#1249847 Cross-References: * CVE-2022-50252 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_121 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4003=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4003=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4002=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4002=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_44-debugsource-3-150400.4.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-3-150400.4.1 * kernel-livepatch-5_14_21-150400_24_176-default-3-150400.4.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_44-debugsource-3-150400.4.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-3-150400.4.1 * kernel-livepatch-5_14_21-150400_24_176-default-3-150400.4.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_30-debugsource-3-150500.4.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-3-150500.4.1 * kernel-livepatch-5_14_21-150500_55_121-default-3-150500.4.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_30-debugsource-3-150500.4.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-3-150500.4.1 * kernel-livepatch-5_14_21-150500_55_121-default-3-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 08:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 08:30:24 -0000 Subject: SUSE-SU-2025:4001-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) Message-ID: <176276342408.13598.8224496975653081056@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:4001-1 Release Date: 2025-11-09T01:33:43Z Rating: important References: * bsc#1247737 * bsc#1248176 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38453 * CVE-2025-38511 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_53_3 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38511: drm/xe/pf: Clear all LMTT pages on alloc (bsc#1248176). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247737). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-4001=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_3-default-debuginfo-7-150700.2.1 * kernel-livepatch-SLE15-SP7_Update_1-debugsource-7-150700.2.1 * kernel-livepatch-6_4_0-150700_53_3-default-7-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1247737 * https://bugzilla.suse.com/show_bug.cgi?id=1248176 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:11 -0000 Subject: SUSE-SU-2025:4016-1: important: Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3) Message-ID: <176277781175.28375.12026584458288689035@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 59 for SUSE Linux Enterprise 15 SP3) Announcement ID: SUSE-SU-2025:4016-1 Release Date: 2025-11-10T11:49:12Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249841 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50248 * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves six vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.3.18-150300.59.211 fixes various security issues The following security issues were fixed: * CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249841). * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4016=1 SUSE-2025-4015=1 SUSE-2025-4014=1 SUSE-2025-4013=1 SUSE-2025-4012=1 SUSE-2025-4011=1 SUSE-2025-4010=1 SUSE-2025-4030=1 SUSE-2025-4027=1 SUSE-2025-4028=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-4016=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-4015=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-4014=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-4013=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-4012=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-4011=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-4010=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-4030=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-4027=1 SUSE-SLE-Module-Live-Patching-15-SP3-2025-4028=1 ## Package List: * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-17-150300.4.1 * kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_198-preempt-debuginfo-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_207-preempt-debuginfo-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_198-preempt-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_195-preempt-debuginfo-11-150300.4.1 * kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-15-150300.4.1 * kernel-livepatch-5_3_18-150300_59_188-preempt-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-preempt-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_195-preempt-11-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_49-debugsource-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_211-preempt-debuginfo-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_185-preempt-15-150300.4.1 * kernel-livepatch-5_3_18-150300_59_207-preempt-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_179-preempt-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_211-preempt-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_201-preempt-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_182-preempt-17-150300.4.1 * kernel-livepatch-5_3_18-150300_59_204-preempt-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_201-preempt-debuginfo-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_204-preempt-debuginfo-9-150300.4.1 * openSUSE Leap 15.3 (ppc64le s390x) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-19-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-19-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-19-150300.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_211-default-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_55-debugsource-11-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_58-debugsource-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_50-debugsource-17-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_54-debugsource-11-150300.4.1 * kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-15-150300.4.1 * kernel-livepatch-5_3_18-150300_59_201-default-debuginfo-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_198-default-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_204-default-debuginfo-9-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_51-debugsource-15-150300.4.1 * kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-17-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_59-debugsource-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_52-debugsource-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-default-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_188-default-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_204-default-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_211-default-debuginfo-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_201-default-9-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_56-debugsource-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_195-default-debuginfo-11-150300.4.1 * kernel-livepatch-5_3_18-150300_59_185-default-15-150300.4.1 * kernel-livepatch-5_3_18-150300_59_182-default-17-150300.4.1 * kernel-livepatch-5_3_18-150300_59_195-default-11-150300.4.1 * kernel-livepatch-5_3_18-150300_59_198-default-debuginfo-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-default-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-default-debuginfo-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_57-debugsource-9-150300.4.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-19-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-19-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-19-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_179-default-19-150300.4.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-19-150300.4.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_201-default-debuginfo-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_185-default-15-150300.4.1 * kernel-livepatch-5_3_18-150300_59_182-default-17-150300.4.1 * kernel-livepatch-5_3_18-150300_59_195-default-11-150300.4.1 * kernel-livepatch-5_3_18-150300_59_198-default-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-default-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_59-debugsource-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_207-default-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_58-debugsource-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_204-default-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_188-default-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_204-default-debuginfo-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_211-default-debuginfo-8-150300.4.1 * kernel-livepatch-5_3_18-150300_59_201-default-9-150300.4.1 * kernel-livepatch-5_3_18-150300_59_207-default-debuginfo-8-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_56-debugsource-9-150300.4.1 * kernel-livepatch-SLE15-SP3_Update_57-debugsource-9-150300.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249841 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:18 -0000 Subject: SUSE-SU-2025:4031-1: important: Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) Message-ID: <176277781856.28375.2827177261034058981@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 27 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2025:4031-1 Release Date: 2025-11-10T11:49:20Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.110 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4008=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4031=1 SUSE-2025-4009=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4031=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-4009=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4008=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_110-default-8-150500.4.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-8-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-8-150500.4.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-17-150400.4.1 * kernel-livepatch-5_14_21-150400_24_147-default-15-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-15-150400.4.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-15-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-17-150400.4.1 * kernel-livepatch-5_14_21-150400_24_141-default-17-150400.4.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-17-150400.4.1 * kernel-livepatch-5_14_21-150400_24_147-default-15-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-15-150400.4.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-15-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-17-150400.4.1 * kernel-livepatch-5_14_21-150400_24_141-default-17-150400.4.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_110-default-8-150500.4.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-8-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-8-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:24 -0000 Subject: SUSE-SU-2025:4024-1: important: Security update for the Linux Kernel (Live Patch 62 for SUSE Linux Enterprise 12 SP5) Message-ID: <176277782431.28375.6899489585171115485@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 62 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2025:4024-1 Release Date: 2025-11-10T08:14:26Z Rating: important References: * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2025-38617 * CVE-2025-38618 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.234 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-4024=1 SUSE-SLE-Live- Patching-12-SP5-2025-4023=1 SUSE-SLE-Live-Patching-12-SP5-2025-4022=1 SUSE-SLE- Live-Patching-12-SP5-2025-4021=1 SUSE-SLE-Live-Patching-12-SP5-2025-4020=1 SUSE- SLE-Live-Patching-12-SP5-2025-4019=1 SUSE-SLE-Live-Patching-12-SP5-2025-4018=1 SUSE-SLE-Live-Patching-12-SP5-2025-4017=1 SUSE-SLE-Live- Patching-12-SP5-2025-4007=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_244-default-13-4.1 * kgraft-patch-4_12_14-122_266-default-7-4.1 * kgraft-patch-4_12_14-122_258-default-8-2.1 * kgraft-patch-4_12_14-122_250-default-11-2.1 * kgraft-patch-4_12_14-122_261-default-7-4.1 * kgraft-patch-4_12_14-122_234-default-18-4.1 * kgraft-patch-4_12_14-122_255-default-10-4.1 * kgraft-patch-4_12_14-122_237-default-14-4.1 * kgraft-patch-4_12_14-122_247-default-11-4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:30 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:30 -0000 Subject: SUSE-SU-2025:4029-1: important: Security update for squid Message-ID: <176277783043.28375.2274650403168028018@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:4029-1 Release Date: 2025-11-10T11:44:36Z Rating: important References: * bsc#1252281 Cross-References: * CVE-2025-62168 CVSS scores: * CVE-2025-62168 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-62168 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-62168 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-62168 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-62168: Fixed failure to redact HTTP authentication credentials in error handling leading to information disclosure (bsc#1252281) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4029=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4029=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4029=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4029=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * squid-4.17-150000.5.58.1 * squid-debugsource-4.17-150000.5.58.1 * squid-debuginfo-4.17-150000.5.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * squid-4.17-150000.5.58.1 * squid-debugsource-4.17-150000.5.58.1 * squid-debuginfo-4.17-150000.5.58.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * squid-4.17-150000.5.58.1 * squid-debugsource-4.17-150000.5.58.1 * squid-debuginfo-4.17-150000.5.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * squid-4.17-150000.5.58.1 * squid-debugsource-4.17-150000.5.58.1 * squid-debuginfo-4.17-150000.5.58.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62168.html * https://bugzilla.suse.com/show_bug.cgi?id=1252281 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:32 -0000 Subject: SUSE-SU-2025:4026-1: important: Security update for squid Message-ID: <176277783266.28375.5141076111795752669@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:4026-1 Release Date: 2025-11-10T09:12:50Z Rating: important References: * bsc#1252281 Cross-References: * CVE-2025-62168 CVSS scores: * CVE-2025-62168 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-62168 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-62168 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-62168 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-62168: Fixed failure to redact HTTP authentication credentials in error handling leading to information disclosure (bsc#1252281) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4026=1 openSUSE-SLE-15.6-2025-4026=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4026=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4026=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * squid-debugsource-6.10-150600.3.14.1 * squid-6.10-150600.3.14.1 * squid-debuginfo-6.10-150600.3.14.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * squid-6.10-150600.3.14.1 * squid-debugsource-6.10-150600.3.14.1 * squid-debuginfo-6.10-150600.3.14.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * squid-debugsource-6.10-150600.3.14.1 * squid-6.10-150600.3.14.1 * squid-debuginfo-6.10-150600.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62168.html * https://bugzilla.suse.com/show_bug.cgi?id=1252281 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:34 -0000 Subject: SUSE-SU-2025:4025-1: moderate: Security update for govulncheck-vulndb Message-ID: <176277783454.28375.14994220638532167165@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:4025-1 Release Date: 2025-11-10T09:12:33Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20251105T184115 2025-11-05T18:41:15Z. (jsc#PED-11136): Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3987 GHSA-fmjh-f678-cv3x * GO-2025-3988 GHSA-wpwj-69cm-q9c5 * GO-2025-3999 GHSA-3g72-chj4-2228 * GO-2025-4000 GHSA-472f-vmf2-pr3h * GO-2025-4001 GHSA-7232-97c6-j525 * GO-2025-4002 GHSA-p3x5-mvmp-5f35 * GO-2025-4003 GHSA-p8hw-rfjg-689h * GO-2025-4004 GHSA-w2hg-2v4p-vmh6 * GO-2025-4005 GHSA-xch9-h8qw-85c7 * GO-2025-4017 GHSA-47m2-4cr7-mhcw * GO-2025-4020 GHSA-rwvp-r38j-9rgg * GO-2025-4021 GHSA-4p3p-cr38-v5xp * GO-2025-4022 GHSA-77r9-w39m-9xh5 * GO-2025-4023 GHSA-p84v-gxvw-73pf * GO-2025-4024 GHSA-c2hv-4pfj-mm2r * GO-2025-4026 GHSA-5m9m-j5p7-m7f9 * GO-2025-4027 GHSA-fr8m-434r-g3xp * GO-2025-4028 GHSA-72c7-4g63-hpw5 * GO-2025-4029 GHSA-3q4q-wqm6-hvf3 * GO-2025-4030 GHSA-424h-xj87-m937 * GO-2025-4031 GHSA-7cr3-38jm-6p45 * GO-2025-4032 GHSA-6q7m-p8cc-998r * GO-2025-4033 GHSA-9m49-p2j3-c6xm * GO-2025-4034 GHSA-jjjj-jwhf-8rgr * GO-2025-4035 GHSA-r6qj-894f-5hr2 * GO-2025-4036 GHSA-xr3w-rmvj-f6m7 * GO-2025-4038 GHSA-6pvw-g552-53c5 * GO-2025-4039 GHSA-g46h-2rq9-gw5m * GO-2025-4040 GHSA-g3j4-58mp-3x25 * GO-2025-4041 GHSA-8pfh-j44r-f654 * GO-2025-4042 GHSA-c8g6-qrwh-m3vp * GO-2025-4043 GHSA-h773-7gf7-9m2x * GO-2025-4044 GHSA-qqj3-g7mx-5p4w * GO-2025-4045 GHSA-cffj-7w5c-jqjh * GO-2025-4046 GHSA-ffcc-qr2v-3qmv * GO-2025-4047 GHSA-r93j-3mmp-px57 * GO-2025-4048 GHSA-7vmw-6c7h-rrrv * GO-2025-4049 GHSA-ghfh-fmx4-26h8 * GO-2025-4050 GHSA-h8qw-xqm9-q66j * GO-2025-4051 GHSA-qrf6-h5fc-7m96 * GO-2025-4052 GHSA-rc54-2g2c-g36g * GO-2025-4053 GHSA-2j9c-76pp-xc5q * GO-2025-4054 GHSA-379p-37xc-q963 * GO-2025-4055 GHSA-43m6-wvc8-2m7j * GO-2025-4056 GHSA-9jrx-fgrm-96qh * GO-2025-4057 GHSA-9w4v-9c99-hv7r * GO-2025-4058 GHSA-h3qg-w9j5-wh3m * GO-2025-4059 GHSA-j26g-95ph-2mwv * GO-2025-4060 GHSA-mj8v-773w-5qhj * GO-2025-4061 GHSA-q3g9-hgrx-hwhx * GO-2025-4062 GHSA-5q37-9874-qxcw * GO-2025-4063 GHSA-g3f3-p9rc-775p * GO-2025-4064 GHSA-m78r-2x6w-qqjp * GO-2025-4065 GHSA-rm24-25xm-9454 * GO-2025-4066 GHSA-vw57-55f8-c73q * GO-2025-4067 GHSA-jp7h-4f3c-9rc7 * GO-2025-4068 GHSA-x6fh-7qmf-69xh * GO-2025-4070 GHSA-9g4h-h484-3578 * GO-2025-4071 GHSA-vp5w-xcfc-73wf * GO-2025-4072 GHSA-5qjg-9mjh-4r92 * GO-2025-4073 GHSA-j4vr-pcmw-hx59 * GO-2025-4074 GHSA-mw39-9qc2-f7mg * GO-2025-4075 GHSA-hgrp-fgm8-56g8 * GO-2025-4076 GHSA-hq76-6gh2-5g4q * GO-2025-4077 GHSA-gv8h-7v7w-r22q * GO-2025-4078 GHSA-f5p4-p5q5-jv3h * GO-2025-4079 GHSA-q8j9-34qf-7vq7 * GO-2025-4081 GHSA-7g3r-8c6v-hfmr * GO-2025-4082 GHSA-qh7p-pfq3-677h * GO-2025-4083 GHSA-cfjq-28r2-4jv5 * GO-2025-4084 GHSA-mwmh-7px9-4c23 * GO-2025-4085 GHSA-xrw9-r35x-x878 * GO-2025-4086 GHSA-cf57-c578-7jvv * GO-2025-4087 GHSA-fj2x-735w-74vq * GO-2025-4088 GHSA-f9f4-5859-29mf ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4025=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4025=1 ## Package List: * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20251105T184115-150000.1.116.1 * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20251105T184115-150000.1.116.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 12:30:37 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 12:30:37 -0000 Subject: SUSE-SU-2025:4006-1: important: Security update for MozillaThunderbird Message-ID: <176277783763.28375.11439923603534994250@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2025:4006-1 Release Date: 2025-11-10T08:00:30Z Rating: important References: * bsc#1251263 Cross-References: * CVE-2025-11708 * CVE-2025-11709 * CVE-2025-11710 * CVE-2025-11711 * CVE-2025-11712 * CVE-2025-11713 * CVE-2025-11714 * CVE-2025-11715 CVSS scores: * CVE-2025-11708 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11709 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11710 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11711 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2025-11712 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-11713 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-11714 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-11715 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves eight vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issue: Mozilla Thunderbird is updated to 140.4. * changed: Account Hub is now disabled by default for second email account (bmo#1992027) * changed: Flatpak runtime has been updated to Freedesktop SDK 24.08 (bmo#1952100) * fixed: Users could not read mail signed with OpenPGP v6 and PQC keys (bmo#1986845) * fixed: Image preview in Insert Image dialog failed with CSP error for web resources (bmo#1989392) * fixed: Emptying trash on exit did not work with some providers (bmo#1975147) * fixed: Thunderbird could crash when applying filters (bmo#1987880) * fixed: Users were unable to override expired mail server certificate (bmo#1979323) * fixed: Opening Website header link in RSS feed incorrectly re-encoded URL parameters (bmo#1971035) Security fixes: MFSA 2025-85 (bsc#1251263): * CVE-2025-11708 (bmo#1988931) Use-after-free in MediaTrackGraphImpl::GetInstance() * CVE-2025-11709 (bmo#1989127) Out of bounds read/write in a privileged process triggered by WebGL textures * CVE-2025-11710 (bmo#1989899) Cross-process information leaked due to malicious IPC messages * CVE-2025-11711 (bmo#1989978) Some non-writable Object properties could be modified * CVE-2025-11712 (bmo#1979536) An OBJECT tag type attribute overrode browser behavior on web resources without a content-type * CVE-2025-11713 (bmo#1986142) Potential user-assisted code execution in ?Copy as cURL? command * CVE-2025-11714 (bmo#1973699, bmo#1989945, bmo#1990970, bmo#1991040, bmo#1992113) Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 * CVE-2025-11715 (bmo#1983838, bmo#1987624, bmo#1988244, bmo#1988912, bmo#1989734, bmo#1990085, bmo#1991899) Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4006=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4006=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4006=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-4006=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4006=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-common-140.4.0-150200.8.242.1 * MozillaThunderbird-translations-other-140.4.0-150200.8.242.1 * MozillaThunderbird-debugsource-140.4.0-150200.8.242.1 * MozillaThunderbird-140.4.0-150200.8.242.1 * MozillaThunderbird-debuginfo-140.4.0-150200.8.242.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-140.4.0-150200.8.242.1 * MozillaThunderbird-translations-other-140.4.0-150200.8.242.1 * MozillaThunderbird-debugsource-140.4.0-150200.8.242.1 * MozillaThunderbird-140.4.0-150200.8.242.1 * MozillaThunderbird-debuginfo-140.4.0-150200.8.242.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-140.4.0-150200.8.242.1 * MozillaThunderbird-translations-other-140.4.0-150200.8.242.1 * MozillaThunderbird-debugsource-140.4.0-150200.8.242.1 * MozillaThunderbird-140.4.0-150200.8.242.1 * MozillaThunderbird-debuginfo-140.4.0-150200.8.242.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-translations-common-140.4.0-150200.8.242.1 * MozillaThunderbird-translations-other-140.4.0-150200.8.242.1 * MozillaThunderbird-debugsource-140.4.0-150200.8.242.1 * MozillaThunderbird-140.4.0-150200.8.242.1 * MozillaThunderbird-debuginfo-140.4.0-150200.8.242.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * MozillaThunderbird-translations-common-140.4.0-150200.8.242.1 * MozillaThunderbird-translations-other-140.4.0-150200.8.242.1 * MozillaThunderbird-debugsource-140.4.0-150200.8.242.1 * MozillaThunderbird-140.4.0-150200.8.242.1 * MozillaThunderbird-debuginfo-140.4.0-150200.8.242.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11708.html * https://www.suse.com/security/cve/CVE-2025-11709.html * https://www.suse.com/security/cve/CVE-2025-11710.html * https://www.suse.com/security/cve/CVE-2025-11711.html * https://www.suse.com/security/cve/CVE-2025-11712.html * https://www.suse.com/security/cve/CVE-2025-11713.html * https://www.suse.com/security/cve/CVE-2025-11714.html * https://www.suse.com/security/cve/CVE-2025-11715.html * https://bugzilla.suse.com/show_bug.cgi?id=1251263 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 16:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 16:30:12 -0000 Subject: SUSE-SU-2025:4036-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) Message-ID: <176279221263.3305.12801461854269298949@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2025:4036-1 Release Date: 2025-11-10T14:04:16Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.144 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4036=1 SUSE-2025-4034=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4036=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-4034=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-18-150400.4.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-16-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-16-150400.4.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-18-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-18-150400.4.1 * kernel-livepatch-5_14_21-150400_24_144-default-16-150400.4.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-18-150400.4.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-16-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-16-150400.4.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-18-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-18-150400.4.1 * kernel-livepatch-5_14_21-150400_24_144-default-16-150400.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 16:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 16:30:16 -0000 Subject: SUSE-SU-2025:4039-1: important: Security update for java-1_8_0-openjdk Message-ID: <176279221610.3305.4702302920344575279@smelt2.prg2.suse.org> # Security update for java-1_8_0-openjdk Announcement ID: SUSE-SU-2025:4039-1 Release Date: 2025-11-10T15:05:47Z Rating: important References: * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Legacy Module 15-SP6 * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openjdk fixes the following issues: Update to version jdk8u472 (icedtea-3.37.0): * CVE-2025-53057: Fixed certificate handling leading to unauthorized creation, deletion or modification access to critical data (bsc#1252414) * CVE-2025-53066: Fixed Path factories leading to unauthorized access to critical data or complete access (bsc#1252417) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4039=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4039=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4039=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4039=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4039=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4039=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4039=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4039=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4039=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-4039=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-4039=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4039=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4039=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-src-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-accessibility-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * openSUSE Leap 15.6 (noarch) * java-1_8_0-openjdk-javadoc-1.8.0.472-150000.3.114.3 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3 * java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 16:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 16:30:19 -0000 Subject: SUSE-SU-2025:4038-1: important: Security update for java-1_8_0-openjdk Message-ID: <176279221983.3305.9059190382502655666@smelt2.prg2.suse.org> # Security update for java-1_8_0-openjdk Announcement ID: SUSE-SU-2025:4038-1 Release Date: 2025-11-10T14:22:54Z Rating: important References: * bsc#1252414 * bsc#1252417 Cross-References: * CVE-2025-53057 * CVE-2025-53066 CVSS scores: * CVE-2025-53057 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-53066 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for java-1_8_0-openjdk fixes the following issues: Update to version jdk8u472 (icedtea-3.37.0): * CVE-2025-53057: Fixed certificate handling leading to unauthorized creation, deletion or modification access to critical data (bsc#1252414) * CVE-2025-53066: Fixed Path factories leading to unauthorized access to critical data or complete access (bsc#1252417) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4038=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4038=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-1_8_0-openjdk-1.8.0.472-27.122.1 * java-1_8_0-openjdk-devel-1.8.0.472-27.122.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-debugsource-1.8.0.472-27.122.1 * java-1_8_0-openjdk-debuginfo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-demo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-headless-1.8.0.472-27.122.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-27.122.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * java-1_8_0-openjdk-1.8.0.472-27.122.1 * java-1_8_0-openjdk-devel-1.8.0.472-27.122.1 * java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-debugsource-1.8.0.472-27.122.1 * java-1_8_0-openjdk-debuginfo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-demo-1.8.0.472-27.122.1 * java-1_8_0-openjdk-headless-1.8.0.472-27.122.1 * java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-27.122.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53057.html * https://www.suse.com/security/cve/CVE-2025-53066.html * https://bugzilla.suse.com/show_bug.cgi?id=1252414 * https://bugzilla.suse.com/show_bug.cgi?id=1252417 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 16:30:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 16:30:22 -0000 Subject: SUSE-SU-2025:4035-1: important: Security update for erlang26 Message-ID: <176279222275.3305.14836762520109213819@smelt2.prg2.suse.org> # Security update for erlang26 Announcement ID: SUSE-SU-2025:4035-1 Release Date: 2025-11-10T13:47:19Z Rating: important References: * bsc#1249473 Cross-References: * CVE-2025-48041 CVSS scores: * CVE-2025-48041 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48041 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48041 ( NVD ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for erlang26 fixes the following issues: * CVE-2025-48041: Fixed exhaustion of file handles in ssh (bsc#1249473) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4035=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4035=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4035=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4035=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * erlang26-epmd-debuginfo-26.2.1-150300.7.19.1 * erlang26-epmd-26.2.1-150300.7.19.1 * erlang26-debuginfo-26.2.1-150300.7.19.1 * erlang26-26.2.1-150300.7.19.1 * erlang26-debugsource-26.2.1-150300.7.19.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * erlang26-dialyzer-26.2.1-150300.7.19.1 * erlang26-reltool-src-26.2.1-150300.7.19.1 * erlang26-doc-26.2.1-150300.7.19.1 * erlang26-wx-src-26.2.1-150300.7.19.1 * erlang26-et-src-26.2.1-150300.7.19.1 * erlang26-epmd-26.2.1-150300.7.19.1 * erlang26-debuginfo-26.2.1-150300.7.19.1 * erlang26-et-26.2.1-150300.7.19.1 * erlang26-diameter-26.2.1-150300.7.19.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.19.1 * erlang26-debugger-26.2.1-150300.7.19.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.19.1 * erlang26-wx-26.2.1-150300.7.19.1 * erlang26-observer-src-26.2.1-150300.7.19.1 * erlang26-debugger-src-26.2.1-150300.7.19.1 * erlang26-dialyzer-src-26.2.1-150300.7.19.1 * erlang26-26.2.1-150300.7.19.1 * erlang26-observer-26.2.1-150300.7.19.1 * erlang26-src-26.2.1-150300.7.19.1 * erlang26-wx-debuginfo-26.2.1-150300.7.19.1 * erlang26-reltool-26.2.1-150300.7.19.1 * erlang26-jinterface-src-26.2.1-150300.7.19.1 * erlang26-diameter-src-26.2.1-150300.7.19.1 * erlang26-jinterface-26.2.1-150300.7.19.1 * erlang26-debugsource-26.2.1-150300.7.19.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * erlang26-dialyzer-26.2.1-150300.7.19.1 * erlang26-reltool-src-26.2.1-150300.7.19.1 * erlang26-doc-26.2.1-150300.7.19.1 * erlang26-wx-src-26.2.1-150300.7.19.1 * erlang26-et-src-26.2.1-150300.7.19.1 * erlang26-epmd-26.2.1-150300.7.19.1 * erlang26-debuginfo-26.2.1-150300.7.19.1 * erlang26-et-26.2.1-150300.7.19.1 * erlang26-diameter-26.2.1-150300.7.19.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.19.1 * erlang26-debugger-26.2.1-150300.7.19.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.19.1 * erlang26-wx-26.2.1-150300.7.19.1 * erlang26-observer-src-26.2.1-150300.7.19.1 * erlang26-debugger-src-26.2.1-150300.7.19.1 * erlang26-dialyzer-src-26.2.1-150300.7.19.1 * erlang26-26.2.1-150300.7.19.1 * erlang26-observer-26.2.1-150300.7.19.1 * erlang26-src-26.2.1-150300.7.19.1 * erlang26-wx-debuginfo-26.2.1-150300.7.19.1 * erlang26-reltool-26.2.1-150300.7.19.1 * erlang26-jinterface-src-26.2.1-150300.7.19.1 * erlang26-diameter-src-26.2.1-150300.7.19.1 * erlang26-jinterface-26.2.1-150300.7.19.1 * erlang26-debugsource-26.2.1-150300.7.19.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * erlang26-epmd-debuginfo-26.2.1-150300.7.19.1 * erlang26-epmd-26.2.1-150300.7.19.1 * erlang26-debuginfo-26.2.1-150300.7.19.1 * erlang26-26.2.1-150300.7.19.1 * erlang26-debugsource-26.2.1-150300.7.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48041.html * https://bugzilla.suse.com/show_bug.cgi?id=1249473 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 10 20:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 10 Nov 2025 20:30:12 -0000 Subject: SUSE-SU-2025:4040-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) Message-ID: <176280661255.13604.13661933659503189105@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2025:4040-1 Release Date: 2025-11-10T19:03:48Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.170 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4042=1 SUSE-2025-4040=1 SUSE-2025-4041=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4042=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-4040=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-4041=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-7-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-7-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_153-default-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_170-default-7-150400.4.1 * kernel-livepatch-5_14_21-150400_24_158-default-9-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-9-150400.4.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-7-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-7-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_153-default-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_170-default-7-150400.4.1 * kernel-livepatch-5_14_21-150400_24_158-default-9-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-9-150400.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 08:30:08 -0000 Subject: SUSE-SU-2025:4046-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) Message-ID: <176284980802.13598.2773989391529502714@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2025:4046-1 Release Date: 2025-11-11T02:33:47Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.173 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4046=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4046=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_43-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-4-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_43-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-4-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 08:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 08:30:14 -0000 Subject: SUSE-SU-2025:4043-1: important: Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) Message-ID: <176284981475.13598.5511686118642287331@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2025:4043-1 Release Date: 2025-11-11T07:03:57Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.97 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4043=1 SUSE-2025-4044=1 SUSE-2025-4045=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4043=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-4044=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-4045=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4048=1 SUSE-2025-4049=1 SUSE-2025-4047=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4048=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-4049=1 SUSE-SLE-Module-Live- Patching-15-SP5-2025-4047=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-8-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-8-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_167-default-8-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_164-default-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_161-default-9-150400.4.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-8-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-8-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_167-default-8-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_164-default-9-150400.4.1 * kernel-livepatch-5_14_21-150400_24_161-default-9-150400.4.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_83-default-18-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-10-150500.4.1 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-18-150500.4.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-10-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-18-150500.4.1 * kernel-livepatch-5_14_21-150500_55_97-default-10-150500.4.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-10-150500.4.1 * kernel-livepatch-5_14_21-150500_55_94-default-10-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-10-150500.4.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_83-default-18-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-10-150500.4.1 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-18-150500.4.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-10-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-18-150500.4.1 * kernel-livepatch-5_14_21-150500_55_97-default-10-150500.4.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-10-150500.4.1 * kernel-livepatch-5_14_21-150500_55_94-default-10-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-10-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:07 -0000 Subject: SUSE-SU-2025:4050-1: important: Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) Message-ID: <176286420719.5085.5603152011230205597@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 25 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2025:4050-1 Release Date: 2025-11-11T09:33:48Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.100 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4051=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-4050=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4050=1 SUSE-2025-4051=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_25-debugsource-9-150500.4.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_100-default-9-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_88-default-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-9-150500.4.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-14-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-9-150500.4.1 * kernel-livepatch-5_14_21-150500_55_100-default-9-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_88-default-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-9-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:13 -0000 Subject: SUSE-SU-2025:20991-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <176286421336.5085.4822876936168694063@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20991-1 Release Date: 2025-11-06T11:20:15Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-202=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-15-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-15-1.1 * kernel-livepatch-6_4_0-10-rt-15-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:15 -0000 Subject: SUSE-SU-2025:20990-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Message-ID: <176286421575.5085.7945742241026135881@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Announcement ID: SUSE-SU-2025:20990-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 Cross-References: * CVE-2025-38664 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_12 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-197=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-36-rt-2-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_12-debugsource-2-1.1 * kernel-livepatch-6_4_0-36-rt-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:19 -0000 Subject: SUSE-SU-2025:20989-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Message-ID: <176286421959.5085.16647627236851619845@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Announcement ID: SUSE-SU-2025:20989-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-196=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-34-rt-debuginfo-7-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_10-debugsource-7-1.1 * kernel-livepatch-6_4_0-34-rt-7-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:23 -0000 Subject: SUSE-SU-2025:20988-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <176286422326.5085.10844118080828896577@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-SU-2025:20988-1 Release Date: 2025-11-05T16:32:15Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-195=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-33-rt-debuginfo-7-1.2 * kernel-livepatch-6_4_0-33-rt-7-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-7-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:27 -0000 Subject: SUSE-SU-2025:20987-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Message-ID: <176286422715.5085.15546947811460952289@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Announcement ID: SUSE-SU-2025:20987-1 Release Date: 2025-11-05T16:26:09Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_8 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-194=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-31-rt-8-1.2 * kernel-livepatch-6_4_0-31-rt-debuginfo-8-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:30 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:30 -0000 Subject: SUSE-SU-2025:20986-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Message-ID: <176286423034.5085.13972970734364177560@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Announcement ID: SUSE-SU-2025:20986-1 Release Date: 2025-11-05T16:16:55Z Rating: important References: * bsc#1248631 * bsc#1249207 Cross-References: * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_11 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-190=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-35-rt-debuginfo-3-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_11-debugsource-3-1.1 * kernel-livepatch-6_4_0-35-rt-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:34 -0000 Subject: SUSE-SU-2025:20985-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Message-ID: <176286423410.5085.4953092147797793146@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Announcement ID: SUSE-SU-2025:20985-1 Release Date: 2025-11-05T16:11:42Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_7 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-185=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-9-1.3 * kernel-livepatch-6_4_0-30-rt-9-1.3 * kernel-livepatch-6_4_0-30-rt-debuginfo-9-1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:37 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:37 -0000 Subject: SUSE-SU-2025:20984-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Message-ID: <176286423798.5085.3183786963986014720@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Announcement ID: SUSE-SU-2025:20984-1 Release Date: 2025-11-05T16:11:42Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_6 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-184=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-9-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-9-3.1 * kernel-livepatch-6_4_0-28-rt-9-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:41 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:41 -0000 Subject: SUSE-SU-2025:20983-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <176286424167.5085.14120520171837244843@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20983-1 Release Date: 2025-11-05T16:09:50Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-183=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-25-rt-11-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-11-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-11-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:46 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:46 -0000 Subject: SUSE-SU-2025:20982-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <176286424625.5085.15103052871368308044@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20982-1 Release Date: 2025-11-05T16:03:00Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-182=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-22-rt-12-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-12-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-12-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:49 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:49 -0000 Subject: SUSE-SU-2025:20981-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <176286424995.5085.3492660703650861414@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20981-1 Release Date: 2025-11-05T16:34:28Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-198=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-11-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-11-1.2 * kernel-livepatch-6_4_0-25-default-11-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:53 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:53 -0000 Subject: SUSE-SU-2025:20980-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <176286425355.5085.16604611273317939464@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-SU-2025:20980-1 Release Date: 2025-11-05T16:34:09Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-199=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-8-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-8-1.2 * kernel-livepatch-6_4_0-30-default-debuginfo-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:30:56 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:30:56 -0000 Subject: SUSE-SU-2025:20979-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_11 Message-ID: <176286425674.5085.12637776726399102784@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_11 Announcement ID: SUSE-SU-2025:20979-1 Release Date: 2025-11-05T16:33:53Z Rating: important References: * bsc#1248631 * bsc#1249534 Cross-References: * CVE-2025-38664 * CVE-2025-38678 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_11 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38678: nf_tables: reject duplicate device on updates (bsc#1249534) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-201=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-34-default-2-1.1 * kernel-livepatch-MICRO-6-0_Update_11-debugsource-2-1.1 * kernel-livepatch-6_4_0-34-default-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:00 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:00 -0000 Subject: SUSE-SU-2025:20978-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_9 Message-ID: <176286426036.5085.12834701936034738827@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_9 Announcement ID: SUSE-SU-2025:20978-1 Release Date: 2025-11-05T16:33:38Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_9 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-200=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_9-debugsource-8-1.2 * kernel-livepatch-6_4_0-31-default-debuginfo-8-1.2 * kernel-livepatch-6_4_0-31-default-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:04 -0000 Subject: SUSE-SU-2025:20977-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <176286426487.5085.3352468463568524554@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20977-1 Release Date: 2025-11-05T16:18:40Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-191=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-debuginfo-15-1.1 * kernel-livepatch-6_4_0-19-default-15-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-15-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:07 -0000 Subject: SUSE-SU-2025:20976-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_12 Message-ID: <176286426702.5085.15096983487200453379@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_12 Announcement ID: SUSE-SU-2025:20976-1 Release Date: 2025-11-05T16:15:32Z Rating: important References: * bsc#1248631 Cross-References: * CVE-2025-38664 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_12 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-193=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_12-debugsource-2-1.1 * kernel-livepatch-6_4_0-35-default-2-1.1 * kernel-livepatch-6_4_0-35-default-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:10 -0000 Subject: SUSE-SU-2025:20975-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_7 Message-ID: <176286427073.5085.8558319552914013379@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_7 Announcement ID: SUSE-SU-2025:20975-1 Release Date: 2025-11-05T16:15:32Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_7 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-192=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-29-default-8-1.2 * kernel-livepatch-MICRO-6-0_Update_7-debugsource-8-1.2 * kernel-livepatch-6_4_0-29-default-debuginfo-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:14 -0000 Subject: SUSE-SU-2025:20974-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_6 Message-ID: <176286427460.5085.760860277197934264@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_6 Announcement ID: SUSE-SU-2025:20974-1 Release Date: 2025-11-05T16:13:22Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_6 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-188=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-28-default-debuginfo-9-3.1 * kernel-livepatch-MICRO-6-0_Update_6-debugsource-9-3.1 * kernel-livepatch-6_4_0-28-default-9-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:19 -0000 Subject: SUSE-SU-2025:20973-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <176286427920.5085.17406498404525298523@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20973-1 Release Date: 2025-11-05T16:13:01Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-187=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-13-1.2 * kernel-livepatch-6_4_0-24-default-13-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-13-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:22 -0000 Subject: SUSE-SU-2025:20972-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_10 Message-ID: <176286428230.5085.4549605276426629032@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_10 Announcement ID: SUSE-SU-2025:20972-1 Release Date: 2025-11-05T16:12:05Z Rating: important References: * bsc#1248631 * bsc#1249207 Cross-References: * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_10 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-189=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-32-default-debuginfo-3-1.1 * kernel-livepatch-6_4_0-32-default-3-1.1 * kernel-livepatch-MICRO-6-0_Update_10-debugsource-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:32 -0000 Subject: SUSE-SU-2025:20971-1: important: Security update for tiff Message-ID: <176286429210.5085.5691553514864701076@smelt2.prg2.suse.org> # Security update for tiff Announcement ID: SUSE-SU-2025:20971-1 Release Date: 2025-11-06T11:06:35Z Rating: important References: * bsc#1219213 * bsc#1228924 * bsc#1236834 * bsc#1243503 * bsc#1247106 * bsc#1247108 * bsc#1247581 * bsc#1247582 * bsc#1248117 * bsc#1248330 * bsc#1250413 Cross-References: * CVE-2023-52356 * CVE-2024-13978 * CVE-2024-7006 * CVE-2025-8176 * CVE-2025-8177 * CVE-2025-8534 * CVE-2025-8961 * CVE-2025-9165 * CVE-2025-9900 CVSS scores: * CVE-2023-52356 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-52356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52356 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-13978 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-13978 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-13978 ( NVD ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-13978 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-7006 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-7006 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7006 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8176 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-8176 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L * CVE-2025-8176 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8176 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-8177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-8177 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-8177 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8177 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-8177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8534 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8534 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8534 ( NVD ): 1.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8534 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8961 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8961 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-9165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-9165 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-9165 ( NVD ): 1.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-9165 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-9900 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9900 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9900 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves nine vulnerabilities and has two fixes can now be installed. ## Description: This update for tiff fixes the following issues: * Update to 4.7.1: Security: * CVE-2025-8177: Fixed possible buffer overflow in tools/thumbnail.c:setrow() when processing malformed TIFF files (bsc#1247106) * CVE-2025-8176: Fixed heap use-after-free in tools/tiffmedian.c (bsc#1247108) * CVE-2024-13978: libtiff: Fixed LibTIFF Null Pointer Dereference (bsc#1247581) * CVE-2025-8534: Fixed null pointer dereference in function PS_Lvl2page (bsc#1247582) * CVE-2025-8961: Fixed segmentation fault via main function of tiffcrop utility (bsc#1248117) * CVE-2025-9165: libtiff: Fixed local execution manipulation leading to memory leak (bsc#1248330) * CVE-2025-9900: libtiff: Fixed Write-What-Where via TIFFReadRGBAImageOriented (bsc#1250413) Software configuration changes: * Define HAVE_JPEGTURBO_DUAL_MODE_8_12 and LERC_STATIC in tif_config.h. * CMake: define WORDS_BIGENDIAN via tif_config.h * doc/CMakeLists.txt: remove useless cmake_minimum_required() * CMake: fix build with LLVM/Clang 17 (fixes issue #651) * CMake: set CMP0074 new policy * Set LINKER_LANGUAGE for C targets with C deps * Export tiffxx cmake target (fixes issue #674) * autogen.sh: Enable verbose wget. * configure.ac: Syntax updates for Autoconf 2.71 * autogen.sh: Re-implement based on autoreconf. Failure to update config.guess/config.sub does not return error (fixes issue #672) * CMake: fix CMake 4.0 warning when minimum required version is < 3.10. * CMake: Add build option tiff-static (fixes issue #709) Library changes: * Add TIFFOpenOptionsSetWarnAboutUnknownTags() for explicit control about emitting warnings for unknown tags. No longer emit warnings about unknown tags by default * tif_predict.c: speed-up decompression in some cases. Bug fixes: * tif_fax3: For fax group 3 data if no EOL is detected, reading is retried without synchronisation for EOLs. (fixes issue #54) * Updating TIFFMergeFieldInfo() with read_count=write_count=0 for FIELD_IGNORE. Updating TIFFMergeFieldInfo() with read_count=write_count=0 for FIELD_IGNORE. Improving handling when field_name = NULL. (fixes issue #532) * tiff.h: add COMPRESSION_JXL_DNG_1_7=52546 as used for JPEGXL compression in the DNG 1.7 specification * TIFFWriteDirectorySec: Increment string length for ASCII tags for codec tags defined with FIELD_xxx bits, as it is done for FIELD_CUSTOM tags. (fixes issue #648) * Do not error out on a tag whose tag count value is zero, just issue a warning. Fix parsing a private tag 0x80a6 (fixes issue #647) * TIFFDefaultTransferFunction(): give up beyond td_bitspersample = 24 * tif_getimage.c: Remove unnecessary calls to TIFFRGBAImageOK() (fixes issue #175) * Fix writing a Predictor=3 file with non-native endianness * _TIFFVSetField(): fix potential use of unallocated memory (out-of-bounds * read / nullptr dereference) in case of out-of-memory situation when dealing with custom tags (fixes issue #663) * tif_fax3.c: Error out for CCITT fax encoding if SamplesPerPixel is not equal 1 and PlanarConfiguration = Contiguous (fixes issue #26) * tif_fax3.c: error out after a number of times end-of-line or unexpected bad code words have been reached. (fixes issue #670) * Fix memory leak in TIFFSetupStrips() (fixes issue #665) * tif_zip.c: Provide zlib allocation functions. Otherwise for zlib built with -DZ_SOLO inflating will fail. * Fix memory leak in _TIFFSetDefaultCompressionState. (fixes issue #676) * tif_predict.c: Don?t overwrite input buffer of TIFFWriteScanline() if "prediction" is enabled. Use extra working buffer in PredictorEncodeRow(). (fixes issue #5) * tif_getimage.c: update some integer overflow checks (fixes issue #79) * TIFFReadRGBAImage(): several fixes to avoid buffer overflows. * Correct passing arguments to TIFFCvtIEEEFloatToNative() and TIFFCvtIEEEDoubleToNative() if HAVE_IEEEFP is not defined. (fixes issue #699) * LZWDecode(): avoid nullptr dereference when trying to read again after EOI marker has been found with remaining output bytes (fixes issue #698) * TIFFSetSubDirectory(): check _TIFFCheckDirNumberAndOffset() return. * TIFFUnlinkDirectory() and TIFFWriteDirectorySec(): clear tif_rawcp when clearing tif_rawdata (fixes issue #711) * JPEGEncodeRaw(): error out if a previous scanline failed to be written, to avoid out-of-bounds access (fixes issue #714) * tif_jpeg: Fix bug in JPEGDecodeRaw() if JPEG_LIB_MK1_OR_12BIT is defined for 8/12bit dual mode, introduced in libjpeg-turbo 2.2, which was actually released as 3.0. Fixes issue #717 * add assert for TIFFReadCustomDirectory infoarray check. * ppm2tiff: Fix bug in pack_words trailing bytes, where last two bytes of each line were written wrongly. (fixes issue #467) * fax2ps: fix regression of commit 28c38d648b64a66c3218778c4745225fe3e3a06d where TIFFTAG_FAXFILLFUNC is being used rather than an output buffer (fixes issue #649) * tiff2pdf: Check TIFFTAG_TILELENGTH and TIFFTAGTILEWIDTH (fixes issue #650) * tiff2pdf: check h_samp and v_samp for range 1 to 4 to avoid division by zero. Fixes issue #654 * tiff2pdf: avoid null pointer dereference. (fixes issue #741) * Improve non-secure integer overflow check (comparison of division result with multiplicant) at compiler optimisation in tiffcp, rgb2ycbcr and tiff2rgba. Fixes issue #546 * tiff2rgba: fix some "a partial expression can generate an overflow before it is assigned to a broader type" warnings. (fixes issue #682) * tiffdither/tiffmedian: Don't skip the first line of the input image. (fixes issue #703) * tiffdither: avoid out-of-bounds read identified in issue #733 * tiffmedian: error out if TIFFReadScanline() fails (fixes issue #707) * tiffmedian: close input file. (fixes issue #735) * thumbail: avoid potential out of bounds access (fixes issue #715) * tiffcrop: close open TIFF files and release allocated buffers before exiting in case of error to avoid memory leaks. (fixes issue #716) * tiffcrop: fix double-free and memory leak exposed by issue #721 * tiffcrop: avoid buffer overflow. (fixes issue #740) * tiffcrop: avoid nullptr dereference. (fixes issue #734) * tiffdump: Fix coverity scan issue CID 1373365: Passing tainted expression *datamem to PrintData, which uses it as a divisor or modulus. * tiff2ps: check return of TIFFGetFiled() for TIFFTAG_STRIPBYTECOUNTS and TIFFTAG_TILEBYTECOUNTS to avoid NULL pointer dereference. (fixes issue #718) * tiffcmp: fix memory leak when second file cannot be opened. (fixes issue #718 and issue #729) * tiffcp: fix setting compression level for lossless codecs. (fixes issue #730) * raw2tiff: close input file before exit (fixes issue #742) Tools changes: * tiffinfo: add a -W switch to warn about unknown tags. * tiffdither: process all pages in input TIFF file. Documentation: * TIFFRGBAImage.rst note added for incorrect saving of images with TIFF orientation from 5 (LeftTop) to 8 (LeftBottom) in the raster. * TIFFRGBAImage.rst note added about un-associated alpha handling (fixes issue #67) * Update "Defining New TIFF Tags" description. (fixes issue #642) * Fix return type of TIFFReadEncodedTile() * Update the documentation to reflect deprecated typedefs. * TIFFWriteDirectory.rst: Clarify TIFFSetWriteOffset() only sets offset for image data and not for IFD data. * Update documentation on re-entrancy and thread safety. * Remove dead links to no more existing Awaresystems web-site. * Updating BigTIFF specification and some miscelaneous editions. * Replace some last links and remove last todos. * Added hints for correct allocation of TIFFYCbCrtoRGB structure and its associated buffers. (fixes issue #681) * Added chapter to "Using the TIFF Library" with links to handling multi-page TIFF and custom directories. (fixes issue #43) * update TIFFOpen.rst with the return values of mapproc and unmapproc. (fixes issue #12) * Fix TIFFMergeFieldInfo() read_count=write_count=0 (bsc#1243503) * Add -DCMAKE_POLICY_VERSION_MINIMUM=3.5 to fix FTBFS with cmake4 * Add %check section * Remove Group: declarations, no longer used * Use python3-Sphinx instead of %{primary_python}-Sphinx based on recommendation from python maintainers. * Fixes build issue of man flavor on 15.6 * Update test/test_directory.c not to fail on big-endian machines (bsc#1236834). * Fix versioning of tiff-docs under Recommends * Update to 4.7.0: * This version restores in the default build the availability of the tools that had been dropped in v4.6.0 * Software configuration changes: * autoconf build: configure.ac: avoid -Werror passed to CFLAGS to interfere with feature detection * autoconf build: fix error when running make clean (fixes issue #630) * autoconf build: back off the minimum required automake version to 1.11 * autoconf.ac: fix detection of windows.h for mingw (fixes issue #605) * libtiff-4.pc: Fix Requires.private missing Lerc. It provides a .pc file starting from version 4 (in autoconf builds, we assume that liblerc is at least version 4) * CMake: Fix TIFF_INCLUDE_DIRS * CMake: MinGW compilers don't need a .def file for shared library * CMake: move libdeflate and Lerc to Requires.private * CMake: enable resource compilation on all Windows. * Library changes: * Add TIFFOpenOptionsSetMaxCumulatedMemAlloc(). This function complements TIFFOpenOptionsSetMaxSingleMemAlloc() to define the maximum cumulated memory allocations in byte, for a given TIFF handle, that libtiff internal memory allocation functions are allowed. * TIFFWriteDirectory(): Avoid overwriting following data if an IFD is enlarged. * TIFFXYZToRGB: avoid integer overflow (fixes issue #644) * uv_decode() and uv_encode(): avoid potential out-of-bounds array index (fixes issue #645) * Fix cases where tif_curdir is set incorrectly. Fix cases where the current directory number (tif_curdir) is set inconsistently or incorrectly, depending on the previous history. * TIFFRead[Scanline/EncodedStrip/EncodeTile]: 0-initialize output buffer if setupdecode fails ; most codecs: zero-initialize (not-yet-written parts of) output buffer if failure (fixes issue #375) * OJPEG: reset subsampling_convert_state=0 in OJPEGPreDecode (fixes issue #183) * ThunderRLE: fix failure when decoding last run. Bug seen with GhostPDL * LERC codec: deal with issues with multi-band PlanarConfig=Contig and NaN values * tif_fax3.c: error out after a number of times end-of-file has been reached (fixes issue #583) * LZW: avoid warning about misaligned address with UBSAN (fixes issue #616) * CVE-2023-52356: Fixed segment fault in TIFFReadRGBATileExt() leading to denial of service (bsc#1219213) * tif_dirread.c: only issue TIFFGetFileSize() for large enough RAM requests * Avoid FPEs (division by zero) in tif_getimage.c. * Avoiding FPE (division by zero) for TIFFhowmany_32() and TIFFhowmany_64() macros by checking for denominator not zero before macros are executed. (fixes issue #628) * Add non-zero check before division in TIFFComputeStrip() * Fix wrong return of TIFFIsBigTIFF() in case byte-swapping is active * Setting the TIFFFieldInfo field set_field_type should consider field_writecount not field_readcount * Avoid memory leaks when using TIFFCreateDirectory() by releasing the allocated memory in the tif-structure. * For non-terminated ASCII arrays, the buffer is first enlarged before a NULL is set at the end to avoid deleting the last character. (fixes issue #579) * CVE-2024-7006: Fixed NULL pointer dereference in tif_dirinfo.c (bsc#1228924) * Prevent some out-of-memory attacks (fixes issue #614) * Ensure absolute seeking is forced independent of TIFFReadDirectory success. (fixes issue #618) * tif_dirinfo.c: re-enable TIFFTAG_EP_CFAREPEATPATTERNDIM and TIFFTAG_EP_CFAPATTERN tags (fixes issue #608) * Fix warnings with GCC 14 * tif_dir.c: Log source file, line number, and input tif for directory count error (fixes issue #627) * Last usage of get_field_type of TIFFField structure at TIFFWriteDirectorySec() changed to using set_field_type. * tif_jpeg.c/tif_ojpeg.c: remove likely ifdef tricks related to old compilers or unusual setups * Remove _TIFFUInt64ToFloat() and _TIFFUInt64ToDouble() * Remove support for _MSC_VER < 1500. * Use #ifdef _WIN32 to test for Windows, and tiffio.h: remove definition of **WIN32** * Documentation: * Amend manpages for changes in current directory index behaviour * Note on using TIFFFlush() before TIFFClose() to check that the data has been successfully written to the file. (fixes issue #506) * Update TIFF documentation about TIFFOpenOptions.rst and TIFFOpenOptionsSetMaxSingleMemAlloc() usage and some other small fixes * Re-added tools: * fax2ps * fax2tiff * pal2rgb * ppm2tiff * raw2tiff * rgb2ycbcr (not installed) * thumbnail (not installed) * tiff2bw * tiff2rgba * tiffcmp * tiffcrop * tiffdither * tiffgt * tiffmedian * tiff2ps * tiff2pdf * New/improved functionality: * tiff2rgba: Add background gradient option for alpha compositing * tiffcp: -i flag restored * Bug fixes for tools: * tiffcrop: address Coverity scan issues 1605444, 1605445, and 16054 * tiffcrop: Apply "Fix heap-buffer-overflow in function extractImageSection" * tiffcrop: fix buffer overflows, use after free (fixes issue #542, issue #550, issue #552) * tiff2pdf: address Coverity scan issues * tiff2pdf: fix inconsistent PLANARCONFIG value for the input and output TIFF * tiff2pdf: fix issue with JPEG restart-interval marker when converting from JPEG-compressed files (fixes issue #539) * tiff2pdf: red and blue were being swapped for RGBA decoding (fixes issue #253) * tiff2pdf: fixes issue #596 * thumbnail: address Coverity scan issues * tiffcp: Add check for limitMalloc return to fix Coverity 1603334 * tiffcp: preserve TIFFTAG_REFERENCEBLACKWHITE when doing YCbCr JPEG -> YCbCr JPEG * tiffcp: replace PHOTOMETRIC_YCBCR with PHOTOMETRIC_RGB when outputing to compression != JPEG (refs issue #571) * tiffcp: do not copy tags YCBCRCOEFFICIENTS, YCBCRSUBSAMPLING, YCBCRPOSITIONING, REFERENCEBLACKWHITE. Only set YCBCRSUBSAMPLING when generating YCbCr JPEG * tiffcp: Check also codec of input image, not only from output image (fixes issue #606) * Add some basic sanity checks for tiffcp and tiffcrop RGB->YCbCr JPEG conversions. * fax2ps and fax2tiff: memory leak fixes (fixes issue #476) * tiffmedian: memory leak fixes (fixes issue #599) * fax2tiff: fix EOFB interpretation (fixes issue #191) * fax2tiff: fix issue with unreasonable width input (fixes issue #249) * tiffcp and tiffcrop: fixes issue #228 * tiff2rgba: fixes issue #469 * tiffdither: fixes issue #473 * tiffdump: fix wrong printf formatter in error message (Coverity 1472932) * tiffset: avoid false positive Coverity Scan warning on 64-bit builds (Coverity 1518997) * tifcp/tiffset: use correct format specifiers * Changes to contributed and unsupported tools * contrib/addtiffo: validate return of TIFFWriteEncodedXXXX() calls (Coverity 1024680) * Tools are not built for now due to test failure: `FAIL: tiffcp-32bpp-None- jpeg.sh` ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-332=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libtiff6-debuginfo-4.7.1-slfo.1.1_1.1 * libtiff6-4.7.1-slfo.1.1_1.1 * tiff-debugsource-4.7.1-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52356.html * https://www.suse.com/security/cve/CVE-2024-13978.html * https://www.suse.com/security/cve/CVE-2024-7006.html * https://www.suse.com/security/cve/CVE-2025-8176.html * https://www.suse.com/security/cve/CVE-2025-8177.html * https://www.suse.com/security/cve/CVE-2025-8534.html * https://www.suse.com/security/cve/CVE-2025-8961.html * https://www.suse.com/security/cve/CVE-2025-9165.html * https://www.suse.com/security/cve/CVE-2025-9900.html * https://bugzilla.suse.com/show_bug.cgi?id=1219213 * https://bugzilla.suse.com/show_bug.cgi?id=1228924 * https://bugzilla.suse.com/show_bug.cgi?id=1236834 * https://bugzilla.suse.com/show_bug.cgi?id=1243503 * https://bugzilla.suse.com/show_bug.cgi?id=1247106 * https://bugzilla.suse.com/show_bug.cgi?id=1247108 * https://bugzilla.suse.com/show_bug.cgi?id=1247581 * https://bugzilla.suse.com/show_bug.cgi?id=1247582 * https://bugzilla.suse.com/show_bug.cgi?id=1248117 * https://bugzilla.suse.com/show_bug.cgi?id=1248330 * https://bugzilla.suse.com/show_bug.cgi?id=1250413 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:48 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:48 -0000 Subject: SUSE-SU-2025:20965-1: important: Security update for libsoup Message-ID: <176286430871.5085.3732965047166564595@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20965-1 Release Date: 2025-10-30T13:31:51Z Rating: important References: * bsc#1250562 Cross-References: * CVE-2025-11021 CVSS scores: * CVE-2025-11021 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-11021 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-11021 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-11021: Ignore invalid date when processing cookies to prevent out- of-bounds read (bsc#1250562). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-325=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libsoup-3_0-0-3.4.4-slfo.1.1_5.1 * libsoup-debugsource-3.4.4-slfo.1.1_5.1 * libsoup-3_0-0-debuginfo-3.4.4-slfo.1.1_5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11021.html * https://bugzilla.suse.com/show_bug.cgi?id=1250562 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:31:50 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:31:50 -0000 Subject: SUSE-SU-2025:20964-1: moderate: Security update for colord Message-ID: <176286431079.5085.1886315528234717077@smelt2.prg2.suse.org> # Security update for colord Announcement ID: SUSE-SU-2025:20964-1 Release Date: 2025-10-30T12:31:10Z Rating: moderate References: * bsc#1250750 Cross-References: * CVE-2021-42523 CVSS scores: * CVE-2021-42523 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2021-42523 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for colord fixes the following issues: * CVE-2021-42523: Fixed information disclosure in cd-device-db.c and cd- profile-db.c (bsc#1250750). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-324=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libcolord2-1.4.6-slfo.1.1_2.1 * colord-debugsource-1.4.6-slfo.1.1_2.1 * libcolord2-debuginfo-1.4.6-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2021-42523.html * https://bugzilla.suse.com/show_bug.cgi?id=1250750 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:03 -0000 Subject: SUSE-SU-2025:20960-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <176286432334.5085.17056943784773225033@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20960-1 Release Date: 2025-11-06T11:20:15Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-203=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-15-1.2 * kernel-livepatch-6_4_0-11-rt-15-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-15-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:08 -0000 Subject: SUSE-SU-2025:20959-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <176286432892.5085.13273334655736322787@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20959-1 Release Date: 2025-11-06T11:20:15Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-202=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-15-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-15-1.1 * kernel-livepatch-6_4_0-10-rt-15-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:12 -0000 Subject: SUSE-SU-2025:20958-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_11 Message-ID: <176286433204.5085.12123408090664052861@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_11 Announcement ID: SUSE-SU-2025:20958-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 * bsc#1249534 Cross-References: * CVE-2025-38664 * CVE-2025-38678 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_11 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38678: nf_tables: reject duplicate device on updates (bsc#1249534) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-201=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-34-default-2-1.1 * kernel-livepatch-MICRO-6-0_Update_11-debugsource-2-1.1 * kernel-livepatch-6_4_0-34-default-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249534 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:15 -0000 Subject: SUSE-SU-2025:20957-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_9 Message-ID: <176286433578.5085.16025149009611297203@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_9 Announcement ID: SUSE-SU-2025:20957-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_9 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-200=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_9-debugsource-8-1.2 * kernel-livepatch-6_4_0-31-default-debuginfo-8-1.2 * kernel-livepatch-6_4_0-31-default-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:19 -0000 Subject: SUSE-SU-2025:20956-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <176286433989.5085.14529192635647494243@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-SU-2025:20956-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-199=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-8-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-8-1.2 * kernel-livepatch-6_4_0-30-default-debuginfo-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:23 -0000 Subject: SUSE-SU-2025:20955-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <176286434356.5085.4717151631201495431@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20955-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-198=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-11-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-11-1.2 * kernel-livepatch-6_4_0-25-default-11-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:25 -0000 Subject: SUSE-SU-2025:20954-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Message-ID: <176286434556.5085.1913869020411928241@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_12 Announcement ID: SUSE-SU-2025:20954-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 Cross-References: * CVE-2025-38664 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_12 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-197=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-36-rt-2-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_12-debugsource-2-1.1 * kernel-livepatch-6_4_0-36-rt-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:29 -0000 Subject: SUSE-SU-2025:20953-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Message-ID: <176286434955.5085.14232847613020202806@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Announcement ID: SUSE-SU-2025:20953-1 Release Date: 2025-11-05T16:33:56Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-196=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-34-rt-debuginfo-7-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_10-debugsource-7-1.1 * kernel-livepatch-6_4_0-34-rt-7-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:34 -0000 Subject: SUSE-SU-2025:20952-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <176286435409.5085.5228478706844874941@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-SU-2025:20952-1 Release Date: 2025-11-05T16:32:15Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-195=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-33-rt-debuginfo-7-1.2 * kernel-livepatch-6_4_0-33-rt-7-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-7-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:37 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:37 -0000 Subject: SUSE-SU-2025:20951-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Message-ID: <176286435748.5085.2892891682296679241@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Announcement ID: SUSE-SU-2025:20951-1 Release Date: 2025-11-05T16:26:09Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_8 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-194=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-31-rt-8-1.2 * kernel-livepatch-6_4_0-31-rt-debuginfo-8-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:41 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:41 -0000 Subject: SUSE-SU-2025:20950-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <176286436188.5085.14755497548187179815@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20950-1 Release Date: 2025-11-05T16:17:47Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-191=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-debuginfo-15-1.1 * kernel-livepatch-6_4_0-19-default-15-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-15-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:44 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:44 -0000 Subject: SUSE-SU-2025:20949-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Message-ID: <176286436473.5085.5987310349502877075@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_11 Announcement ID: SUSE-SU-2025:20949-1 Release Date: 2025-11-05T16:16:55Z Rating: important References: * bsc#1248631 * bsc#1249207 Cross-References: * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_11 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-190=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-35-rt-debuginfo-3-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_11-debugsource-3-1.1 * kernel-livepatch-6_4_0-35-rt-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:47 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:47 -0000 Subject: SUSE-SU-2025:20948-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_12 Message-ID: <176286436702.5085.12842174722203380023@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_12 Announcement ID: SUSE-SU-2025:20948-1 Release Date: 2025-11-05T16:15:33Z Rating: important References: * bsc#1248631 Cross-References: * CVE-2025-38664 CVSS scores: * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_12 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-193=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_12-debugsource-2-1.1 * kernel-livepatch-6_4_0-35-default-2-1.1 * kernel-livepatch-6_4_0-35-default-debuginfo-2-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:50 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:50 -0000 Subject: SUSE-SU-2025:20947-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_7 Message-ID: <176286437053.5085.13170578177474337790@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_7 Announcement ID: SUSE-SU-2025:20947-1 Release Date: 2025-11-05T16:15:33Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_7 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-192=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-29-default-8-1.2 * kernel-livepatch-MICRO-6-0_Update_7-debugsource-8-1.2 * kernel-livepatch-6_4_0-29-default-debuginfo-8-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:55 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:55 -0000 Subject: SUSE-SU-2025:20946-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <176286437546.5085.1281210416933015101@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20946-1 Release Date: 2025-11-05T16:12:41Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-186=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-20-default-debuginfo-15-1.2 * kernel-livepatch-MICRO-6-0_Update_3-debugsource-15-1.2 * kernel-livepatch-6_4_0-20-default-15-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:32:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:32:59 -0000 Subject: SUSE-SU-2025:20945-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <176286437997.5085.307219087702944905@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20945-1 Release Date: 2025-11-05T16:12:14Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-187=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-13-1.2 * kernel-livepatch-6_4_0-24-default-13-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-13-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:03 -0000 Subject: SUSE-SU-2025:20944-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_6 Message-ID: <176286438372.5085.11586384831046673888@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_6 Announcement ID: SUSE-SU-2025:20944-1 Release Date: 2025-11-05T16:11:42Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_6 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-188=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-28-default-debuginfo-9-3.1 * kernel-livepatch-MICRO-6-0_Update_6-debugsource-9-3.1 * kernel-livepatch-6_4_0-28-default-9-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:07 -0000 Subject: SUSE-SU-2025:20943-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Message-ID: <176286438753.5085.1919595168398503836@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Announcement ID: SUSE-SU-2025:20943-1 Release Date: 2025-11-05T16:11:42Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_7 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-185=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-9-1.3 * kernel-livepatch-6_4_0-30-rt-9-1.3 * kernel-livepatch-6_4_0-30-rt-debuginfo-9-1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:11 -0000 Subject: SUSE-SU-2025:20942-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Message-ID: <176286439111.5085.7437028714883541907@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Announcement ID: SUSE-SU-2025:20942-1 Release Date: 2025-11-05T16:11:42Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_6 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-184=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-9-3.1 * kernel-livepatch-6_4_0-28-rt-debuginfo-9-3.1 * kernel-livepatch-6_4_0-28-rt-9-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:14 -0000 Subject: SUSE-SU-2025:20941-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_10 Message-ID: <176286439441.5085.9484918824903817325@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_10 Announcement ID: SUSE-SU-2025:20941-1 Release Date: 2025-11-05T16:11:04Z Rating: important References: * bsc#1248631 * bsc#1249207 Cross-References: * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_10 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-189=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-32-default-debuginfo-3-1.1 * kernel-livepatch-6_4_0-32-default-3-1.1 * kernel-livepatch-MICRO-6-0_Update_10-debugsource-3-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:18 -0000 Subject: SUSE-SU-2025:20940-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <176286439804.5085.10416307543064109443@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20940-1 Release Date: 2025-11-05T16:09:50Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-183=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-25-rt-11-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-11-1.1 * kernel-livepatch-6_4_0-25-rt-debuginfo-11-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:23 -0000 Subject: SUSE-SU-2025:20939-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <176286440326.5085.14675798277423969571@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20939-1 Release Date: 2025-11-05T16:03:00Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019) * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631) * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207) * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-182=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-22-rt-12-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-12-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-12-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:28 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:28 -0000 Subject: SUSE-SU-2025:20937-1: important: Security update for libsoup Message-ID: <176286440844.5085.11110595039600172174@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:20937-1 Release Date: 2025-11-04T12:46:12Z Rating: important References: * bsc#1250562 Cross-References: * CVE-2025-11021 CVSS scores: * CVE-2025-11021 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-11021 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-11021 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-11021: Ignore invalid date when processing cookies to prevent out- of-bounds read (bsc#1250562). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-510=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoup-3_0-0-debuginfo-3.4.2-9.1 * libsoup-debugsource-3.4.2-9.1 * libsoup-3_0-0-3.4.2-9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11021.html * https://bugzilla.suse.com/show_bug.cgi?id=1250562 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 12:33:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 12:33:32 -0000 Subject: SUSE-SU-2025:20935-1: moderate: Security update for colord Message-ID: <176286441273.5085.14662368199027138102@smelt2.prg2.suse.org> # Security update for colord Announcement ID: SUSE-SU-2025:20935-1 Release Date: 2025-10-31T16:36:24Z Rating: moderate References: * bsc#1250750 Cross-References: * CVE-2021-42523 CVSS scores: * CVE-2021-42523 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2021-42523 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for colord fixes the following issues: * CVE-2021-42523: Fixed information disclosure in cd-device-db.c and cd- profile-db.c (bsc#1250750). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-508=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcolord2-1.4.6-4.1 * libcolord2-debuginfo-1.4.6-4.1 * colord-debugsource-1.4.6-4.1 ## References: * https://www.suse.com/security/cve/CVE-2021-42523.html * https://bugzilla.suse.com/show_bug.cgi?id=1250750 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 16:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 16:30:04 -0000 Subject: SUSE-SU-2025:4054-1: moderate: Security update for ongres-scram Message-ID: <176287860483.13789.4314652743026119217@smelt2.prg2.suse.org> # Security update for ongres-scram Announcement ID: SUSE-SU-2025:4054-1 Release Date: 2025-11-11T14:04:45Z Rating: moderate References: * bsc#1250399 Cross-References: * CVE-2025-59432 CVSS scores: * CVE-2025-59432 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-59432 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-59432 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ongres-scram fixes the following issues: * CVE-2025-59432: Fixed timing attack vulnerability in SCRAM Authentication (bsc#1250399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4054=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4054=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4054=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4054=1 ## Package List: * openSUSE Leap 15.4 (noarch) * ongres-scram-client-2.1-150400.8.5.1 * ongres-scram-parent-2.1-150400.8.5.1 * ongres-scram-2.1-150400.8.5.1 * ongres-scram-javadoc-2.1-150400.8.5.1 * openSUSE Leap 15.6 (noarch) * ongres-scram-client-2.1-150400.8.5.1 * ongres-scram-parent-2.1-150400.8.5.1 * ongres-scram-2.1-150400.8.5.1 * ongres-scram-javadoc-2.1-150400.8.5.1 * Server Applications Module 15-SP6 (noarch) * ongres-scram-client-2.1-150400.8.5.1 * ongres-scram-2.1-150400.8.5.1 * Server Applications Module 15-SP7 (noarch) * ongres-scram-client-2.1-150400.8.5.1 * ongres-scram-2.1-150400.8.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59432.html * https://bugzilla.suse.com/show_bug.cgi?id=1250399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 16:30:09 -0000 Subject: SUSE-SU-2025:4053-1: moderate: Security update for qatengine, qatlib Message-ID: <176287860929.13789.7949482955635461987@smelt2.prg2.suse.org> # Security update for qatengine, qatlib Announcement ID: SUSE-SU-2025:4053-1 Release Date: 2025-11-11T13:46:59Z Rating: moderate References: * bsc#1233363 * bsc#1233365 * bsc#1233366 Cross-References: * CVE-2024-28885 * CVE-2024-31074 * CVE-2024-33617 CVSS scores: * CVE-2024-28885 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-28885 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28885 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-31074 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-31074 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-33617 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-33617 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for qatengine, qatlib fixes the following issues: Note that the 1.6.1 release included in 1.7.0 fixes the following vulnerabilities: * CVE-2024-28885: Fixed observable discrepancy in some Intel(R) QAT Engine for OpenSSL software before version v1.6.1 may allow information disclosure via network access. (bsc#1233363) * CVE-2024-31074: Fixed observable timing discrepancy may allow information disclosure via network access (bsc#1233365) * CVE-2024-33617: Fixed insufficient control flow management may allow information disclosure via network access (bsc#1233366) qatengine was updated to 1.7.0: * ipp-crypto name change to cryptography-primitives * QAT_SW GCM memory leak fix in cleanup function * Update limitation section in README for v1.7.0 release * Fix build with OPENSSL_NO_ENGINE * Fix for build issues with qatprovider in qatlib * Bug fixes and README updates to v1.7.0 * Remove qat_contig_mem driver support * Add support for building QAT Engine ENGINE and PROVIDER modules with QuicTLS 3.x libraries * Fix for DSA issue with openssl3.2 * Fix missing lower bounds check on index i * Enabled SW Fallback support for FBSD * Fix for segfault issue when SHIM config section is unavailable * Fix for Coverity & Resource leak * Fix for RSA failure with SVM enabled in openssl-3.2 * SM3 Memory Leak Issue Fix * Fix qatprovider lib name issue with system openssl Update to 1.6.0: * Fix issue with make depend for QAT_SW * QAT_HW GCM Memleak fix & bug fixes * QAT2.0 FreeBSD14 intree driver support * Fix OpenSSL 3.2 compatibility issues * Optimize hex dump logging * Clear job tlv on error * QAT_HW RSA Encrypt and Decrypt provider support * QAT_HW AES-CCM Provider support * Add ECDH keymgmt support for provider * Fix QAT_HW SM2 memory leak * Enable qaeMemFreeNonZeroNUMA() for qatlib * Fix polling issue for the process that doesn't have QAT_HW instance * Fix SHA3 qctx initialization issue & potential memleak * Fix compilation error in SM2 with qat_contig_mem * Update year in copyright information to 2024 * update to 24.09.0: * Improved performance scaling in multi-thread applications * Set core affinity mapping based on NUMA (libnuma now required for building) * bug fixes, see https://github.com/intel/qatlib#resolved-issues * version update to 24.02.0 * Support DC NS (NoSession) APIs * Support Symmetric Crypto SM3 & SM4 * Support Asymmetric Crypto SM2 * Support DC CompressBound APIs * Bug Fixes. See Resolved section in README.md ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4053=1 openSUSE-SLE-15.6-2025-4053=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4053=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * qatlib-24.09.0-150600.3.3.1 * qatengine-debuginfo-1.7.0-150600.3.3.1 * libusdm0-debuginfo-24.09.0-150600.3.3.1 * qatlib-debuginfo-24.09.0-150600.3.3.1 * libusdm0-24.09.0-150600.3.3.1 * libqat4-24.09.0-150600.3.3.1 * qatlib-devel-24.09.0-150600.3.3.1 * qatengine-1.7.0-150600.3.3.1 * qatengine-debugsource-1.7.0-150600.3.3.1 * libqat4-debuginfo-24.09.0-150600.3.3.1 * qatlib-debugsource-24.09.0-150600.3.3.1 * Basesystem Module 15-SP6 (x86_64) * qatlib-24.09.0-150600.3.3.1 * qatengine-debuginfo-1.7.0-150600.3.3.1 * libusdm0-debuginfo-24.09.0-150600.3.3.1 * qatlib-debuginfo-24.09.0-150600.3.3.1 * libusdm0-24.09.0-150600.3.3.1 * libqat4-24.09.0-150600.3.3.1 * qatlib-devel-24.09.0-150600.3.3.1 * qatengine-1.7.0-150600.3.3.1 * qatengine-debugsource-1.7.0-150600.3.3.1 * libqat4-debuginfo-24.09.0-150600.3.3.1 * qatlib-debugsource-24.09.0-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28885.html * https://www.suse.com/security/cve/CVE-2024-31074.html * https://www.suse.com/security/cve/CVE-2024-33617.html * https://bugzilla.suse.com/show_bug.cgi?id=1233363 * https://bugzilla.suse.com/show_bug.cgi?id=1233365 * https://bugzilla.suse.com/show_bug.cgi?id=1233366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:30:11 -0000 Subject: SUSE-SU-2025:4062-1: important: Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) Message-ID: <176289301178.19246.6088818084047068882@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2025:4062-1 Release Date: 2025-11-11T18:36:41Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.116 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4062=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4062=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-6-150500.4.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-6-150500.4.1 * kernel-livepatch-5_14_21-150500_55_116-default-6-150500.4.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-6-150500.4.1 * kernel-livepatch-5_14_21-150500_55_116-default-6-150500.4.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-6-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:30:17 -0000 Subject: SUSE-SU-2025:4059-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) Message-ID: <176289301794.19246.13203662565414343245@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2025:4059-1 Release Date: 2025-11-11T18:36:36Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.113 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4059=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4059=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4060=1 SUSE-2025-4061=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4060=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-4061=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_150-default-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-10-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-10-150400.4.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_150-default-10-150400.4.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-10-150400.4.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-10-150400.4.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_26-debugsource-9-150500.4.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-8-150500.4.1 * kernel-livepatch-5_14_21-150500_55_113-default-8-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-8-150500.4.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-9-150500.4.1 * kernel-livepatch-5_14_21-150500_55_103-default-9-150500.4.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_26-debugsource-9-150500.4.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-8-150500.4.1 * kernel-livepatch-5_14_21-150500_55_113-default-8-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-8-150500.4.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-9-150500.4.1 * kernel-livepatch-5_14_21-150500_55_103-default-9-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:30:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:30:22 -0000 Subject: SUSE-SU-2025:4058-1: important: Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) Message-ID: <176289302280.19246.11795474119659526405@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 71 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2025:4058-1 Release Date: 2025-11-11T18:36:18Z Rating: important References: * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2025-38617 * CVE-2025-38618 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.269 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-4058=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_269-default-4-4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:36:37 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:36:37 -0000 Subject: SUSE-SU-2025:4057-1: important: Security update for the Linux Kernel Message-ID: <176289339707.19246.8454384186765277229@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:4057-1 Release Date: 2025-11-11T18:36:12Z Rating: important References: * bsc#1012628 * bsc#1194869 * bsc#1213061 * bsc#1213666 * bsc#1214073 * bsc#1214928 * bsc#1214953 * bsc#1214954 * bsc#1215143 * bsc#1215150 * bsc#1215199 * bsc#1215696 * bsc#1216396 * bsc#1216436 * bsc#1216976 * bsc#1220186 * bsc#1220419 * bsc#1229165 * bsc#1239206 * bsc#1243100 * bsc#1243112 * bsc#1244939 * bsc#1245193 * bsc#1245260 * bsc#1246125 * bsc#1247118 * bsc#1247222 * bsc#1247500 * bsc#1247683 * bsc#1248111 * bsc#1248211 * bsc#1248230 * bsc#1248517 * bsc#1248630 * bsc#1248735 * bsc#1248754 * bsc#1248847 * bsc#1248886 * bsc#1249123 * bsc#1249159 * bsc#1249161 * bsc#1249164 * bsc#1249166 * bsc#1249169 * bsc#1249170 * bsc#1249177 * bsc#1249182 * bsc#1249190 * bsc#1249194 * bsc#1249195 * bsc#1249196 * bsc#1249200 * bsc#1249203 * bsc#1249204 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249224 * bsc#1249254 * bsc#1249255 * bsc#1249257 * bsc#1249260 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249285 * bsc#1249286 * bsc#1249288 * bsc#1249292 * bsc#1249296 * bsc#1249299 * bsc#1249302 * bsc#1249304 * bsc#1249308 * bsc#1249312 * bsc#1249317 * bsc#1249318 * bsc#1249319 * bsc#1249320 * bsc#1249321 * bsc#1249323 * bsc#1249324 * bsc#1249338 * bsc#1249397 * bsc#1249413 * bsc#1249479 * bsc#1249486 * bsc#1249489 * bsc#1249490 * bsc#1249506 * bsc#1249512 * bsc#1249515 * bsc#1249522 * bsc#1249523 * bsc#1249538 * bsc#1249542 * bsc#1249548 * bsc#1249554 * bsc#1249595 * bsc#1249598 * bsc#1249608 * bsc#1249615 * bsc#1249640 * bsc#1249641 * bsc#1249642 * bsc#1249658 * bsc#1249662 * bsc#1249672 * bsc#1249673 * bsc#1249677 * bsc#1249678 * bsc#1249679 * bsc#1249682 * bsc#1249687 * bsc#1249698 * bsc#1249707 * bsc#1249712 * bsc#1249730 * bsc#1249735 * bsc#1249756 * bsc#1249758 * bsc#1249761 * bsc#1249762 * bsc#1249768 * bsc#1249774 * bsc#1249779 * bsc#1249780 * bsc#1249785 * bsc#1249787 * bsc#1249795 * bsc#1249815 * bsc#1249820 * bsc#1249823 * bsc#1249824 * bsc#1249825 * bsc#1249826 * bsc#1249833 * bsc#1249842 * bsc#1249845 * bsc#1249849 * bsc#1249850 * bsc#1249853 * bsc#1249856 * bsc#1249861 * bsc#1249863 * bsc#1249864 * bsc#1249865 * bsc#1249866 * bsc#1249869 * bsc#1249870 * bsc#1249880 * bsc#1249883 * bsc#1249888 * bsc#1249894 * bsc#1249896 * bsc#1249897 * bsc#1249901 * bsc#1249911 * bsc#1249917 * bsc#1249919 * bsc#1249923 * bsc#1249926 * bsc#1249938 * bsc#1249949 * bsc#1249950 * bsc#1249952 * bsc#1249975 * bsc#1249979 * bsc#1249984 * bsc#1249988 * bsc#1249990 * bsc#1249993 * bsc#1249994 * bsc#1249997 * bsc#1250004 * bsc#1250006 * bsc#1250007 * bsc#1250012 * bsc#1250022 * bsc#1250024 * bsc#1250028 * bsc#1250029 * bsc#1250032 * bsc#1250035 * bsc#1250049 * bsc#1250055 * bsc#1250058 * bsc#1250062 * bsc#1250063 * bsc#1250065 * bsc#1250066 * bsc#1250067 * bsc#1250069 * bsc#1250070 * bsc#1250073 * bsc#1250074 * bsc#1250088 * bsc#1250089 * bsc#1250106 * bsc#1250112 * bsc#1250117 * bsc#1250119 * bsc#1250120 * bsc#1250125 * bsc#1250127 * bsc#1250128 * bsc#1250145 * bsc#1250150 * bsc#1250156 * bsc#1250157 * bsc#1250161 * bsc#1250163 * bsc#1250166 * bsc#1250167 * bsc#1250169 * bsc#1250171 * bsc#1250177 * bsc#1250180 * bsc#1250186 * bsc#1250196 * bsc#1250198 * bsc#1250199 * bsc#1250201 * bsc#1250202 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250206 * bsc#1250208 * bsc#1250237 * bsc#1250241 * bsc#1250242 * bsc#1250243 * bsc#1250247 * bsc#1250249 * bsc#1250262 * bsc#1250263 * bsc#1250266 * bsc#1250268 * bsc#1250274 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250290 * bsc#1250291 * bsc#1250292 * bsc#1250296 * bsc#1250297 * bsc#1250298 * bsc#1250313 * bsc#1250319 * bsc#1250323 * bsc#1250325 * bsc#1250329 * bsc#1250337 * bsc#1250358 * bsc#1250371 * bsc#1250377 * bsc#1250379 * bsc#1250384 * bsc#1250389 * bsc#1250395 * bsc#1250397 * bsc#1250400 * bsc#1250402 * bsc#1250406 * bsc#1250426 * bsc#1250450 * bsc#1250455 * bsc#1250459 * bsc#1250491 * bsc#1250519 * bsc#1250650 * bsc#1250702 * bsc#1250704 * bsc#1250712 * bsc#1250713 * bsc#1250721 * bsc#1250732 * bsc#1250736 * bsc#1250741 * bsc#1250742 * bsc#1250758 * bsc#1250759 * bsc#1250763 * bsc#1250765 * bsc#1250807 * bsc#1250808 * bsc#1250809 * bsc#1250812 * bsc#1250813 * bsc#1250815 * bsc#1250816 * bsc#1250820 * bsc#1250823 * bsc#1250825 * bsc#1250827 * bsc#1250830 * bsc#1250831 * bsc#1250837 * bsc#1250841 * bsc#1250861 * bsc#1250863 * bsc#1250867 * bsc#1250872 * bsc#1250873 * bsc#1250878 * bsc#1250905 * bsc#1250907 * bsc#1250917 * bsc#1250918 * bsc#1250923 * bsc#1250926 * bsc#1250928 * bsc#1250929 * bsc#1250930 * bsc#1250931 * bsc#1250941 * bsc#1250942 * bsc#1250946 * bsc#1250949 * bsc#1250957 * bsc#1250964 * bsc#1251024 * bsc#1251027 * bsc#1251028 * bsc#1251031 * bsc#1251035 * bsc#1251038 * bsc#1251043 * bsc#1251045 * bsc#1251052 * bsc#1251053 * bsc#1251054 * bsc#1251056 * bsc#1251057 * bsc#1251059 * bsc#1251060 * bsc#1251065 * bsc#1251066 * bsc#1251067 * bsc#1251068 * bsc#1251071 * bsc#1251076 * bsc#1251079 * bsc#1251081 * bsc#1251083 * bsc#1251084 * bsc#1251100 * bsc#1251105 * bsc#1251106 * bsc#1251108 * bsc#1251113 * bsc#1251114 * bsc#1251119 * bsc#1251123 * bsc#1251126 * bsc#1251132 * bsc#1251134 * bsc#1251143 * bsc#1251146 * bsc#1251150 * bsc#1251152 * bsc#1251153 * bsc#1251159 * bsc#1251161 * bsc#1251170 * bsc#1251177 * bsc#1251180 * bsc#1251206 * bsc#1251215 * bsc#1251216 * bsc#1251222 * bsc#1251230 * bsc#1251232 * bsc#1251233 * bsc#1251247 * bsc#1251268 * bsc#1251269 * bsc#1251270 * bsc#1251282 * bsc#1251283 * bsc#1251286 * bsc#1251290 * bsc#1251319 * bsc#1251321 * bsc#1251323 * bsc#1251328 * bsc#1251529 * bsc#1251721 * bsc#1251732 * bsc#1251742 * bsc#1251743 * bsc#1251746 * bsc#1251748 * bsc#1251749 * bsc#1251750 * bsc#1251754 * bsc#1251755 * bsc#1251756 * bsc#1251758 * bsc#1251759 * bsc#1251760 * bsc#1251762 * bsc#1251763 * bsc#1251764 * bsc#1251769 * bsc#1251771 * bsc#1251772 * bsc#1251777 * bsc#1251780 * bsc#1251804 * bsc#1251810 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252039 * bsc#1252044 * bsc#1252047 * bsc#1252051 * bsc#1252052 * bsc#1252056 * bsc#1252060 * bsc#1252062 * bsc#1252064 * bsc#1252065 * bsc#1252069 * bsc#1252070 * bsc#1252072 * bsc#1252074 * bsc#1252075 * bsc#1252078 * bsc#1252079 * bsc#1252081 * bsc#1252082 * bsc#1252083 * bsc#1252236 * bsc#1252253 * bsc#1252265 * bsc#1252330 * bsc#1252332 * bsc#1252336 * bsc#1252346 * bsc#1252348 * bsc#1252349 * bsc#1252364 * bsc#1252469 * bsc#1252479 * bsc#1252481 * bsc#1252489 * bsc#1252490 * bsc#1252492 * bsc#1252495 * bsc#1252496 * bsc#1252499 * bsc#1252534 * bsc#1252536 * bsc#1252537 * bsc#1252550 * bsc#1252553 * bsc#1252559 * bsc#1252561 * bsc#1252564 * bsc#1252565 * bsc#1252566 * bsc#1252632 * bsc#1252668 * bsc#1252678 * bsc#1252679 * bsc#1252685 * bsc#1252688 * bsc#1252734 * bsc#1252735 * bsc#1252772 * bsc#1252775 * bsc#1252785 * bsc#1252787 * bsc#1252789 * bsc#1252797 * bsc#1252819 * bsc#1252822 * bsc#1252826 * bsc#1252841 * bsc#1252848 * bsc#1252849 * bsc#1252850 * bsc#1252851 * bsc#1252854 * bsc#1252858 * bsc#1252865 * bsc#1252866 * bsc#1252873 * bsc#1252902 * bsc#1252904 * bsc#1252909 * bsc#1252915 * bsc#1252918 * bsc#1252921 * bsc#1252939 * jsc#PED-13815 * jsc#PED-3527 * jsc#PED-4593 * jsc#PED-4876 * jsc#PED-5063 * jsc#PED-5065 * jsc#PED-5475 * jsc#PED-5477 * jsc#PED-5511 * jsc#PED-5853 * jsc#PED-6012 * jsc#PED-6041 * jsc#PED-6054 * jsc#PED-6068 * jsc#PED-6069 * jsc#PED-6070 * jsc#PED-6071 * jsc#PED-6116 * jsc#PED-6120 * jsc#PED-6121 * jsc#PED-6811 * jsc#PED-7542 * jsc#PED-9891 Cross-References: * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-42753 * CVE-2023-53147 * CVE-2023-53148 * CVE-2023-53150 * CVE-2023-53151 * CVE-2023-53152 * CVE-2023-53165 * CVE-2023-53167 * CVE-2023-53170 * CVE-2023-53174 * CVE-2023-53175 * CVE-2023-53177 * CVE-2023-53179 * CVE-2023-53180 * CVE-2023-53181 * CVE-2023-53183 * CVE-2023-53184 * CVE-2023-53185 * CVE-2023-53187 * CVE-2023-53189 * CVE-2023-53192 * CVE-2023-53195 * CVE-2023-53196 * CVE-2023-53201 * CVE-2023-53204 * CVE-2023-53205 * CVE-2023-53206 * CVE-2023-53207 * CVE-2023-53208 * CVE-2023-53209 * CVE-2023-53210 * CVE-2023-53215 * CVE-2023-53217 * CVE-2023-53220 * CVE-2023-53221 * CVE-2023-53222 * CVE-2023-53226 * CVE-2023-53230 * CVE-2023-53231 * CVE-2023-53235 * CVE-2023-53238 * CVE-2023-53243 * CVE-2023-53245 * CVE-2023-53247 * CVE-2023-53248 * CVE-2023-53249 * CVE-2023-53251 * CVE-2023-53252 * CVE-2023-53255 * CVE-2023-53257 * CVE-2023-53258 * CVE-2023-53260 * CVE-2023-53263 * CVE-2023-53264 * CVE-2023-53272 * CVE-2023-53274 * CVE-2023-53275 * CVE-2023-53280 * CVE-2023-53286 * CVE-2023-53287 * CVE-2023-53288 * CVE-2023-53291 * CVE-2023-53292 * CVE-2023-53303 * CVE-2023-53304 * CVE-2023-53305 * CVE-2023-53309 * CVE-2023-53311 * CVE-2023-53312 * CVE-2023-53313 * CVE-2023-53314 * CVE-2023-53316 * CVE-2023-53319 * CVE-2023-53321 * CVE-2023-53322 * CVE-2023-53323 * CVE-2023-53324 * CVE-2023-53325 * CVE-2023-53328 * CVE-2023-53331 * CVE-2023-53333 * CVE-2023-53336 * CVE-2023-53338 * CVE-2023-53339 * CVE-2023-53342 * CVE-2023-53343 * CVE-2023-53350 * CVE-2023-53352 * CVE-2023-53354 * CVE-2023-53356 * CVE-2023-53357 * CVE-2023-53360 * CVE-2023-53362 * CVE-2023-53364 * CVE-2023-53365 * CVE-2023-53367 * CVE-2023-53368 * CVE-2023-53369 * CVE-2023-53370 * CVE-2023-53371 * CVE-2023-53374 * CVE-2023-53377 * CVE-2023-53379 * CVE-2023-53380 * CVE-2023-53384 * CVE-2023-53385 * CVE-2023-53386 * CVE-2023-53391 * CVE-2023-53394 * CVE-2023-53395 * CVE-2023-53397 * CVE-2023-53401 * CVE-2023-53420 * CVE-2023-53421 * CVE-2023-53424 * CVE-2023-53425 * CVE-2023-53426 * CVE-2023-53428 * CVE-2023-53429 * CVE-2023-53432 * CVE-2023-53436 * CVE-2023-53438 * CVE-2023-53441 * CVE-2023-53442 * CVE-2023-53444 * CVE-2023-53446 * CVE-2023-53447 * CVE-2023-53448 * CVE-2023-53451 * CVE-2023-53454 * CVE-2023-53456 * CVE-2023-53457 * CVE-2023-53461 * CVE-2023-53462 * CVE-2023-53463 * CVE-2023-53465 * CVE-2023-53472 * CVE-2023-53479 * CVE-2023-53480 * CVE-2023-53485 * CVE-2023-53487 * CVE-2023-53488 * CVE-2023-53490 * CVE-2023-53491 * CVE-2023-53492 * CVE-2023-53493 * CVE-2023-53495 * CVE-2023-53496 * CVE-2023-53500 * CVE-2023-53501 * CVE-2023-53504 * CVE-2023-53505 * CVE-2023-53507 * CVE-2023-53508 * CVE-2023-53510 * CVE-2023-53515 * CVE-2023-53516 * CVE-2023-53518 * CVE-2023-53519 * CVE-2023-53520 * CVE-2023-53523 * CVE-2023-53526 * CVE-2023-53527 * CVE-2023-53528 * CVE-2023-53530 * CVE-2023-53531 * CVE-2023-53538 * CVE-2023-53539 * CVE-2023-53540 * CVE-2023-53541 * CVE-2023-53543 * CVE-2023-53545 * CVE-2023-53546 * CVE-2023-53548 * CVE-2023-53550 * CVE-2023-53552 * CVE-2023-53553 * CVE-2023-53554 * CVE-2023-53555 * CVE-2023-53556 * CVE-2023-53557 * CVE-2023-53558 * CVE-2023-53559 * CVE-2023-53560 * CVE-2023-53563 * CVE-2023-53568 * CVE-2023-53570 * CVE-2023-53572 * CVE-2023-53574 * CVE-2023-53575 * CVE-2023-53577 * CVE-2023-53579 * CVE-2023-53580 * CVE-2023-53581 * CVE-2023-53583 * CVE-2023-53585 * CVE-2023-53588 * CVE-2023-53593 * CVE-2023-53596 * CVE-2023-53597 * CVE-2023-53599 * CVE-2023-53600 * CVE-2023-53601 * CVE-2023-53602 * CVE-2023-53603 * CVE-2023-53611 * CVE-2023-53613 * CVE-2023-53615 * CVE-2023-53616 * CVE-2023-53617 * CVE-2023-53618 * CVE-2023-53619 * CVE-2023-53621 * CVE-2023-53622 * CVE-2023-53631 * CVE-2023-53632 * CVE-2023-53633 * CVE-2023-53638 * CVE-2023-53645 * CVE-2023-53646 * CVE-2023-53647 * CVE-2023-53648 * CVE-2023-53649 * CVE-2023-53650 * CVE-2023-53652 * CVE-2023-53653 * CVE-2023-53654 * CVE-2023-53656 * CVE-2023-53657 * CVE-2023-53658 * CVE-2023-53659 * CVE-2023-53660 * CVE-2023-53662 * CVE-2023-53663 * CVE-2023-53665 * CVE-2023-53666 * CVE-2023-53668 * CVE-2023-53670 * CVE-2023-53672 * CVE-2023-53673 * CVE-2023-53674 * CVE-2023-53681 * CVE-2023-53686 * CVE-2023-53687 * CVE-2023-53693 * CVE-2023-53697 * CVE-2023-53698 * CVE-2023-53699 * CVE-2023-53703 * CVE-2023-53704 * CVE-2023-53707 * CVE-2023-53708 * CVE-2023-53711 * CVE-2023-53713 * CVE-2023-53718 * CVE-2023-53721 * CVE-2023-53722 * CVE-2023-53725 * CVE-2023-53726 * CVE-2023-53727 * CVE-2023-53728 * CVE-2023-53729 * CVE-2023-53730 * CVE-2023-53731 * CVE-2023-53733 * CVE-2024-26584 * CVE-2024-58240 * CVE-2025-38008 * CVE-2025-38465 * CVE-2025-38539 * CVE-2025-38552 * CVE-2025-38653 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38685 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38697 * CVE-2025-38698 * CVE-2025-38699 * CVE-2025-38700 * CVE-2025-38702 * CVE-2025-38706 * CVE-2025-38712 * CVE-2025-38713 * CVE-2025-38714 * CVE-2025-38715 * CVE-2025-38718 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39673 * CVE-2025-39675 * CVE-2025-39676 * CVE-2025-39679 * CVE-2025-39683 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39697 * CVE-2025-39701 * CVE-2025-39702 * CVE-2025-39706 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39743 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39756 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39772 * CVE-2025-39783 * CVE-2025-39790 * CVE-2025-39794 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39812 * CVE-2025-39813 * CVE-2025-39824 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39839 * CVE-2025-39841 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39846 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39851 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39866 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39876 * CVE-2025-39881 * CVE-2025-39882 * CVE-2025-39889 * CVE-2025-39891 * CVE-2025-39895 * CVE-2025-39898 * CVE-2025-39900 * CVE-2025-39902 * CVE-2025-39907 * CVE-2025-39911 * CVE-2025-39920 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-39931 * CVE-2025-39934 * CVE-2025-39937 * CVE-2025-39938 * CVE-2025-39945 * CVE-2025-39946 * CVE-2025-39947 * CVE-2025-39948 * CVE-2025-39949 * CVE-2025-39952 * CVE-2025-39955 * CVE-2025-39957 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39969 * CVE-2025-39970 * CVE-2025-39971 * CVE-2025-39972 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-39981 * CVE-2025-39982 * CVE-2025-39984 * CVE-2025-39985 * CVE-2025-39986 * CVE-2025-39987 * CVE-2025-39988 * CVE-2025-39991 * CVE-2025-39993 * CVE-2025-39994 * CVE-2025-39995 * CVE-2025-39996 * CVE-2025-39997 * CVE-2025-40000 * CVE-2025-40005 * CVE-2025-40010 * CVE-2025-40011 * CVE-2025-40012 * CVE-2025-40013 * CVE-2025-40016 * CVE-2025-40018 * CVE-2025-40019 * CVE-2025-40020 * CVE-2025-40029 * CVE-2025-40032 * CVE-2025-40035 * CVE-2025-40036 * CVE-2025-40037 * CVE-2025-40043 * CVE-2025-40044 * CVE-2025-40049 * CVE-2025-40051 * CVE-2025-40052 * CVE-2025-40056 * CVE-2025-40058 * CVE-2025-40060 * CVE-2025-40061 * CVE-2025-40062 * CVE-2025-40071 * CVE-2025-40078 * CVE-2025-40082 * CVE-2025-40085 * CVE-2025-40087 * CVE-2025-40088 * CVE-2025-40091 * CVE-2025-40096 * CVE-2025-40100 * CVE-2025-40104 CVSS scores: * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53148 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53150 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53183 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53195 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53196 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53209 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53209 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53215 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53215 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53222 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53243 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53243 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53247 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53249 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53255 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53255 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53257 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53257 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53260 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53263 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53263 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53264 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53264 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53272 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53272 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53274 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53280 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53280 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53292 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53292 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53311 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53311 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53314 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53316 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53316 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53323 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53324 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53324 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53336 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53338 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53338 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53339 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53357 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53385 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53425 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53432 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53442 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53442 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53454 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53454 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53461 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53462 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53462 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53480 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53485 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53485 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53491 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53491 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53496 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53507 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53507 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53508 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53508 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53510 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53510 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53515 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53515 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53518 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53518 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53519 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53519 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53520 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53520 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53523 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53523 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53526 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53527 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53527 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53528 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53531 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53531 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53539 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53539 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53540 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53540 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53541 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53545 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53558 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53563 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53575 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53575 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53580 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53581 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53581 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53583 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53583 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53585 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53585 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53588 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53602 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53616 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53616 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53618 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53619 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53622 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53622 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53633 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53633 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53649 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53650 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53654 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53654 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53656 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53656 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53657 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53659 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53662 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53663 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53665 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53665 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53668 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53670 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53670 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53672 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53673 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53674 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53674 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53681 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53681 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53686 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53687 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53687 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53697 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53697 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53698 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53698 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53699 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53699 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53703 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53703 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53704 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53704 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53708 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53711 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53711 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53713 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53713 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53718 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53718 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53721 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53721 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53722 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53725 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53725 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53728 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53728 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53729 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53729 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53730 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53731 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53731 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53733 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53733 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38653 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38653 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38697 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38698 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38698 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38699 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38714 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38714 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39743 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39743 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39794 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39866 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39866 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39947 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39947 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39948 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39948 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39949 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39949 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39955 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39955 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39969 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39970 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39970 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39971 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39971 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39972 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39972 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39981 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40005 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40012 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40012 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40016 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40016 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40020 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40032 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40032 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40037 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40043 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40043 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40049 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40049 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40056 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40056 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40085 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40088 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40088 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40091 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40096 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40104 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40104 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves 462 vulnerabilities, contains 23 features and has 45 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4057=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4057=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-4057=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-4057=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-4057=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-4057=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * Basesystem Module 15-SP7 (aarch64 nosrc) * kernel-64kb-6.4.0-150700.53.22.1 * Basesystem Module 15-SP7 (aarch64) * kernel-64kb-debuginfo-6.4.0-150700.53.22.1 * kernel-64kb-devel-6.4.0-150700.53.22.1 * kernel-64kb-devel-debuginfo-6.4.0-150700.53.22.1 * kernel-64kb-debugsource-6.4.0-150700.53.22.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150700.53.22.1 * Basesystem Module 15-SP7 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150700.53.22.1.150700.17.15.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150700.53.22.1 * kernel-default-debugsource-6.4.0-150700.53.22.1 * kernel-default-devel-debuginfo-6.4.0-150700.53.22.1 * kernel-default-devel-6.4.0-150700.53.22.1 * Basesystem Module 15-SP7 (noarch) * kernel-macros-6.4.0-150700.53.22.1 * kernel-devel-6.4.0-150700.53.22.1 * Basesystem Module 15-SP7 (nosrc s390x) * kernel-zfcpdump-6.4.0-150700.53.22.1 * Basesystem Module 15-SP7 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150700.53.22.1 * kernel-zfcpdump-debugsource-6.4.0-150700.53.22.1 * Development Tools Module 15-SP7 (noarch nosrc) * kernel-docs-6.4.0-150700.53.22.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-6.4.0-150700.53.22.1 * kernel-syms-6.4.0-150700.53.22.1 * kernel-obs-build-6.4.0-150700.53.22.1 * Development Tools Module 15-SP7 (noarch) * kernel-source-6.4.0-150700.53.22.1 * Legacy Module 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.22.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150700.53.22.1 * kernel-default-debugsource-6.4.0-150700.53.22.1 * reiserfs-kmp-default-debuginfo-6.4.0-150700.53.22.1 * reiserfs-kmp-default-6.4.0-150700.53.22.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150700.53.22.1 * kernel-default-debugsource-6.4.0-150700.53.22.1 * gfs2-kmp-default-debuginfo-6.4.0-150700.53.22.1 * dlm-kmp-default-6.4.0-150700.53.22.1 * cluster-md-kmp-default-6.4.0-150700.53.22.1 * dlm-kmp-default-debuginfo-6.4.0-150700.53.22.1 * ocfs2-kmp-default-debuginfo-6.4.0-150700.53.22.1 * ocfs2-kmp-default-6.4.0-150700.53.22.1 * cluster-md-kmp-default-debuginfo-6.4.0-150700.53.22.1 * gfs2-kmp-default-6.4.0-150700.53.22.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.22.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.22.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * kernel-default-debuginfo-6.4.0-150700.53.22.1 * kernel-default-debugsource-6.4.0-150700.53.22.1 * kernel-default-extra-6.4.0-150700.53.22.1 * kernel-default-extra-debuginfo-6.4.0-150700.53.22.1 * SUSE Linux Enterprise Live Patching 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.22.1 * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150700.53.22.1 * kernel-default-debugsource-6.4.0-150700.53.22.1 * kernel-default-livepatch-devel-6.4.0-150700.53.22.1 * kernel-livepatch-SLE15-SP7_Update_6-debugsource-1-150700.15.3.1 * kernel-livepatch-6_4_0-150700_53_22-default-1-150700.15.3.1 * kernel-livepatch-6_4_0-150700_53_22-default-debuginfo-1-150700.15.3.1 * kernel-default-livepatch-6.4.0-150700.53.22.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53148.html * https://www.suse.com/security/cve/CVE-2023-53150.html * https://www.suse.com/security/cve/CVE-2023-53151.html * https://www.suse.com/security/cve/CVE-2023-53152.html * https://www.suse.com/security/cve/CVE-2023-53165.html * https://www.suse.com/security/cve/CVE-2023-53167.html * https://www.suse.com/security/cve/CVE-2023-53170.html * https://www.suse.com/security/cve/CVE-2023-53174.html * https://www.suse.com/security/cve/CVE-2023-53175.html * https://www.suse.com/security/cve/CVE-2023-53177.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53180.html * https://www.suse.com/security/cve/CVE-2023-53181.html * https://www.suse.com/security/cve/CVE-2023-53183.html * https://www.suse.com/security/cve/CVE-2023-53184.html * https://www.suse.com/security/cve/CVE-2023-53185.html * https://www.suse.com/security/cve/CVE-2023-53187.html * https://www.suse.com/security/cve/CVE-2023-53189.html * https://www.suse.com/security/cve/CVE-2023-53192.html * https://www.suse.com/security/cve/CVE-2023-53195.html * https://www.suse.com/security/cve/CVE-2023-53196.html * https://www.suse.com/security/cve/CVE-2023-53201.html * https://www.suse.com/security/cve/CVE-2023-53204.html * https://www.suse.com/security/cve/CVE-2023-53205.html * https://www.suse.com/security/cve/CVE-2023-53206.html * https://www.suse.com/security/cve/CVE-2023-53207.html * https://www.suse.com/security/cve/CVE-2023-53208.html * https://www.suse.com/security/cve/CVE-2023-53209.html * https://www.suse.com/security/cve/CVE-2023-53210.html * https://www.suse.com/security/cve/CVE-2023-53215.html * https://www.suse.com/security/cve/CVE-2023-53217.html * https://www.suse.com/security/cve/CVE-2023-53220.html * https://www.suse.com/security/cve/CVE-2023-53221.html * https://www.suse.com/security/cve/CVE-2023-53222.html * https://www.suse.com/security/cve/CVE-2023-53226.html * https://www.suse.com/security/cve/CVE-2023-53230.html * https://www.suse.com/security/cve/CVE-2023-53231.html * https://www.suse.com/security/cve/CVE-2023-53235.html * https://www.suse.com/security/cve/CVE-2023-53238.html * https://www.suse.com/security/cve/CVE-2023-53243.html * https://www.suse.com/security/cve/CVE-2023-53245.html * https://www.suse.com/security/cve/CVE-2023-53247.html * https://www.suse.com/security/cve/CVE-2023-53248.html * https://www.suse.com/security/cve/CVE-2023-53249.html * https://www.suse.com/security/cve/CVE-2023-53251.html * https://www.suse.com/security/cve/CVE-2023-53252.html * https://www.suse.com/security/cve/CVE-2023-53255.html * https://www.suse.com/security/cve/CVE-2023-53257.html * https://www.suse.com/security/cve/CVE-2023-53258.html * https://www.suse.com/security/cve/CVE-2023-53260.html * https://www.suse.com/security/cve/CVE-2023-53263.html * https://www.suse.com/security/cve/CVE-2023-53264.html * https://www.suse.com/security/cve/CVE-2023-53272.html * https://www.suse.com/security/cve/CVE-2023-53274.html * https://www.suse.com/security/cve/CVE-2023-53275.html * https://www.suse.com/security/cve/CVE-2023-53280.html * https://www.suse.com/security/cve/CVE-2023-53286.html * https://www.suse.com/security/cve/CVE-2023-53287.html * https://www.suse.com/security/cve/CVE-2023-53288.html * https://www.suse.com/security/cve/CVE-2023-53291.html * https://www.suse.com/security/cve/CVE-2023-53292.html * https://www.suse.com/security/cve/CVE-2023-53303.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53305.html * https://www.suse.com/security/cve/CVE-2023-53309.html * https://www.suse.com/security/cve/CVE-2023-53311.html * https://www.suse.com/security/cve/CVE-2023-53312.html * https://www.suse.com/security/cve/CVE-2023-53313.html * https://www.suse.com/security/cve/CVE-2023-53314.html * https://www.suse.com/security/cve/CVE-2023-53316.html * https://www.suse.com/security/cve/CVE-2023-53319.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53323.html * https://www.suse.com/security/cve/CVE-2023-53324.html * https://www.suse.com/security/cve/CVE-2023-53325.html * https://www.suse.com/security/cve/CVE-2023-53328.html * https://www.suse.com/security/cve/CVE-2023-53331.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53336.html * https://www.suse.com/security/cve/CVE-2023-53338.html * https://www.suse.com/security/cve/CVE-2023-53339.html * https://www.suse.com/security/cve/CVE-2023-53342.html * https://www.suse.com/security/cve/CVE-2023-53343.html * https://www.suse.com/security/cve/CVE-2023-53350.html * https://www.suse.com/security/cve/CVE-2023-53352.html * https://www.suse.com/security/cve/CVE-2023-53354.html * https://www.suse.com/security/cve/CVE-2023-53356.html * https://www.suse.com/security/cve/CVE-2023-53357.html * https://www.suse.com/security/cve/CVE-2023-53360.html * https://www.suse.com/security/cve/CVE-2023-53362.html * https://www.suse.com/security/cve/CVE-2023-53364.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53367.html * https://www.suse.com/security/cve/CVE-2023-53368.html * https://www.suse.com/security/cve/CVE-2023-53369.html * https://www.suse.com/security/cve/CVE-2023-53370.html * https://www.suse.com/security/cve/CVE-2023-53371.html * https://www.suse.com/security/cve/CVE-2023-53374.html * https://www.suse.com/security/cve/CVE-2023-53377.html * https://www.suse.com/security/cve/CVE-2023-53379.html * https://www.suse.com/security/cve/CVE-2023-53380.html * https://www.suse.com/security/cve/CVE-2023-53384.html * https://www.suse.com/security/cve/CVE-2023-53385.html * https://www.suse.com/security/cve/CVE-2023-53386.html * https://www.suse.com/security/cve/CVE-2023-53391.html * https://www.suse.com/security/cve/CVE-2023-53394.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53397.html * https://www.suse.com/security/cve/CVE-2023-53401.html * https://www.suse.com/security/cve/CVE-2023-53420.html * https://www.suse.com/security/cve/CVE-2023-53421.html * https://www.suse.com/security/cve/CVE-2023-53424.html * https://www.suse.com/security/cve/CVE-2023-53425.html * https://www.suse.com/security/cve/CVE-2023-53426.html * https://www.suse.com/security/cve/CVE-2023-53428.html * https://www.suse.com/security/cve/CVE-2023-53429.html * https://www.suse.com/security/cve/CVE-2023-53432.html * https://www.suse.com/security/cve/CVE-2023-53436.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53441.html * https://www.suse.com/security/cve/CVE-2023-53442.html * https://www.suse.com/security/cve/CVE-2023-53444.html * https://www.suse.com/security/cve/CVE-2023-53446.html * https://www.suse.com/security/cve/CVE-2023-53447.html * https://www.suse.com/security/cve/CVE-2023-53448.html * https://www.suse.com/security/cve/CVE-2023-53451.html * https://www.suse.com/security/cve/CVE-2023-53454.html * https://www.suse.com/security/cve/CVE-2023-53456.html * https://www.suse.com/security/cve/CVE-2023-53457.html * https://www.suse.com/security/cve/CVE-2023-53461.html * https://www.suse.com/security/cve/CVE-2023-53462.html * https://www.suse.com/security/cve/CVE-2023-53463.html * https://www.suse.com/security/cve/CVE-2023-53465.html * https://www.suse.com/security/cve/CVE-2023-53472.html * https://www.suse.com/security/cve/CVE-2023-53479.html * https://www.suse.com/security/cve/CVE-2023-53480.html * https://www.suse.com/security/cve/CVE-2023-53485.html * https://www.suse.com/security/cve/CVE-2023-53487.html * https://www.suse.com/security/cve/CVE-2023-53488.html * https://www.suse.com/security/cve/CVE-2023-53490.html * https://www.suse.com/security/cve/CVE-2023-53491.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2023-53493.html * https://www.suse.com/security/cve/CVE-2023-53495.html * https://www.suse.com/security/cve/CVE-2023-53496.html * https://www.suse.com/security/cve/CVE-2023-53500.html * https://www.suse.com/security/cve/CVE-2023-53501.html * https://www.suse.com/security/cve/CVE-2023-53504.html * https://www.suse.com/security/cve/CVE-2023-53505.html * https://www.suse.com/security/cve/CVE-2023-53507.html * https://www.suse.com/security/cve/CVE-2023-53508.html * https://www.suse.com/security/cve/CVE-2023-53510.html * https://www.suse.com/security/cve/CVE-2023-53515.html * https://www.suse.com/security/cve/CVE-2023-53516.html * https://www.suse.com/security/cve/CVE-2023-53518.html * https://www.suse.com/security/cve/CVE-2023-53519.html * https://www.suse.com/security/cve/CVE-2023-53520.html * https://www.suse.com/security/cve/CVE-2023-53523.html * https://www.suse.com/security/cve/CVE-2023-53526.html * https://www.suse.com/security/cve/CVE-2023-53527.html * https://www.suse.com/security/cve/CVE-2023-53528.html * https://www.suse.com/security/cve/CVE-2023-53530.html * https://www.suse.com/security/cve/CVE-2023-53531.html * https://www.suse.com/security/cve/CVE-2023-53538.html * https://www.suse.com/security/cve/CVE-2023-53539.html * https://www.suse.com/security/cve/CVE-2023-53540.html * https://www.suse.com/security/cve/CVE-2023-53541.html * https://www.suse.com/security/cve/CVE-2023-53543.html * https://www.suse.com/security/cve/CVE-2023-53545.html * https://www.suse.com/security/cve/CVE-2023-53546.html * https://www.suse.com/security/cve/CVE-2023-53548.html * https://www.suse.com/security/cve/CVE-2023-53550.html * https://www.suse.com/security/cve/CVE-2023-53552.html * https://www.suse.com/security/cve/CVE-2023-53553.html * https://www.suse.com/security/cve/CVE-2023-53554.html * https://www.suse.com/security/cve/CVE-2023-53555.html * https://www.suse.com/security/cve/CVE-2023-53556.html * https://www.suse.com/security/cve/CVE-2023-53557.html * https://www.suse.com/security/cve/CVE-2023-53558.html * https://www.suse.com/security/cve/CVE-2023-53559.html * https://www.suse.com/security/cve/CVE-2023-53560.html * https://www.suse.com/security/cve/CVE-2023-53563.html * https://www.suse.com/security/cve/CVE-2023-53568.html * https://www.suse.com/security/cve/CVE-2023-53570.html * https://www.suse.com/security/cve/CVE-2023-53572.html * https://www.suse.com/security/cve/CVE-2023-53574.html * https://www.suse.com/security/cve/CVE-2023-53575.html * https://www.suse.com/security/cve/CVE-2023-53577.html * https://www.suse.com/security/cve/CVE-2023-53579.html * https://www.suse.com/security/cve/CVE-2023-53580.html * https://www.suse.com/security/cve/CVE-2023-53581.html * https://www.suse.com/security/cve/CVE-2023-53583.html * https://www.suse.com/security/cve/CVE-2023-53585.html * https://www.suse.com/security/cve/CVE-2023-53588.html * https://www.suse.com/security/cve/CVE-2023-53593.html * https://www.suse.com/security/cve/CVE-2023-53596.html * https://www.suse.com/security/cve/CVE-2023-53597.html * https://www.suse.com/security/cve/CVE-2023-53599.html * https://www.suse.com/security/cve/CVE-2023-53600.html * https://www.suse.com/security/cve/CVE-2023-53601.html * https://www.suse.com/security/cve/CVE-2023-53602.html * https://www.suse.com/security/cve/CVE-2023-53603.html * https://www.suse.com/security/cve/CVE-2023-53611.html * https://www.suse.com/security/cve/CVE-2023-53613.html * https://www.suse.com/security/cve/CVE-2023-53615.html * https://www.suse.com/security/cve/CVE-2023-53616.html * https://www.suse.com/security/cve/CVE-2023-53617.html * https://www.suse.com/security/cve/CVE-2023-53618.html * https://www.suse.com/security/cve/CVE-2023-53619.html * https://www.suse.com/security/cve/CVE-2023-53621.html * https://www.suse.com/security/cve/CVE-2023-53622.html * https://www.suse.com/security/cve/CVE-2023-53631.html * https://www.suse.com/security/cve/CVE-2023-53632.html * https://www.suse.com/security/cve/CVE-2023-53633.html * https://www.suse.com/security/cve/CVE-2023-53638.html * https://www.suse.com/security/cve/CVE-2023-53645.html * https://www.suse.com/security/cve/CVE-2023-53646.html * https://www.suse.com/security/cve/CVE-2023-53647.html * https://www.suse.com/security/cve/CVE-2023-53648.html * https://www.suse.com/security/cve/CVE-2023-53649.html * https://www.suse.com/security/cve/CVE-2023-53650.html * https://www.suse.com/security/cve/CVE-2023-53652.html * https://www.suse.com/security/cve/CVE-2023-53653.html * https://www.suse.com/security/cve/CVE-2023-53654.html * https://www.suse.com/security/cve/CVE-2023-53656.html * https://www.suse.com/security/cve/CVE-2023-53657.html * https://www.suse.com/security/cve/CVE-2023-53658.html * https://www.suse.com/security/cve/CVE-2023-53659.html * https://www.suse.com/security/cve/CVE-2023-53660.html * https://www.suse.com/security/cve/CVE-2023-53662.html * https://www.suse.com/security/cve/CVE-2023-53663.html * https://www.suse.com/security/cve/CVE-2023-53665.html * https://www.suse.com/security/cve/CVE-2023-53666.html * https://www.suse.com/security/cve/CVE-2023-53668.html * https://www.suse.com/security/cve/CVE-2023-53670.html * https://www.suse.com/security/cve/CVE-2023-53672.html * https://www.suse.com/security/cve/CVE-2023-53673.html * https://www.suse.com/security/cve/CVE-2023-53674.html * https://www.suse.com/security/cve/CVE-2023-53681.html * https://www.suse.com/security/cve/CVE-2023-53686.html * https://www.suse.com/security/cve/CVE-2023-53687.html * https://www.suse.com/security/cve/CVE-2023-53693.html * https://www.suse.com/security/cve/CVE-2023-53697.html * https://www.suse.com/security/cve/CVE-2023-53698.html * https://www.suse.com/security/cve/CVE-2023-53699.html * https://www.suse.com/security/cve/CVE-2023-53703.html * https://www.suse.com/security/cve/CVE-2023-53704.html * https://www.suse.com/security/cve/CVE-2023-53707.html * https://www.suse.com/security/cve/CVE-2023-53708.html * https://www.suse.com/security/cve/CVE-2023-53711.html * https://www.suse.com/security/cve/CVE-2023-53713.html * https://www.suse.com/security/cve/CVE-2023-53718.html * https://www.suse.com/security/cve/CVE-2023-53721.html * https://www.suse.com/security/cve/CVE-2023-53722.html * https://www.suse.com/security/cve/CVE-2023-53725.html * https://www.suse.com/security/cve/CVE-2023-53726.html * https://www.suse.com/security/cve/CVE-2023-53727.html * https://www.suse.com/security/cve/CVE-2023-53728.html * https://www.suse.com/security/cve/CVE-2023-53729.html * https://www.suse.com/security/cve/CVE-2023-53730.html * https://www.suse.com/security/cve/CVE-2023-53731.html * https://www.suse.com/security/cve/CVE-2023-53733.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-38008.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38552.html * https://www.suse.com/security/cve/CVE-2025-38653.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38697.html * https://www.suse.com/security/cve/CVE-2025-38698.html * https://www.suse.com/security/cve/CVE-2025-38699.html * https://www.suse.com/security/cve/CVE-2025-38700.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38712.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-38714.html * https://www.suse.com/security/cve/CVE-2025-38715.html * https://www.suse.com/security/cve/CVE-2025-38718.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39673.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39676.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39683.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39697.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39702.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39743.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39756.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39794.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39812.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39841.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39846.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39851.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39866.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39876.html * https://www.suse.com/security/cve/CVE-2025-39881.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39895.html * https://www.suse.com/security/cve/CVE-2025-39898.html * https://www.suse.com/security/cve/CVE-2025-39900.html * https://www.suse.com/security/cve/CVE-2025-39902.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39911.html * https://www.suse.com/security/cve/CVE-2025-39920.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-39931.html * https://www.suse.com/security/cve/CVE-2025-39934.html * https://www.suse.com/security/cve/CVE-2025-39937.html * https://www.suse.com/security/cve/CVE-2025-39938.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39946.html * https://www.suse.com/security/cve/CVE-2025-39947.html * https://www.suse.com/security/cve/CVE-2025-39948.html * https://www.suse.com/security/cve/CVE-2025-39949.html * https://www.suse.com/security/cve/CVE-2025-39952.html * https://www.suse.com/security/cve/CVE-2025-39955.html * https://www.suse.com/security/cve/CVE-2025-39957.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39969.html * https://www.suse.com/security/cve/CVE-2025-39970.html * https://www.suse.com/security/cve/CVE-2025-39971.html * https://www.suse.com/security/cve/CVE-2025-39972.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-39981.html * https://www.suse.com/security/cve/CVE-2025-39982.html * https://www.suse.com/security/cve/CVE-2025-39984.html * https://www.suse.com/security/cve/CVE-2025-39985.html * https://www.suse.com/security/cve/CVE-2025-39986.html * https://www.suse.com/security/cve/CVE-2025-39987.html * https://www.suse.com/security/cve/CVE-2025-39988.html * https://www.suse.com/security/cve/CVE-2025-39991.html * https://www.suse.com/security/cve/CVE-2025-39993.html * https://www.suse.com/security/cve/CVE-2025-39994.html * https://www.suse.com/security/cve/CVE-2025-39995.html * https://www.suse.com/security/cve/CVE-2025-39996.html * https://www.suse.com/security/cve/CVE-2025-39997.html * https://www.suse.com/security/cve/CVE-2025-40000.html * https://www.suse.com/security/cve/CVE-2025-40005.html * https://www.suse.com/security/cve/CVE-2025-40010.html * https://www.suse.com/security/cve/CVE-2025-40011.html * https://www.suse.com/security/cve/CVE-2025-40012.html * https://www.suse.com/security/cve/CVE-2025-40013.html * https://www.suse.com/security/cve/CVE-2025-40016.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40019.html * https://www.suse.com/security/cve/CVE-2025-40020.html * https://www.suse.com/security/cve/CVE-2025-40029.html * https://www.suse.com/security/cve/CVE-2025-40032.html * https://www.suse.com/security/cve/CVE-2025-40035.html * https://www.suse.com/security/cve/CVE-2025-40036.html * https://www.suse.com/security/cve/CVE-2025-40037.html * https://www.suse.com/security/cve/CVE-2025-40043.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://www.suse.com/security/cve/CVE-2025-40049.html * https://www.suse.com/security/cve/CVE-2025-40051.html * https://www.suse.com/security/cve/CVE-2025-40052.html * https://www.suse.com/security/cve/CVE-2025-40056.html * https://www.suse.com/security/cve/CVE-2025-40058.html * https://www.suse.com/security/cve/CVE-2025-40060.html * https://www.suse.com/security/cve/CVE-2025-40061.html * https://www.suse.com/security/cve/CVE-2025-40062.html * https://www.suse.com/security/cve/CVE-2025-40071.html * https://www.suse.com/security/cve/CVE-2025-40078.html * https://www.suse.com/security/cve/CVE-2025-40082.html * https://www.suse.com/security/cve/CVE-2025-40085.html * https://www.suse.com/security/cve/CVE-2025-40087.html * https://www.suse.com/security/cve/CVE-2025-40088.html * https://www.suse.com/security/cve/CVE-2025-40091.html * https://www.suse.com/security/cve/CVE-2025-40096.html * https://www.suse.com/security/cve/CVE-2025-40100.html * https://www.suse.com/security/cve/CVE-2025-40104.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1214073 * https://bugzilla.suse.com/show_bug.cgi?id=1214928 * https://bugzilla.suse.com/show_bug.cgi?id=1214953 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1215143 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1216396 * https://bugzilla.suse.com/show_bug.cgi?id=1216436 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1244939 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247222 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247683 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248230 * https://bugzilla.suse.com/show_bug.cgi?id=1248517 * https://bugzilla.suse.com/show_bug.cgi?id=1248630 * https://bugzilla.suse.com/show_bug.cgi?id=1248735 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1248886 * https://bugzilla.suse.com/show_bug.cgi?id=1249123 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249161 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249182 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249194 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249196 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249224 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249255 * https://bugzilla.suse.com/show_bug.cgi?id=1249257 * https://bugzilla.suse.com/show_bug.cgi?id=1249260 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249286 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249302 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249317 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249319 * https://bugzilla.suse.com/show_bug.cgi?id=1249320 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249489 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249512 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249595 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249640 * https://bugzilla.suse.com/show_bug.cgi?id=1249641 * https://bugzilla.suse.com/show_bug.cgi?id=1249642 * https://bugzilla.suse.com/show_bug.cgi?id=1249658 * https://bugzilla.suse.com/show_bug.cgi?id=1249662 * https://bugzilla.suse.com/show_bug.cgi?id=1249672 * https://bugzilla.suse.com/show_bug.cgi?id=1249673 * https://bugzilla.suse.com/show_bug.cgi?id=1249677 * https://bugzilla.suse.com/show_bug.cgi?id=1249678 * https://bugzilla.suse.com/show_bug.cgi?id=1249679 * https://bugzilla.suse.com/show_bug.cgi?id=1249682 * https://bugzilla.suse.com/show_bug.cgi?id=1249687 * https://bugzilla.suse.com/show_bug.cgi?id=1249698 * https://bugzilla.suse.com/show_bug.cgi?id=1249707 * https://bugzilla.suse.com/show_bug.cgi?id=1249712 * https://bugzilla.suse.com/show_bug.cgi?id=1249730 * https://bugzilla.suse.com/show_bug.cgi?id=1249735 * https://bugzilla.suse.com/show_bug.cgi?id=1249756 * https://bugzilla.suse.com/show_bug.cgi?id=1249758 * https://bugzilla.suse.com/show_bug.cgi?id=1249761 * https://bugzilla.suse.com/show_bug.cgi?id=1249762 * https://bugzilla.suse.com/show_bug.cgi?id=1249768 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249779 * https://bugzilla.suse.com/show_bug.cgi?id=1249780 * https://bugzilla.suse.com/show_bug.cgi?id=1249785 * https://bugzilla.suse.com/show_bug.cgi?id=1249787 * https://bugzilla.suse.com/show_bug.cgi?id=1249795 * https://bugzilla.suse.com/show_bug.cgi?id=1249815 * https://bugzilla.suse.com/show_bug.cgi?id=1249820 * https://bugzilla.suse.com/show_bug.cgi?id=1249823 * https://bugzilla.suse.com/show_bug.cgi?id=1249824 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249826 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249842 * https://bugzilla.suse.com/show_bug.cgi?id=1249845 * https://bugzilla.suse.com/show_bug.cgi?id=1249849 * https://bugzilla.suse.com/show_bug.cgi?id=1249850 * https://bugzilla.suse.com/show_bug.cgi?id=1249853 * https://bugzilla.suse.com/show_bug.cgi?id=1249856 * https://bugzilla.suse.com/show_bug.cgi?id=1249861 * https://bugzilla.suse.com/show_bug.cgi?id=1249863 * https://bugzilla.suse.com/show_bug.cgi?id=1249864 * https://bugzilla.suse.com/show_bug.cgi?id=1249865 * https://bugzilla.suse.com/show_bug.cgi?id=1249866 * https://bugzilla.suse.com/show_bug.cgi?id=1249869 * https://bugzilla.suse.com/show_bug.cgi?id=1249870 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249883 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249894 * https://bugzilla.suse.com/show_bug.cgi?id=1249896 * https://bugzilla.suse.com/show_bug.cgi?id=1249897 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249911 * https://bugzilla.suse.com/show_bug.cgi?id=1249917 * https://bugzilla.suse.com/show_bug.cgi?id=1249919 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249926 * https://bugzilla.suse.com/show_bug.cgi?id=1249938 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1249950 * https://bugzilla.suse.com/show_bug.cgi?id=1249952 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1249979 * https://bugzilla.suse.com/show_bug.cgi?id=1249984 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1249990 * https://bugzilla.suse.com/show_bug.cgi?id=1249993 * https://bugzilla.suse.com/show_bug.cgi?id=1249994 * https://bugzilla.suse.com/show_bug.cgi?id=1249997 * https://bugzilla.suse.com/show_bug.cgi?id=1250004 * https://bugzilla.suse.com/show_bug.cgi?id=1250006 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250012 * https://bugzilla.suse.com/show_bug.cgi?id=1250022 * https://bugzilla.suse.com/show_bug.cgi?id=1250024 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250029 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250035 * https://bugzilla.suse.com/show_bug.cgi?id=1250049 * https://bugzilla.suse.com/show_bug.cgi?id=1250055 * https://bugzilla.suse.com/show_bug.cgi?id=1250058 * https://bugzilla.suse.com/show_bug.cgi?id=1250062 * https://bugzilla.suse.com/show_bug.cgi?id=1250063 * https://bugzilla.suse.com/show_bug.cgi?id=1250065 * https://bugzilla.suse.com/show_bug.cgi?id=1250066 * https://bugzilla.suse.com/show_bug.cgi?id=1250067 * https://bugzilla.suse.com/show_bug.cgi?id=1250069 * https://bugzilla.suse.com/show_bug.cgi?id=1250070 * https://bugzilla.suse.com/show_bug.cgi?id=1250073 * https://bugzilla.suse.com/show_bug.cgi?id=1250074 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250089 * https://bugzilla.suse.com/show_bug.cgi?id=1250106 * https://bugzilla.suse.com/show_bug.cgi?id=1250112 * https://bugzilla.suse.com/show_bug.cgi?id=1250117 * https://bugzilla.suse.com/show_bug.cgi?id=1250119 * https://bugzilla.suse.com/show_bug.cgi?id=1250120 * https://bugzilla.suse.com/show_bug.cgi?id=1250125 * https://bugzilla.suse.com/show_bug.cgi?id=1250127 * https://bugzilla.suse.com/show_bug.cgi?id=1250128 * https://bugzilla.suse.com/show_bug.cgi?id=1250145 * https://bugzilla.suse.com/show_bug.cgi?id=1250150 * https://bugzilla.suse.com/show_bug.cgi?id=1250156 * https://bugzilla.suse.com/show_bug.cgi?id=1250157 * https://bugzilla.suse.com/show_bug.cgi?id=1250161 * https://bugzilla.suse.com/show_bug.cgi?id=1250163 * https://bugzilla.suse.com/show_bug.cgi?id=1250166 * https://bugzilla.suse.com/show_bug.cgi?id=1250167 * https://bugzilla.suse.com/show_bug.cgi?id=1250169 * https://bugzilla.suse.com/show_bug.cgi?id=1250171 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250186 * https://bugzilla.suse.com/show_bug.cgi?id=1250196 * https://bugzilla.suse.com/show_bug.cgi?id=1250198 * https://bugzilla.suse.com/show_bug.cgi?id=1250199 * https://bugzilla.suse.com/show_bug.cgi?id=1250201 * https://bugzilla.suse.com/show_bug.cgi?id=1250202 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250206 * https://bugzilla.suse.com/show_bug.cgi?id=1250208 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250241 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250243 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250263 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250274 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250290 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250296 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250319 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250325 * https://bugzilla.suse.com/show_bug.cgi?id=1250329 * https://bugzilla.suse.com/show_bug.cgi?id=1250337 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250379 * https://bugzilla.suse.com/show_bug.cgi?id=1250384 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250395 * https://bugzilla.suse.com/show_bug.cgi?id=1250397 * https://bugzilla.suse.com/show_bug.cgi?id=1250400 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250426 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250455 * https://bugzilla.suse.com/show_bug.cgi?id=1250459 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250650 * https://bugzilla.suse.com/show_bug.cgi?id=1250702 * https://bugzilla.suse.com/show_bug.cgi?id=1250704 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250721 * https://bugzilla.suse.com/show_bug.cgi?id=1250732 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250758 * https://bugzilla.suse.com/show_bug.cgi?id=1250759 * https://bugzilla.suse.com/show_bug.cgi?id=1250763 * https://bugzilla.suse.com/show_bug.cgi?id=1250765 * https://bugzilla.suse.com/show_bug.cgi?id=1250807 * https://bugzilla.suse.com/show_bug.cgi?id=1250808 * https://bugzilla.suse.com/show_bug.cgi?id=1250809 * https://bugzilla.suse.com/show_bug.cgi?id=1250812 * https://bugzilla.suse.com/show_bug.cgi?id=1250813 * https://bugzilla.suse.com/show_bug.cgi?id=1250815 * https://bugzilla.suse.com/show_bug.cgi?id=1250816 * https://bugzilla.suse.com/show_bug.cgi?id=1250820 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250825 * https://bugzilla.suse.com/show_bug.cgi?id=1250827 * https://bugzilla.suse.com/show_bug.cgi?id=1250830 * https://bugzilla.suse.com/show_bug.cgi?id=1250831 * https://bugzilla.suse.com/show_bug.cgi?id=1250837 * https://bugzilla.suse.com/show_bug.cgi?id=1250841 * https://bugzilla.suse.com/show_bug.cgi?id=1250861 * https://bugzilla.suse.com/show_bug.cgi?id=1250863 * https://bugzilla.suse.com/show_bug.cgi?id=1250867 * https://bugzilla.suse.com/show_bug.cgi?id=1250872 * https://bugzilla.suse.com/show_bug.cgi?id=1250873 * https://bugzilla.suse.com/show_bug.cgi?id=1250878 * https://bugzilla.suse.com/show_bug.cgi?id=1250905 * https://bugzilla.suse.com/show_bug.cgi?id=1250907 * https://bugzilla.suse.com/show_bug.cgi?id=1250917 * https://bugzilla.suse.com/show_bug.cgi?id=1250918 * https://bugzilla.suse.com/show_bug.cgi?id=1250923 * https://bugzilla.suse.com/show_bug.cgi?id=1250926 * https://bugzilla.suse.com/show_bug.cgi?id=1250928 * https://bugzilla.suse.com/show_bug.cgi?id=1250929 * https://bugzilla.suse.com/show_bug.cgi?id=1250930 * https://bugzilla.suse.com/show_bug.cgi?id=1250931 * https://bugzilla.suse.com/show_bug.cgi?id=1250941 * https://bugzilla.suse.com/show_bug.cgi?id=1250942 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1250949 * https://bugzilla.suse.com/show_bug.cgi?id=1250957 * https://bugzilla.suse.com/show_bug.cgi?id=1250964 * https://bugzilla.suse.com/show_bug.cgi?id=1251024 * https://bugzilla.suse.com/show_bug.cgi?id=1251027 * https://bugzilla.suse.com/show_bug.cgi?id=1251028 * https://bugzilla.suse.com/show_bug.cgi?id=1251031 * https://bugzilla.suse.com/show_bug.cgi?id=1251035 * https://bugzilla.suse.com/show_bug.cgi?id=1251038 * https://bugzilla.suse.com/show_bug.cgi?id=1251043 * https://bugzilla.suse.com/show_bug.cgi?id=1251045 * https://bugzilla.suse.com/show_bug.cgi?id=1251052 * https://bugzilla.suse.com/show_bug.cgi?id=1251053 * https://bugzilla.suse.com/show_bug.cgi?id=1251054 * https://bugzilla.suse.com/show_bug.cgi?id=1251056 * https://bugzilla.suse.com/show_bug.cgi?id=1251057 * https://bugzilla.suse.com/show_bug.cgi?id=1251059 * https://bugzilla.suse.com/show_bug.cgi?id=1251060 * https://bugzilla.suse.com/show_bug.cgi?id=1251065 * https://bugzilla.suse.com/show_bug.cgi?id=1251066 * https://bugzilla.suse.com/show_bug.cgi?id=1251067 * https://bugzilla.suse.com/show_bug.cgi?id=1251068 * https://bugzilla.suse.com/show_bug.cgi?id=1251071 * https://bugzilla.suse.com/show_bug.cgi?id=1251076 * https://bugzilla.suse.com/show_bug.cgi?id=1251079 * https://bugzilla.suse.com/show_bug.cgi?id=1251081 * https://bugzilla.suse.com/show_bug.cgi?id=1251083 * https://bugzilla.suse.com/show_bug.cgi?id=1251084 * https://bugzilla.suse.com/show_bug.cgi?id=1251100 * https://bugzilla.suse.com/show_bug.cgi?id=1251105 * https://bugzilla.suse.com/show_bug.cgi?id=1251106 * https://bugzilla.suse.com/show_bug.cgi?id=1251108 * https://bugzilla.suse.com/show_bug.cgi?id=1251113 * https://bugzilla.suse.com/show_bug.cgi?id=1251114 * https://bugzilla.suse.com/show_bug.cgi?id=1251119 * https://bugzilla.suse.com/show_bug.cgi?id=1251123 * https://bugzilla.suse.com/show_bug.cgi?id=1251126 * https://bugzilla.suse.com/show_bug.cgi?id=1251132 * https://bugzilla.suse.com/show_bug.cgi?id=1251134 * https://bugzilla.suse.com/show_bug.cgi?id=1251143 * https://bugzilla.suse.com/show_bug.cgi?id=1251146 * https://bugzilla.suse.com/show_bug.cgi?id=1251150 * https://bugzilla.suse.com/show_bug.cgi?id=1251152 * https://bugzilla.suse.com/show_bug.cgi?id=1251153 * https://bugzilla.suse.com/show_bug.cgi?id=1251159 * https://bugzilla.suse.com/show_bug.cgi?id=1251161 * https://bugzilla.suse.com/show_bug.cgi?id=1251170 * https://bugzilla.suse.com/show_bug.cgi?id=1251177 * https://bugzilla.suse.com/show_bug.cgi?id=1251180 * https://bugzilla.suse.com/show_bug.cgi?id=1251206 * https://bugzilla.suse.com/show_bug.cgi?id=1251215 * https://bugzilla.suse.com/show_bug.cgi?id=1251216 * https://bugzilla.suse.com/show_bug.cgi?id=1251222 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251232 * https://bugzilla.suse.com/show_bug.cgi?id=1251233 * https://bugzilla.suse.com/show_bug.cgi?id=1251247 * https://bugzilla.suse.com/show_bug.cgi?id=1251268 * https://bugzilla.suse.com/show_bug.cgi?id=1251269 * https://bugzilla.suse.com/show_bug.cgi?id=1251270 * https://bugzilla.suse.com/show_bug.cgi?id=1251282 * https://bugzilla.suse.com/show_bug.cgi?id=1251283 * https://bugzilla.suse.com/show_bug.cgi?id=1251286 * https://bugzilla.suse.com/show_bug.cgi?id=1251290 * https://bugzilla.suse.com/show_bug.cgi?id=1251319 * https://bugzilla.suse.com/show_bug.cgi?id=1251321 * https://bugzilla.suse.com/show_bug.cgi?id=1251323 * https://bugzilla.suse.com/show_bug.cgi?id=1251328 * https://bugzilla.suse.com/show_bug.cgi?id=1251529 * https://bugzilla.suse.com/show_bug.cgi?id=1251721 * https://bugzilla.suse.com/show_bug.cgi?id=1251732 * https://bugzilla.suse.com/show_bug.cgi?id=1251742 * https://bugzilla.suse.com/show_bug.cgi?id=1251743 * https://bugzilla.suse.com/show_bug.cgi?id=1251746 * https://bugzilla.suse.com/show_bug.cgi?id=1251748 * https://bugzilla.suse.com/show_bug.cgi?id=1251749 * https://bugzilla.suse.com/show_bug.cgi?id=1251750 * https://bugzilla.suse.com/show_bug.cgi?id=1251754 * https://bugzilla.suse.com/show_bug.cgi?id=1251755 * https://bugzilla.suse.com/show_bug.cgi?id=1251756 * https://bugzilla.suse.com/show_bug.cgi?id=1251758 * https://bugzilla.suse.com/show_bug.cgi?id=1251759 * https://bugzilla.suse.com/show_bug.cgi?id=1251760 * https://bugzilla.suse.com/show_bug.cgi?id=1251762 * https://bugzilla.suse.com/show_bug.cgi?id=1251763 * https://bugzilla.suse.com/show_bug.cgi?id=1251764 * https://bugzilla.suse.com/show_bug.cgi?id=1251769 * https://bugzilla.suse.com/show_bug.cgi?id=1251771 * https://bugzilla.suse.com/show_bug.cgi?id=1251772 * https://bugzilla.suse.com/show_bug.cgi?id=1251777 * https://bugzilla.suse.com/show_bug.cgi?id=1251780 * https://bugzilla.suse.com/show_bug.cgi?id=1251804 * https://bugzilla.suse.com/show_bug.cgi?id=1251810 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252039 * https://bugzilla.suse.com/show_bug.cgi?id=1252044 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252051 * https://bugzilla.suse.com/show_bug.cgi?id=1252052 * https://bugzilla.suse.com/show_bug.cgi?id=1252056 * https://bugzilla.suse.com/show_bug.cgi?id=1252060 * https://bugzilla.suse.com/show_bug.cgi?id=1252062 * https://bugzilla.suse.com/show_bug.cgi?id=1252064 * https://bugzilla.suse.com/show_bug.cgi?id=1252065 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252070 * https://bugzilla.suse.com/show_bug.cgi?id=1252072 * https://bugzilla.suse.com/show_bug.cgi?id=1252074 * https://bugzilla.suse.com/show_bug.cgi?id=1252075 * https://bugzilla.suse.com/show_bug.cgi?id=1252078 * https://bugzilla.suse.com/show_bug.cgi?id=1252079 * https://bugzilla.suse.com/show_bug.cgi?id=1252081 * https://bugzilla.suse.com/show_bug.cgi?id=1252082 * https://bugzilla.suse.com/show_bug.cgi?id=1252083 * https://bugzilla.suse.com/show_bug.cgi?id=1252236 * https://bugzilla.suse.com/show_bug.cgi?id=1252253 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252330 * https://bugzilla.suse.com/show_bug.cgi?id=1252332 * https://bugzilla.suse.com/show_bug.cgi?id=1252336 * https://bugzilla.suse.com/show_bug.cgi?id=1252346 * https://bugzilla.suse.com/show_bug.cgi?id=1252348 * https://bugzilla.suse.com/show_bug.cgi?id=1252349 * https://bugzilla.suse.com/show_bug.cgi?id=1252364 * https://bugzilla.suse.com/show_bug.cgi?id=1252469 * https://bugzilla.suse.com/show_bug.cgi?id=1252479 * https://bugzilla.suse.com/show_bug.cgi?id=1252481 * https://bugzilla.suse.com/show_bug.cgi?id=1252489 * https://bugzilla.suse.com/show_bug.cgi?id=1252490 * https://bugzilla.suse.com/show_bug.cgi?id=1252492 * https://bugzilla.suse.com/show_bug.cgi?id=1252495 * https://bugzilla.suse.com/show_bug.cgi?id=1252496 * https://bugzilla.suse.com/show_bug.cgi?id=1252499 * https://bugzilla.suse.com/show_bug.cgi?id=1252534 * https://bugzilla.suse.com/show_bug.cgi?id=1252536 * https://bugzilla.suse.com/show_bug.cgi?id=1252537 * https://bugzilla.suse.com/show_bug.cgi?id=1252550 * https://bugzilla.suse.com/show_bug.cgi?id=1252553 * https://bugzilla.suse.com/show_bug.cgi?id=1252559 * https://bugzilla.suse.com/show_bug.cgi?id=1252561 * https://bugzilla.suse.com/show_bug.cgi?id=1252564 * https://bugzilla.suse.com/show_bug.cgi?id=1252565 * https://bugzilla.suse.com/show_bug.cgi?id=1252566 * https://bugzilla.suse.com/show_bug.cgi?id=1252632 * https://bugzilla.suse.com/show_bug.cgi?id=1252668 * https://bugzilla.suse.com/show_bug.cgi?id=1252678 * https://bugzilla.suse.com/show_bug.cgi?id=1252679 * https://bugzilla.suse.com/show_bug.cgi?id=1252685 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252734 * https://bugzilla.suse.com/show_bug.cgi?id=1252735 * https://bugzilla.suse.com/show_bug.cgi?id=1252772 * https://bugzilla.suse.com/show_bug.cgi?id=1252775 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252787 * https://bugzilla.suse.com/show_bug.cgi?id=1252789 * https://bugzilla.suse.com/show_bug.cgi?id=1252797 * https://bugzilla.suse.com/show_bug.cgi?id=1252819 * https://bugzilla.suse.com/show_bug.cgi?id=1252822 * https://bugzilla.suse.com/show_bug.cgi?id=1252826 * https://bugzilla.suse.com/show_bug.cgi?id=1252841 * https://bugzilla.suse.com/show_bug.cgi?id=1252848 * https://bugzilla.suse.com/show_bug.cgi?id=1252849 * https://bugzilla.suse.com/show_bug.cgi?id=1252850 * https://bugzilla.suse.com/show_bug.cgi?id=1252851 * https://bugzilla.suse.com/show_bug.cgi?id=1252854 * https://bugzilla.suse.com/show_bug.cgi?id=1252858 * https://bugzilla.suse.com/show_bug.cgi?id=1252865 * https://bugzilla.suse.com/show_bug.cgi?id=1252866 * https://bugzilla.suse.com/show_bug.cgi?id=1252873 * https://bugzilla.suse.com/show_bug.cgi?id=1252902 * https://bugzilla.suse.com/show_bug.cgi?id=1252904 * https://bugzilla.suse.com/show_bug.cgi?id=1252909 * https://bugzilla.suse.com/show_bug.cgi?id=1252915 * https://bugzilla.suse.com/show_bug.cgi?id=1252918 * https://bugzilla.suse.com/show_bug.cgi?id=1252921 * https://bugzilla.suse.com/show_bug.cgi?id=1252939 * https://jira.suse.com/browse/PED-13815 * https://jira.suse.com/browse/PED-3527 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-4876 * https://jira.suse.com/browse/PED-5063 * https://jira.suse.com/browse/PED-5065 * https://jira.suse.com/browse/PED-5475 * https://jira.suse.com/browse/PED-5477 * https://jira.suse.com/browse/PED-5511 * https://jira.suse.com/browse/PED-5853 * https://jira.suse.com/browse/PED-6012 * https://jira.suse.com/browse/PED-6041 * https://jira.suse.com/browse/PED-6054 * https://jira.suse.com/browse/PED-6068 * https://jira.suse.com/browse/PED-6069 * https://jira.suse.com/browse/PED-6070 * https://jira.suse.com/browse/PED-6071 * https://jira.suse.com/browse/PED-6116 * https://jira.suse.com/browse/PED-6120 * https://jira.suse.com/browse/PED-6121 * https://jira.suse.com/browse/PED-6811 * https://jira.suse.com/browse/PED-7542 * https://jira.suse.com/browse/PED-9891 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:36:42 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:36:42 -0000 Subject: SUSE-SU-2025:4056-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) Message-ID: <176289340279.19246.11123125376678730301@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:4056-1 Release Date: 2025-11-11T18:35:26Z Rating: important References: * bsc#1247737 * bsc#1248176 * bsc#1248631 * bsc#1249207 * bsc#1249208 Cross-References: * CVE-2025-38453 * CVE-2025-38511 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_51 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38511: drm/xe/pf: Clear all LMTT pages on alloc (bsc#1248176). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247737). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-4056=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_51-default-debuginfo-7-150700.3.18.1 * kernel-livepatch-SLE15-SP7_Update_0-debugsource-7-150700.3.18.1 * kernel-livepatch-6_4_0-150700_51-default-7-150700.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1247737 * https://bugzilla.suse.com/show_bug.cgi?id=1248176 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:39:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:39:23 -0000 Subject: SUSE-SU-2025:2173-1: important: Security update for the Linux Kernel Message-ID: <176289356342.19246.5303566771274973082@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:2173-1 Release Date: 2025-11-11T17:20:14Z Rating: important References: * bsc#1184350 * bsc#1193629 * bsc#1204562 * bsc#1204569 * bsc#1204619 * bsc#1204705 * bsc#1205282 * bsc#1206051 * bsc#1206073 * bsc#1206649 * bsc#1206843 * bsc#1206886 * bsc#1206887 * bsc#1207361 * bsc#1208105 * bsc#1208542 * bsc#1209292 * bsc#1209556 * bsc#1209684 * bsc#1209780 * bsc#1209980 * bsc#1210337 * bsc#1210763 * bsc#1210767 * bsc#1211465 * bsc#1213012 * bsc#1213013 * bsc#1213094 * bsc#1213096 * bsc#1213233 * bsc#1213946 * bsc#1214991 * bsc#1218470 * bsc#1222629 * bsc#1223096 * bsc#1225903 * bsc#1228659 * bsc#1231293 * bsc#1232649 * bsc#1234395 * bsc#1234454 * bsc#1234887 * bsc#1235100 * bsc#1235870 * bsc#1238303 * bsc#1238570 * bsc#1239986 * bsc#1240785 * bsc#1240802 * bsc#1241038 * bsc#1241525 * bsc#1241640 * bsc#1242006 * bsc#1242146 * bsc#1242147 * bsc#1242150 * bsc#1242151 * bsc#1242154 * bsc#1242157 * bsc#1242158 * bsc#1242160 * bsc#1242164 * bsc#1242165 * bsc#1242169 * bsc#1242215 * bsc#1242217 * bsc#1242218 * bsc#1242219 * bsc#1242222 * bsc#1242224 * bsc#1242226 * bsc#1242227 * bsc#1242228 * bsc#1242229 * bsc#1242230 * bsc#1242231 * bsc#1242232 * bsc#1242237 * bsc#1242239 * bsc#1242240 * bsc#1242241 * bsc#1242244 * bsc#1242245 * bsc#1242248 * bsc#1242249 * bsc#1242261 * bsc#1242264 * bsc#1242265 * bsc#1242270 * bsc#1242276 * bsc#1242278 * bsc#1242279 * bsc#1242280 * bsc#1242281 * bsc#1242282 * bsc#1242285 * bsc#1242286 * bsc#1242289 * bsc#1242294 * bsc#1242295 * bsc#1242298 * bsc#1242302 * bsc#1242305 * bsc#1242311 * bsc#1242312 * bsc#1242320 * bsc#1242338 * bsc#1242349 * bsc#1242351 * bsc#1242352 * bsc#1242353 * bsc#1242355 * bsc#1242357 * bsc#1242358 * bsc#1242359 * bsc#1242360 * bsc#1242361 * bsc#1242365 * bsc#1242366 * bsc#1242369 * bsc#1242370 * bsc#1242371 * bsc#1242372 * bsc#1242377 * bsc#1242378 * bsc#1242380 * bsc#1242381 * bsc#1242382 * bsc#1242385 * bsc#1242387 * bsc#1242389 * bsc#1242391 * bsc#1242392 * bsc#1242393 * bsc#1242394 * bsc#1242398 * bsc#1242399 * bsc#1242400 * bsc#1242402 * bsc#1242403 * bsc#1242405 * bsc#1242406 * bsc#1242409 * bsc#1242410 * bsc#1242411 * bsc#1242415 * bsc#1242416 * bsc#1242421 * bsc#1242422 * bsc#1242425 * bsc#1242426 * bsc#1242428 * bsc#1242440 * bsc#1242443 * bsc#1242448 * bsc#1242449 * bsc#1242452 * bsc#1242453 * bsc#1242454 * bsc#1242455 * bsc#1242456 * bsc#1242458 * bsc#1242464 * bsc#1242465 * bsc#1242467 * bsc#1242469 * bsc#1242473 * bsc#1242474 * bsc#1242478 * bsc#1242481 * bsc#1242484 * bsc#1242489 * bsc#1242497 * bsc#1242527 * bsc#1242542 * bsc#1242544 * bsc#1242545 * bsc#1242547 * bsc#1242548 * bsc#1242549 * bsc#1242550 * bsc#1242551 * bsc#1242558 * bsc#1242570 * bsc#1242580 * bsc#1242586 * bsc#1242589 * bsc#1242596 * bsc#1242597 * bsc#1242685 * bsc#1242686 * bsc#1242688 * bsc#1242689 * bsc#1242695 * bsc#1242716 * bsc#1242733 * bsc#1242734 * bsc#1242735 * bsc#1242736 * bsc#1242739 * bsc#1242740 * bsc#1242743 * bsc#1242744 * bsc#1242745 * bsc#1242746 * bsc#1242747 * bsc#1242748 * bsc#1242749 * bsc#1242751 * bsc#1242752 * bsc#1242753 * bsc#1242756 * bsc#1242759 * bsc#1242762 * bsc#1242765 * bsc#1242767 * bsc#1242778 * bsc#1242779 * bsc#1242790 * bsc#1242791 * bsc#1243047 * bsc#1243133 * bsc#1243737 * bsc#1243919 Cross-References: * CVE-2022-3564 * CVE-2022-3619 * CVE-2022-3640 * CVE-2022-49762 * CVE-2022-49763 * CVE-2022-49769 * CVE-2022-49770 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49773 * CVE-2022-49775 * CVE-2022-49776 * CVE-2022-49777 * CVE-2022-49779 * CVE-2022-49781 * CVE-2022-49783 * CVE-2022-49784 * CVE-2022-49786 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49790 * CVE-2022-49792 * CVE-2022-49793 * CVE-2022-49794 * CVE-2022-49795 * CVE-2022-49796 * CVE-2022-49797 * CVE-2022-49799 * CVE-2022-49800 * CVE-2022-49801 * CVE-2022-49802 * CVE-2022-49807 * CVE-2022-49809 * CVE-2022-49810 * CVE-2022-49812 * CVE-2022-49813 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49822 * CVE-2022-49823 * CVE-2022-49824 * CVE-2022-49825 * CVE-2022-49826 * CVE-2022-49827 * CVE-2022-49830 * CVE-2022-49832 * CVE-2022-49834 * CVE-2022-49835 * CVE-2022-49836 * CVE-2022-49837 * CVE-2022-49839 * CVE-2022-49841 * CVE-2022-49842 * CVE-2022-49845 * CVE-2022-49846 * CVE-2022-49850 * CVE-2022-49853 * CVE-2022-49858 * CVE-2022-49860 * CVE-2022-49861 * CVE-2022-49863 * CVE-2022-49864 * CVE-2022-49865 * CVE-2022-49868 * CVE-2022-49869 * CVE-2022-49870 * CVE-2022-49871 * CVE-2022-49874 * CVE-2022-49879 * CVE-2022-49880 * CVE-2022-49881 * CVE-2022-49885 * CVE-2022-49886 * CVE-2022-49887 * CVE-2022-49888 * CVE-2022-49889 * CVE-2022-49890 * CVE-2022-49891 * CVE-2022-49892 * CVE-2022-49900 * CVE-2022-49901 * CVE-2022-49902 * CVE-2022-49905 * CVE-2022-49906 * CVE-2022-49908 * CVE-2022-49909 * CVE-2022-49910 * CVE-2022-49915 * CVE-2022-49916 * CVE-2022-49917 * CVE-2022-49918 * CVE-2022-49921 * CVE-2022-49922 * CVE-2022-49923 * CVE-2022-49924 * CVE-2022-49925 * CVE-2022-49927 * CVE-2022-49928 * CVE-2022-49929 * CVE-2022-49931 * CVE-2023-1990 * CVE-2023-28866 * CVE-2023-53035 * CVE-2023-53036 * CVE-2023-53038 * CVE-2023-53039 * CVE-2023-53040 * CVE-2023-53041 * CVE-2023-53042 * CVE-2023-53044 * CVE-2023-53045 * CVE-2023-53049 * CVE-2023-53052 * CVE-2023-53054 * CVE-2023-53056 * CVE-2023-53057 * CVE-2023-53058 * CVE-2023-53059 * CVE-2023-53060 * CVE-2023-53062 * CVE-2023-53064 * CVE-2023-53065 * CVE-2023-53066 * CVE-2023-53068 * CVE-2023-53070 * CVE-2023-53071 * CVE-2023-53073 * CVE-2023-53074 * CVE-2023-53075 * CVE-2023-53077 * CVE-2023-53078 * CVE-2023-53079 * CVE-2023-53081 * CVE-2023-53082 * CVE-2023-53084 * CVE-2023-53087 * CVE-2023-53089 * CVE-2023-53090 * CVE-2023-53091 * CVE-2023-53092 * CVE-2023-53093 * CVE-2023-53095 * CVE-2023-53096 * CVE-2023-53098 * CVE-2023-53099 * CVE-2023-53100 * CVE-2023-53101 * CVE-2023-53102 * CVE-2023-53105 * CVE-2023-53106 * CVE-2023-53108 * CVE-2023-53109 * CVE-2023-53111 * CVE-2023-53112 * CVE-2023-53114 * CVE-2023-53116 * CVE-2023-53118 * CVE-2023-53119 * CVE-2023-53123 * CVE-2023-53124 * CVE-2023-53125 * CVE-2023-53128 * CVE-2023-53131 * CVE-2023-53134 * CVE-2023-53137 * CVE-2023-53139 * CVE-2023-53140 * CVE-2023-53142 * CVE-2023-53143 * CVE-2023-53145 * CVE-2024-26804 * CVE-2024-28956 * CVE-2024-53168 * CVE-2024-56558 * CVE-2025-21999 * CVE-2025-22056 * CVE-2025-23145 * CVE-2025-37785 * CVE-2025-37789 CVSS scores: * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-3619 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3619 ( NVD ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-3640 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-3640 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49762 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49762 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49763 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49763 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49776 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49776 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49779 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49779 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49781 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49781 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49781 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49783 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49784 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49784 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49786 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49786 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49786 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49792 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49792 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-49792 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49793 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49794 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49794 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49799 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49801 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49813 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49822 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49823 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49830 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49830 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49834 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49834 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49837 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49837 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49845 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49850 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49850 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49868 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49869 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49870 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49886 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49901 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49901 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49908 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49910 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49917 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49918 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49921 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49921 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49929 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28866 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-28866 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-28866 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53035 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53036 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53036 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53038 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53038 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53039 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53041 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53041 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53042 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53042 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53052 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53074 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53074 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53077 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53077 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53089 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53089 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53100 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53100 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53112 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53116 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53123 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53124 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26804 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-28956 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-28956 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-28956 ( NVD ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-28956 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 180 vulnerabilities and has 44 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2173=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.110.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_27-debugsource-1-150500.11.7.1 * kernel-default-debuginfo-5.14.21-150500.55.110.1 * kernel-default-debugsource-5.14.21-150500.55.110.1 * kernel-livepatch-5_14_21-150500_55_110-default-1-150500.11.7.1 * kernel-default-livepatch-5.14.21-150500.55.110.1 * kernel-default-livepatch-devel-5.14.21-150500.55.110.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-1-150500.11.7.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-3619.html * https://www.suse.com/security/cve/CVE-2022-3640.html * https://www.suse.com/security/cve/CVE-2022-49762.html * https://www.suse.com/security/cve/CVE-2022-49763.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49773.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49776.html * https://www.suse.com/security/cve/CVE-2022-49777.html * https://www.suse.com/security/cve/CVE-2022-49779.html * https://www.suse.com/security/cve/CVE-2022-49781.html * https://www.suse.com/security/cve/CVE-2022-49783.html * https://www.suse.com/security/cve/CVE-2022-49784.html * https://www.suse.com/security/cve/CVE-2022-49786.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49790.html * https://www.suse.com/security/cve/CVE-2022-49792.html * https://www.suse.com/security/cve/CVE-2022-49793.html * https://www.suse.com/security/cve/CVE-2022-49794.html * https://www.suse.com/security/cve/CVE-2022-49795.html * https://www.suse.com/security/cve/CVE-2022-49796.html * https://www.suse.com/security/cve/CVE-2022-49797.html * https://www.suse.com/security/cve/CVE-2022-49799.html * https://www.suse.com/security/cve/CVE-2022-49800.html * https://www.suse.com/security/cve/CVE-2022-49801.html * https://www.suse.com/security/cve/CVE-2022-49802.html * https://www.suse.com/security/cve/CVE-2022-49807.html * https://www.suse.com/security/cve/CVE-2022-49809.html * https://www.suse.com/security/cve/CVE-2022-49810.html * https://www.suse.com/security/cve/CVE-2022-49812.html * https://www.suse.com/security/cve/CVE-2022-49813.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49822.html * https://www.suse.com/security/cve/CVE-2022-49823.html * https://www.suse.com/security/cve/CVE-2022-49824.html * https://www.suse.com/security/cve/CVE-2022-49825.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49827.html * https://www.suse.com/security/cve/CVE-2022-49830.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49834.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49836.html * https://www.suse.com/security/cve/CVE-2022-49837.html * https://www.suse.com/security/cve/CVE-2022-49839.html * https://www.suse.com/security/cve/CVE-2022-49841.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49845.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49850.html * https://www.suse.com/security/cve/CVE-2022-49853.html * https://www.suse.com/security/cve/CVE-2022-49858.html * https://www.suse.com/security/cve/CVE-2022-49860.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49863.html * https://www.suse.com/security/cve/CVE-2022-49864.html * https://www.suse.com/security/cve/CVE-2022-49865.html * https://www.suse.com/security/cve/CVE-2022-49868.html * https://www.suse.com/security/cve/CVE-2022-49869.html * https://www.suse.com/security/cve/CVE-2022-49870.html * https://www.suse.com/security/cve/CVE-2022-49871.html * https://www.suse.com/security/cve/CVE-2022-49874.html * https://www.suse.com/security/cve/CVE-2022-49879.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49881.html * https://www.suse.com/security/cve/CVE-2022-49885.html * https://www.suse.com/security/cve/CVE-2022-49886.html * https://www.suse.com/security/cve/CVE-2022-49887.html * https://www.suse.com/security/cve/CVE-2022-49888.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49890.html * https://www.suse.com/security/cve/CVE-2022-49891.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49900.html * https://www.suse.com/security/cve/CVE-2022-49901.html * https://www.suse.com/security/cve/CVE-2022-49902.html * https://www.suse.com/security/cve/CVE-2022-49905.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49908.html * https://www.suse.com/security/cve/CVE-2022-49909.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49916.html * https://www.suse.com/security/cve/CVE-2022-49917.html * https://www.suse.com/security/cve/CVE-2022-49918.html * https://www.suse.com/security/cve/CVE-2022-49921.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49923.html * https://www.suse.com/security/cve/CVE-2022-49924.html * https://www.suse.com/security/cve/CVE-2022-49925.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2022-49928.html * https://www.suse.com/security/cve/CVE-2022-49929.html * https://www.suse.com/security/cve/CVE-2022-49931.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-28866.html * https://www.suse.com/security/cve/CVE-2023-53035.html * https://www.suse.com/security/cve/CVE-2023-53036.html * https://www.suse.com/security/cve/CVE-2023-53038.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53040.html * https://www.suse.com/security/cve/CVE-2023-53041.html * https://www.suse.com/security/cve/CVE-2023-53042.html * https://www.suse.com/security/cve/CVE-2023-53044.html * https://www.suse.com/security/cve/CVE-2023-53045.html * https://www.suse.com/security/cve/CVE-2023-53049.html * https://www.suse.com/security/cve/CVE-2023-53052.html * https://www.suse.com/security/cve/CVE-2023-53054.html * https://www.suse.com/security/cve/CVE-2023-53056.html * https://www.suse.com/security/cve/CVE-2023-53057.html * https://www.suse.com/security/cve/CVE-2023-53058.html * https://www.suse.com/security/cve/CVE-2023-53059.html * https://www.suse.com/security/cve/CVE-2023-53060.html * https://www.suse.com/security/cve/CVE-2023-53062.html * https://www.suse.com/security/cve/CVE-2023-53064.html * https://www.suse.com/security/cve/CVE-2023-53065.html * https://www.suse.com/security/cve/CVE-2023-53066.html * https://www.suse.com/security/cve/CVE-2023-53068.html * https://www.suse.com/security/cve/CVE-2023-53070.html * https://www.suse.com/security/cve/CVE-2023-53071.html * https://www.suse.com/security/cve/CVE-2023-53073.html * https://www.suse.com/security/cve/CVE-2023-53074.html * https://www.suse.com/security/cve/CVE-2023-53075.html * https://www.suse.com/security/cve/CVE-2023-53077.html * https://www.suse.com/security/cve/CVE-2023-53078.html * https://www.suse.com/security/cve/CVE-2023-53079.html * https://www.suse.com/security/cve/CVE-2023-53081.html * https://www.suse.com/security/cve/CVE-2023-53082.html * https://www.suse.com/security/cve/CVE-2023-53084.html * https://www.suse.com/security/cve/CVE-2023-53087.html * https://www.suse.com/security/cve/CVE-2023-53089.html * https://www.suse.com/security/cve/CVE-2023-53090.html * https://www.suse.com/security/cve/CVE-2023-53091.html * https://www.suse.com/security/cve/CVE-2023-53092.html * https://www.suse.com/security/cve/CVE-2023-53093.html * https://www.suse.com/security/cve/CVE-2023-53095.html * https://www.suse.com/security/cve/CVE-2023-53096.html * https://www.suse.com/security/cve/CVE-2023-53098.html * https://www.suse.com/security/cve/CVE-2023-53099.html * https://www.suse.com/security/cve/CVE-2023-53100.html * https://www.suse.com/security/cve/CVE-2023-53101.html * https://www.suse.com/security/cve/CVE-2023-53102.html * https://www.suse.com/security/cve/CVE-2023-53105.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2023-53108.html * https://www.suse.com/security/cve/CVE-2023-53109.html * https://www.suse.com/security/cve/CVE-2023-53111.html * https://www.suse.com/security/cve/CVE-2023-53112.html * https://www.suse.com/security/cve/CVE-2023-53114.html * https://www.suse.com/security/cve/CVE-2023-53116.html * https://www.suse.com/security/cve/CVE-2023-53118.html * https://www.suse.com/security/cve/CVE-2023-53119.html * https://www.suse.com/security/cve/CVE-2023-53123.html * https://www.suse.com/security/cve/CVE-2023-53124.html * https://www.suse.com/security/cve/CVE-2023-53125.html * https://www.suse.com/security/cve/CVE-2023-53128.html * https://www.suse.com/security/cve/CVE-2023-53131.html * https://www.suse.com/security/cve/CVE-2023-53134.html * https://www.suse.com/security/cve/CVE-2023-53137.html * https://www.suse.com/security/cve/CVE-2023-53139.html * https://www.suse.com/security/cve/CVE-2023-53140.html * https://www.suse.com/security/cve/CVE-2023-53142.html * https://www.suse.com/security/cve/CVE-2023-53143.html * https://www.suse.com/security/cve/CVE-2023-53145.html * https://www.suse.com/security/cve/CVE-2024-26804.html * https://www.suse.com/security/cve/CVE-2024-28956.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1204562 * https://bugzilla.suse.com/show_bug.cgi?id=1204569 * https://bugzilla.suse.com/show_bug.cgi?id=1204619 * https://bugzilla.suse.com/show_bug.cgi?id=1204705 * https://bugzilla.suse.com/show_bug.cgi?id=1205282 * https://bugzilla.suse.com/show_bug.cgi?id=1206051 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1208105 * https://bugzilla.suse.com/show_bug.cgi?id=1208542 * https://bugzilla.suse.com/show_bug.cgi?id=1209292 * https://bugzilla.suse.com/show_bug.cgi?id=1209556 * https://bugzilla.suse.com/show_bug.cgi?id=1209684 * https://bugzilla.suse.com/show_bug.cgi?id=1209780 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1210767 * https://bugzilla.suse.com/show_bug.cgi?id=1211465 * https://bugzilla.suse.com/show_bug.cgi?id=1213012 * https://bugzilla.suse.com/show_bug.cgi?id=1213013 * https://bugzilla.suse.com/show_bug.cgi?id=1213094 * https://bugzilla.suse.com/show_bug.cgi?id=1213096 * https://bugzilla.suse.com/show_bug.cgi?id=1213233 * https://bugzilla.suse.com/show_bug.cgi?id=1213946 * https://bugzilla.suse.com/show_bug.cgi?id=1214991 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1222629 * https://bugzilla.suse.com/show_bug.cgi?id=1223096 * https://bugzilla.suse.com/show_bug.cgi?id=1225903 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1234395 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1242006 * https://bugzilla.suse.com/show_bug.cgi?id=1242146 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242150 * https://bugzilla.suse.com/show_bug.cgi?id=1242151 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242157 * https://bugzilla.suse.com/show_bug.cgi?id=1242158 * https://bugzilla.suse.com/show_bug.cgi?id=1242160 * https://bugzilla.suse.com/show_bug.cgi?id=1242164 * https://bugzilla.suse.com/show_bug.cgi?id=1242165 * https://bugzilla.suse.com/show_bug.cgi?id=1242169 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242217 * https://bugzilla.suse.com/show_bug.cgi?id=1242218 * https://bugzilla.suse.com/show_bug.cgi?id=1242219 * https://bugzilla.suse.com/show_bug.cgi?id=1242222 * https://bugzilla.suse.com/show_bug.cgi?id=1242224 * https://bugzilla.suse.com/show_bug.cgi?id=1242226 * https://bugzilla.suse.com/show_bug.cgi?id=1242227 * https://bugzilla.suse.com/show_bug.cgi?id=1242228 * https://bugzilla.suse.com/show_bug.cgi?id=1242229 * https://bugzilla.suse.com/show_bug.cgi?id=1242230 * https://bugzilla.suse.com/show_bug.cgi?id=1242231 * https://bugzilla.suse.com/show_bug.cgi?id=1242232 * https://bugzilla.suse.com/show_bug.cgi?id=1242237 * https://bugzilla.suse.com/show_bug.cgi?id=1242239 * https://bugzilla.suse.com/show_bug.cgi?id=1242240 * https://bugzilla.suse.com/show_bug.cgi?id=1242241 * https://bugzilla.suse.com/show_bug.cgi?id=1242244 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242248 * https://bugzilla.suse.com/show_bug.cgi?id=1242249 * https://bugzilla.suse.com/show_bug.cgi?id=1242261 * https://bugzilla.suse.com/show_bug.cgi?id=1242264 * https://bugzilla.suse.com/show_bug.cgi?id=1242265 * https://bugzilla.suse.com/show_bug.cgi?id=1242270 * https://bugzilla.suse.com/show_bug.cgi?id=1242276 * https://bugzilla.suse.com/show_bug.cgi?id=1242278 * https://bugzilla.suse.com/show_bug.cgi?id=1242279 * https://bugzilla.suse.com/show_bug.cgi?id=1242280 * https://bugzilla.suse.com/show_bug.cgi?id=1242281 * https://bugzilla.suse.com/show_bug.cgi?id=1242282 * https://bugzilla.suse.com/show_bug.cgi?id=1242285 * https://bugzilla.suse.com/show_bug.cgi?id=1242286 * https://bugzilla.suse.com/show_bug.cgi?id=1242289 * https://bugzilla.suse.com/show_bug.cgi?id=1242294 * https://bugzilla.suse.com/show_bug.cgi?id=1242295 * https://bugzilla.suse.com/show_bug.cgi?id=1242298 * https://bugzilla.suse.com/show_bug.cgi?id=1242302 * https://bugzilla.suse.com/show_bug.cgi?id=1242305 * https://bugzilla.suse.com/show_bug.cgi?id=1242311 * https://bugzilla.suse.com/show_bug.cgi?id=1242312 * https://bugzilla.suse.com/show_bug.cgi?id=1242320 * https://bugzilla.suse.com/show_bug.cgi?id=1242338 * https://bugzilla.suse.com/show_bug.cgi?id=1242349 * https://bugzilla.suse.com/show_bug.cgi?id=1242351 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242355 * https://bugzilla.suse.com/show_bug.cgi?id=1242357 * https://bugzilla.suse.com/show_bug.cgi?id=1242358 * https://bugzilla.suse.com/show_bug.cgi?id=1242359 * https://bugzilla.suse.com/show_bug.cgi?id=1242360 * https://bugzilla.suse.com/show_bug.cgi?id=1242361 * https://bugzilla.suse.com/show_bug.cgi?id=1242365 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242369 * https://bugzilla.suse.com/show_bug.cgi?id=1242370 * https://bugzilla.suse.com/show_bug.cgi?id=1242371 * https://bugzilla.suse.com/show_bug.cgi?id=1242372 * https://bugzilla.suse.com/show_bug.cgi?id=1242377 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242380 * https://bugzilla.suse.com/show_bug.cgi?id=1242381 * https://bugzilla.suse.com/show_bug.cgi?id=1242382 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242387 * https://bugzilla.suse.com/show_bug.cgi?id=1242389 * https://bugzilla.suse.com/show_bug.cgi?id=1242391 * https://bugzilla.suse.com/show_bug.cgi?id=1242392 * https://bugzilla.suse.com/show_bug.cgi?id=1242393 * https://bugzilla.suse.com/show_bug.cgi?id=1242394 * https://bugzilla.suse.com/show_bug.cgi?id=1242398 * https://bugzilla.suse.com/show_bug.cgi?id=1242399 * https://bugzilla.suse.com/show_bug.cgi?id=1242400 * https://bugzilla.suse.com/show_bug.cgi?id=1242402 * https://bugzilla.suse.com/show_bug.cgi?id=1242403 * https://bugzilla.suse.com/show_bug.cgi?id=1242405 * https://bugzilla.suse.com/show_bug.cgi?id=1242406 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242410 * https://bugzilla.suse.com/show_bug.cgi?id=1242411 * https://bugzilla.suse.com/show_bug.cgi?id=1242415 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242421 * https://bugzilla.suse.com/show_bug.cgi?id=1242422 * https://bugzilla.suse.com/show_bug.cgi?id=1242425 * https://bugzilla.suse.com/show_bug.cgi?id=1242426 * https://bugzilla.suse.com/show_bug.cgi?id=1242428 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242443 * https://bugzilla.suse.com/show_bug.cgi?id=1242448 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242453 * https://bugzilla.suse.com/show_bug.cgi?id=1242454 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242456 * https://bugzilla.suse.com/show_bug.cgi?id=1242458 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242465 * https://bugzilla.suse.com/show_bug.cgi?id=1242467 * https://bugzilla.suse.com/show_bug.cgi?id=1242469 * https://bugzilla.suse.com/show_bug.cgi?id=1242473 * https://bugzilla.suse.com/show_bug.cgi?id=1242474 * https://bugzilla.suse.com/show_bug.cgi?id=1242478 * https://bugzilla.suse.com/show_bug.cgi?id=1242481 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242489 * https://bugzilla.suse.com/show_bug.cgi?id=1242497 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242544 * https://bugzilla.suse.com/show_bug.cgi?id=1242545 * https://bugzilla.suse.com/show_bug.cgi?id=1242547 * https://bugzilla.suse.com/show_bug.cgi?id=1242548 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242550 * https://bugzilla.suse.com/show_bug.cgi?id=1242551 * https://bugzilla.suse.com/show_bug.cgi?id=1242558 * https://bugzilla.suse.com/show_bug.cgi?id=1242570 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242586 * https://bugzilla.suse.com/show_bug.cgi?id=1242589 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242597 * https://bugzilla.suse.com/show_bug.cgi?id=1242685 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242688 * https://bugzilla.suse.com/show_bug.cgi?id=1242689 * https://bugzilla.suse.com/show_bug.cgi?id=1242695 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242733 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242735 * https://bugzilla.suse.com/show_bug.cgi?id=1242736 * https://bugzilla.suse.com/show_bug.cgi?id=1242739 * https://bugzilla.suse.com/show_bug.cgi?id=1242740 * https://bugzilla.suse.com/show_bug.cgi?id=1242743 * https://bugzilla.suse.com/show_bug.cgi?id=1242744 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242746 * https://bugzilla.suse.com/show_bug.cgi?id=1242747 * https://bugzilla.suse.com/show_bug.cgi?id=1242748 * https://bugzilla.suse.com/show_bug.cgi?id=1242749 * https://bugzilla.suse.com/show_bug.cgi?id=1242751 * https://bugzilla.suse.com/show_bug.cgi?id=1242752 * https://bugzilla.suse.com/show_bug.cgi?id=1242753 * https://bugzilla.suse.com/show_bug.cgi?id=1242756 * https://bugzilla.suse.com/show_bug.cgi?id=1242759 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242765 * https://bugzilla.suse.com/show_bug.cgi?id=1242767 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242779 * https://bugzilla.suse.com/show_bug.cgi?id=1242790 * https://bugzilla.suse.com/show_bug.cgi?id=1242791 * https://bugzilla.suse.com/show_bug.cgi?id=1243047 * https://bugzilla.suse.com/show_bug.cgi?id=1243133 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Nov 11 20:43:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 11 Nov 2025 20:43:08 -0000 Subject: SUSE-SU-2025:2264-1: important: Security update for the Linux Kernel Message-ID: <176289378832.19246.3489964374855774634@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:2264-1 Release Date: 2025-11-11T17:11:26Z Rating: important References: * bsc#1065729 * bsc#1156395 * bsc#1193629 * bsc#1194869 * bsc#1198410 * bsc#1199356 * bsc#1199487 * bsc#1201160 * bsc#1201956 * bsc#1202094 * bsc#1202095 * bsc#1202564 * bsc#1202716 * bsc#1202823 * bsc#1202860 * bsc#1203197 * bsc#1203361 * bsc#1205220 * bsc#1205514 * bsc#1205701 * bsc#1206451 * bsc#1206664 * bsc#1206878 * bsc#1206880 * bsc#1207361 * bsc#1207638 * bsc#1211226 * bsc#1212051 * bsc#1213090 * bsc#1218184 * bsc#1218234 * bsc#1218470 * bsc#1222634 * bsc#1223675 * bsc#1224095 * bsc#1224597 * bsc#1225468 * bsc#1225820 * bsc#1226514 * bsc#1226552 * bsc#1230827 * bsc#1232504 * bsc#1234156 * bsc#1234381 * bsc#1235464 * bsc#1235637 * bsc#1236821 * bsc#1236822 * bsc#1237159 * bsc#1237312 * bsc#1237313 * bsc#1238526 * bsc#1238876 * bsc#1241900 * bsc#1242221 * bsc#1242414 * bsc#1242504 * bsc#1242596 * bsc#1242778 * bsc#1242782 * bsc#1242924 * bsc#1243330 * bsc#1243543 * bsc#1243627 * bsc#1243649 * bsc#1243660 * bsc#1243832 * bsc#1244114 * bsc#1244179 * bsc#1244180 * bsc#1244234 * bsc#1244241 * bsc#1244277 * bsc#1244309 * bsc#1244337 * bsc#1244732 * bsc#1244764 * bsc#1244765 * bsc#1244767 * bsc#1244770 * bsc#1244771 * bsc#1244772 * bsc#1244773 * bsc#1244774 * bsc#1244776 * bsc#1244779 * bsc#1244780 * bsc#1244781 * bsc#1244782 * bsc#1244783 * bsc#1244784 * bsc#1244786 * bsc#1244787 * bsc#1244788 * bsc#1244790 * bsc#1244791 * bsc#1244793 * bsc#1244794 * bsc#1244796 * bsc#1244797 * bsc#1244798 * bsc#1244800 * bsc#1244802 * bsc#1244804 * bsc#1244805 * bsc#1244806 * bsc#1244807 * bsc#1244808 * bsc#1244811 * bsc#1244813 * bsc#1244814 * bsc#1244815 * bsc#1244816 * bsc#1244819 * bsc#1244820 * bsc#1244823 * bsc#1244824 * bsc#1244825 * bsc#1244826 * bsc#1244827 * bsc#1244830 * bsc#1244831 * bsc#1244832 * bsc#1244834 * bsc#1244836 * bsc#1244838 * bsc#1244839 * bsc#1244840 * bsc#1244841 * bsc#1244842 * bsc#1244843 * bsc#1244845 * bsc#1244846 * bsc#1244848 * bsc#1244849 * bsc#1244851 * bsc#1244853 * bsc#1244854 * bsc#1244856 * bsc#1244858 * bsc#1244860 * bsc#1244861 * bsc#1244866 * bsc#1244867 * bsc#1244868 * bsc#1244869 * bsc#1244870 * bsc#1244871 * bsc#1244872 * bsc#1244873 * bsc#1244875 * bsc#1244876 * bsc#1244878 * bsc#1244879 * bsc#1244881 * bsc#1244883 * bsc#1244884 * bsc#1244886 * bsc#1244887 * bsc#1244888 * bsc#1244890 * bsc#1244892 * bsc#1244893 * bsc#1244895 * bsc#1244898 * bsc#1244899 * bsc#1244900 * bsc#1244901 * bsc#1244902 * bsc#1244903 * bsc#1244904 * bsc#1244905 * bsc#1244908 * bsc#1244911 * bsc#1244912 * bsc#1244914 * bsc#1244915 * bsc#1244928 * bsc#1244936 * bsc#1244940 * bsc#1244941 * bsc#1244942 * bsc#1244943 * bsc#1244944 * bsc#1244945 * bsc#1244948 * bsc#1244949 * bsc#1244950 * bsc#1244953 * bsc#1244955 * bsc#1244956 * bsc#1244957 * bsc#1244958 * bsc#1244959 * bsc#1244960 * bsc#1244961 * bsc#1244965 * bsc#1244966 * bsc#1244967 * bsc#1244968 * bsc#1244969 * bsc#1244970 * bsc#1244973 * bsc#1244974 * bsc#1244976 * bsc#1244977 * bsc#1244978 * bsc#1244979 * bsc#1244983 * bsc#1244984 * bsc#1244985 * bsc#1244986 * bsc#1244987 * bsc#1244991 * bsc#1244992 * bsc#1244993 * bsc#1245006 * bsc#1245007 * bsc#1245009 * bsc#1245011 * bsc#1245012 * bsc#1245015 * bsc#1245018 * bsc#1245019 * bsc#1245023 * bsc#1245024 * bsc#1245028 * bsc#1245031 * bsc#1245032 * bsc#1245033 * bsc#1245038 * bsc#1245039 * bsc#1245040 * bsc#1245041 * bsc#1245047 * bsc#1245048 * bsc#1245051 * bsc#1245052 * bsc#1245057 * bsc#1245058 * bsc#1245060 * bsc#1245062 * bsc#1245063 * bsc#1245064 * bsc#1245069 * bsc#1245070 * bsc#1245072 * bsc#1245073 * bsc#1245088 * bsc#1245089 * bsc#1245092 * bsc#1245093 * bsc#1245094 * bsc#1245098 * bsc#1245103 * bsc#1245116 * bsc#1245117 * bsc#1245118 * bsc#1245119 * bsc#1245121 * bsc#1245122 * bsc#1245125 * bsc#1245129 * bsc#1245131 * bsc#1245133 * bsc#1245134 * bsc#1245135 * bsc#1245136 * bsc#1245138 * bsc#1245139 * bsc#1245140 * bsc#1245142 * bsc#1245146 * bsc#1245147 * bsc#1245149 * bsc#1245152 * bsc#1245154 * bsc#1245155 * bsc#1245180 * bsc#1245183 * bsc#1245189 * bsc#1245191 * bsc#1245195 * bsc#1245197 * bsc#1245265 * bsc#1245340 * bsc#1245348 * bsc#1245431 * bsc#1245455 Cross-References: * CVE-2021-47557 * CVE-2021-47595 * CVE-2022-1679 * CVE-2022-2585 * CVE-2022-2586 * CVE-2022-2905 * CVE-2022-3903 * CVE-2022-4095 * CVE-2022-4662 * CVE-2022-49934 * CVE-2022-49935 * CVE-2022-49936 * CVE-2022-49937 * CVE-2022-49938 * CVE-2022-49940 * CVE-2022-49942 * CVE-2022-49943 * CVE-2022-49944 * CVE-2022-49945 * CVE-2022-49946 * CVE-2022-49948 * CVE-2022-49949 * CVE-2022-49950 * CVE-2022-49951 * CVE-2022-49952 * CVE-2022-49954 * CVE-2022-49956 * CVE-2022-49957 * CVE-2022-49958 * CVE-2022-49960 * CVE-2022-49962 * CVE-2022-49963 * CVE-2022-49964 * CVE-2022-49965 * CVE-2022-49966 * CVE-2022-49968 * CVE-2022-49969 * CVE-2022-49971 * CVE-2022-49972 * CVE-2022-49977 * CVE-2022-49978 * CVE-2022-49980 * CVE-2022-49981 * CVE-2022-49982 * CVE-2022-49983 * CVE-2022-49984 * CVE-2022-49985 * CVE-2022-49986 * CVE-2022-49987 * CVE-2022-49989 * CVE-2022-49990 * CVE-2022-49993 * CVE-2022-49995 * CVE-2022-49999 * CVE-2022-50002 * CVE-2022-50003 * CVE-2022-50005 * CVE-2022-50006 * CVE-2022-50008 * CVE-2022-50010 * CVE-2022-50011 * CVE-2022-50012 * CVE-2022-50015 * CVE-2022-50016 * CVE-2022-50019 * CVE-2022-50020 * CVE-2022-50021 * CVE-2022-50022 * CVE-2022-50023 * CVE-2022-50024 * CVE-2022-50026 * CVE-2022-50027 * CVE-2022-50028 * CVE-2022-50029 * CVE-2022-50030 * CVE-2022-50031 * CVE-2022-50032 * CVE-2022-50033 * CVE-2022-50034 * CVE-2022-50035 * CVE-2022-50036 * CVE-2022-50037 * CVE-2022-50038 * CVE-2022-50039 * CVE-2022-50040 * CVE-2022-50041 * CVE-2022-50044 * CVE-2022-50045 * CVE-2022-50046 * CVE-2022-50047 * CVE-2022-50049 * CVE-2022-50050 * CVE-2022-50051 * CVE-2022-50052 * CVE-2022-50053 * CVE-2022-50054 * CVE-2022-50055 * CVE-2022-50059 * CVE-2022-50060 * CVE-2022-50061 * CVE-2022-50062 * CVE-2022-50065 * CVE-2022-50066 * CVE-2022-50067 * CVE-2022-50068 * CVE-2022-50072 * CVE-2022-50073 * CVE-2022-50074 * CVE-2022-50076 * CVE-2022-50077 * CVE-2022-50079 * CVE-2022-50083 * CVE-2022-50084 * CVE-2022-50085 * CVE-2022-50086 * CVE-2022-50087 * CVE-2022-50092 * CVE-2022-50093 * CVE-2022-50094 * CVE-2022-50095 * CVE-2022-50097 * CVE-2022-50098 * CVE-2022-50099 * CVE-2022-50100 * CVE-2022-50101 * CVE-2022-50102 * CVE-2022-50103 * CVE-2022-50104 * CVE-2022-50108 * CVE-2022-50109 * CVE-2022-50110 * CVE-2022-50111 * CVE-2022-50112 * CVE-2022-50115 * CVE-2022-50116 * CVE-2022-50117 * CVE-2022-50118 * CVE-2022-50120 * CVE-2022-50121 * CVE-2022-50124 * CVE-2022-50125 * CVE-2022-50126 * CVE-2022-50127 * CVE-2022-50129 * CVE-2022-50131 * CVE-2022-50132 * CVE-2022-50133 * CVE-2022-50134 * CVE-2022-50135 * CVE-2022-50136 * CVE-2022-50137 * CVE-2022-50138 * CVE-2022-50139 * CVE-2022-50140 * CVE-2022-50141 * CVE-2022-50142 * CVE-2022-50143 * CVE-2022-50144 * CVE-2022-50145 * CVE-2022-50146 * CVE-2022-50149 * CVE-2022-50151 * CVE-2022-50152 * CVE-2022-50153 * CVE-2022-50154 * CVE-2022-50155 * CVE-2022-50156 * CVE-2022-50157 * CVE-2022-50158 * CVE-2022-50160 * CVE-2022-50161 * CVE-2022-50162 * CVE-2022-50164 * CVE-2022-50165 * CVE-2022-50166 * CVE-2022-50169 * CVE-2022-50171 * CVE-2022-50172 * CVE-2022-50173 * CVE-2022-50175 * CVE-2022-50176 * CVE-2022-50178 * CVE-2022-50179 * CVE-2022-50181 * CVE-2022-50183 * CVE-2022-50184 * CVE-2022-50185 * CVE-2022-50186 * CVE-2022-50187 * CVE-2022-50188 * CVE-2022-50190 * CVE-2022-50191 * CVE-2022-50192 * CVE-2022-50194 * CVE-2022-50196 * CVE-2022-50197 * CVE-2022-50198 * CVE-2022-50199 * CVE-2022-50200 * CVE-2022-50201 * CVE-2022-50202 * CVE-2022-50203 * CVE-2022-50204 * CVE-2022-50206 * CVE-2022-50207 * CVE-2022-50208 * CVE-2022-50209 * CVE-2022-50211 * CVE-2022-50212 * CVE-2022-50213 * CVE-2022-50215 * CVE-2022-50218 * CVE-2022-50220 * CVE-2022-50221 * CVE-2022-50222 * CVE-2022-50226 * CVE-2022-50228 * CVE-2022-50229 * CVE-2022-50231 * CVE-2023-3111 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-53046 * CVE-2023-53048 * CVE-2023-53076 * CVE-2023-53097 * CVE-2024-26808 * CVE-2024-26924 * CVE-2024-26935 * CVE-2024-27397 * CVE-2024-35840 * CVE-2024-36978 * CVE-2024-46800 * CVE-2024-53125 * CVE-2024-53141 * CVE-2024-53197 * CVE-2024-56770 * CVE-2024-57999 * CVE-2025-21700 * CVE-2025-21702 * CVE-2025-21703 * CVE-2025-21756 * CVE-2025-23141 * CVE-2025-23145 * CVE-2025-37752 * CVE-2025-37798 * CVE-2025-37823 * CVE-2025-37890 * CVE-2025-37932 * CVE-2025-37948 * CVE-2025-37953 * CVE-2025-37963 * CVE-2025-37997 * CVE-2025-38000 * CVE-2025-38001 * CVE-2025-38014 * CVE-2025-38060 * CVE-2025-38083 CVSS scores: * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47595 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1679 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2585 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2585 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-2905 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-2905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-3903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3903 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3903 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4095 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49934 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49934 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49937 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49937 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49938 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49940 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49942 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49943 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-49944 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49945 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49945 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49949 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49960 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49960 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49962 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49963 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49964 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49964 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-49965 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49965 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49966 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49966 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49969 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49971 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49977 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49977 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49980 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49981 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50019 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50020 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50020 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-50021 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50021 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50022 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50022 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50023 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50027 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50028 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50028 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50030 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50030 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50031 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50032 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50068 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50084 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50085 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50085 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50169 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50200 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50200 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50201 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50201 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50202 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50202 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50203 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50206 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50206 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50211 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50211 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50215 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50215 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50220 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50220 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2022-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50222 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-50222 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-50226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3111 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52924 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53097 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-27397 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27397 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53125 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53197 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21702 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21702 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21703 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21756 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37997 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37997 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38000 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38000 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38001 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38014 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38060 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38060 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 258 vulnerabilities and has 31 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2264=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.113.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-1-150500.11.3.1 * kernel-default-debuginfo-5.14.21-150500.55.113.1 * kernel-default-debugsource-5.14.21-150500.55.113.1 * kernel-default-livepatch-devel-5.14.21-150500.55.113.1 * kernel-default-livepatch-5.14.21-150500.55.113.1 * kernel-livepatch-5_14_21-150500_55_113-default-1-150500.11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47595.html * https://www.suse.com/security/cve/CVE-2022-1679.html * https://www.suse.com/security/cve/CVE-2022-2585.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2022-2905.html * https://www.suse.com/security/cve/CVE-2022-3903.html * https://www.suse.com/security/cve/CVE-2022-4095.html * https://www.suse.com/security/cve/CVE-2022-4662.html * https://www.suse.com/security/cve/CVE-2022-49934.html * https://www.suse.com/security/cve/CVE-2022-49935.html * https://www.suse.com/security/cve/CVE-2022-49936.html * https://www.suse.com/security/cve/CVE-2022-49937.html * https://www.suse.com/security/cve/CVE-2022-49938.html * https://www.suse.com/security/cve/CVE-2022-49940.html * https://www.suse.com/security/cve/CVE-2022-49942.html * https://www.suse.com/security/cve/CVE-2022-49943.html * https://www.suse.com/security/cve/CVE-2022-49944.html * https://www.suse.com/security/cve/CVE-2022-49945.html * https://www.suse.com/security/cve/CVE-2022-49946.html * https://www.suse.com/security/cve/CVE-2022-49948.html * https://www.suse.com/security/cve/CVE-2022-49949.html * https://www.suse.com/security/cve/CVE-2022-49950.html * https://www.suse.com/security/cve/CVE-2022-49951.html * https://www.suse.com/security/cve/CVE-2022-49952.html * https://www.suse.com/security/cve/CVE-2022-49954.html * https://www.suse.com/security/cve/CVE-2022-49956.html * https://www.suse.com/security/cve/CVE-2022-49957.html * https://www.suse.com/security/cve/CVE-2022-49958.html * https://www.suse.com/security/cve/CVE-2022-49960.html * https://www.suse.com/security/cve/CVE-2022-49962.html * https://www.suse.com/security/cve/CVE-2022-49963.html * https://www.suse.com/security/cve/CVE-2022-49964.html * https://www.suse.com/security/cve/CVE-2022-49965.html * https://www.suse.com/security/cve/CVE-2022-49966.html * https://www.suse.com/security/cve/CVE-2022-49968.html * https://www.suse.com/security/cve/CVE-2022-49969.html * https://www.suse.com/security/cve/CVE-2022-49971.html * https://www.suse.com/security/cve/CVE-2022-49972.html * https://www.suse.com/security/cve/CVE-2022-49977.html * https://www.suse.com/security/cve/CVE-2022-49978.html * https://www.suse.com/security/cve/CVE-2022-49980.html * https://www.suse.com/security/cve/CVE-2022-49981.html * https://www.suse.com/security/cve/CVE-2022-49982.html * https://www.suse.com/security/cve/CVE-2022-49983.html * https://www.suse.com/security/cve/CVE-2022-49984.html * https://www.suse.com/security/cve/CVE-2022-49985.html * https://www.suse.com/security/cve/CVE-2022-49986.html * https://www.suse.com/security/cve/CVE-2022-49987.html * https://www.suse.com/security/cve/CVE-2022-49989.html * https://www.suse.com/security/cve/CVE-2022-49990.html * https://www.suse.com/security/cve/CVE-2022-49993.html * https://www.suse.com/security/cve/CVE-2022-49995.html * https://www.suse.com/security/cve/CVE-2022-49999.html * https://www.suse.com/security/cve/CVE-2022-50002.html * https://www.suse.com/security/cve/CVE-2022-50003.html * https://www.suse.com/security/cve/CVE-2022-50005.html * https://www.suse.com/security/cve/CVE-2022-50006.html * https://www.suse.com/security/cve/CVE-2022-50008.html * https://www.suse.com/security/cve/CVE-2022-50010.html * https://www.suse.com/security/cve/CVE-2022-50011.html * https://www.suse.com/security/cve/CVE-2022-50012.html * https://www.suse.com/security/cve/CVE-2022-50015.html * https://www.suse.com/security/cve/CVE-2022-50016.html * https://www.suse.com/security/cve/CVE-2022-50019.html * https://www.suse.com/security/cve/CVE-2022-50020.html * https://www.suse.com/security/cve/CVE-2022-50021.html * https://www.suse.com/security/cve/CVE-2022-50022.html * https://www.suse.com/security/cve/CVE-2022-50023.html * https://www.suse.com/security/cve/CVE-2022-50024.html * https://www.suse.com/security/cve/CVE-2022-50026.html * https://www.suse.com/security/cve/CVE-2022-50027.html * https://www.suse.com/security/cve/CVE-2022-50028.html * https://www.suse.com/security/cve/CVE-2022-50029.html * https://www.suse.com/security/cve/CVE-2022-50030.html * https://www.suse.com/security/cve/CVE-2022-50031.html * https://www.suse.com/security/cve/CVE-2022-50032.html * https://www.suse.com/security/cve/CVE-2022-50033.html * https://www.suse.com/security/cve/CVE-2022-50034.html * https://www.suse.com/security/cve/CVE-2022-50035.html * https://www.suse.com/security/cve/CVE-2022-50036.html * https://www.suse.com/security/cve/CVE-2022-50037.html * https://www.suse.com/security/cve/CVE-2022-50038.html * https://www.suse.com/security/cve/CVE-2022-50039.html * https://www.suse.com/security/cve/CVE-2022-50040.html * https://www.suse.com/security/cve/CVE-2022-50041.html * https://www.suse.com/security/cve/CVE-2022-50044.html * https://www.suse.com/security/cve/CVE-2022-50045.html * https://www.suse.com/security/cve/CVE-2022-50046.html * https://www.suse.com/security/cve/CVE-2022-50047.html * https://www.suse.com/security/cve/CVE-2022-50049.html * https://www.suse.com/security/cve/CVE-2022-50050.html * https://www.suse.com/security/cve/CVE-2022-50051.html * https://www.suse.com/security/cve/CVE-2022-50052.html * https://www.suse.com/security/cve/CVE-2022-50053.html * https://www.suse.com/security/cve/CVE-2022-50054.html * https://www.suse.com/security/cve/CVE-2022-50055.html * https://www.suse.com/security/cve/CVE-2022-50059.html * https://www.suse.com/security/cve/CVE-2022-50060.html * https://www.suse.com/security/cve/CVE-2022-50061.html * https://www.suse.com/security/cve/CVE-2022-50062.html * https://www.suse.com/security/cve/CVE-2022-50065.html * https://www.suse.com/security/cve/CVE-2022-50066.html * https://www.suse.com/security/cve/CVE-2022-50067.html * https://www.suse.com/security/cve/CVE-2022-50068.html * https://www.suse.com/security/cve/CVE-2022-50072.html * https://www.suse.com/security/cve/CVE-2022-50073.html * https://www.suse.com/security/cve/CVE-2022-50074.html * https://www.suse.com/security/cve/CVE-2022-50076.html * https://www.suse.com/security/cve/CVE-2022-50077.html * https://www.suse.com/security/cve/CVE-2022-50079.html * https://www.suse.com/security/cve/CVE-2022-50083.html * https://www.suse.com/security/cve/CVE-2022-50084.html * https://www.suse.com/security/cve/CVE-2022-50085.html * https://www.suse.com/security/cve/CVE-2022-50086.html * https://www.suse.com/security/cve/CVE-2022-50087.html * https://www.suse.com/security/cve/CVE-2022-50092.html * https://www.suse.com/security/cve/CVE-2022-50093.html * https://www.suse.com/security/cve/CVE-2022-50094.html * https://www.suse.com/security/cve/CVE-2022-50095.html * https://www.suse.com/security/cve/CVE-2022-50097.html * https://www.suse.com/security/cve/CVE-2022-50098.html * https://www.suse.com/security/cve/CVE-2022-50099.html * https://www.suse.com/security/cve/CVE-2022-50100.html * https://www.suse.com/security/cve/CVE-2022-50101.html * https://www.suse.com/security/cve/CVE-2022-50102.html * https://www.suse.com/security/cve/CVE-2022-50103.html * https://www.suse.com/security/cve/CVE-2022-50104.html * https://www.suse.com/security/cve/CVE-2022-50108.html * https://www.suse.com/security/cve/CVE-2022-50109.html * https://www.suse.com/security/cve/CVE-2022-50110.html * https://www.suse.com/security/cve/CVE-2022-50111.html * https://www.suse.com/security/cve/CVE-2022-50112.html * https://www.suse.com/security/cve/CVE-2022-50115.html * https://www.suse.com/security/cve/CVE-2022-50116.html * https://www.suse.com/security/cve/CVE-2022-50117.html * https://www.suse.com/security/cve/CVE-2022-50118.html * https://www.suse.com/security/cve/CVE-2022-50120.html * https://www.suse.com/security/cve/CVE-2022-50121.html * https://www.suse.com/security/cve/CVE-2022-50124.html * https://www.suse.com/security/cve/CVE-2022-50125.html * https://www.suse.com/security/cve/CVE-2022-50126.html * https://www.suse.com/security/cve/CVE-2022-50127.html * https://www.suse.com/security/cve/CVE-2022-50129.html * https://www.suse.com/security/cve/CVE-2022-50131.html * https://www.suse.com/security/cve/CVE-2022-50132.html * https://www.suse.com/security/cve/CVE-2022-50133.html * https://www.suse.com/security/cve/CVE-2022-50134.html * https://www.suse.com/security/cve/CVE-2022-50135.html * https://www.suse.com/security/cve/CVE-2022-50136.html * https://www.suse.com/security/cve/CVE-2022-50137.html * https://www.suse.com/security/cve/CVE-2022-50138.html * https://www.suse.com/security/cve/CVE-2022-50139.html * https://www.suse.com/security/cve/CVE-2022-50140.html * https://www.suse.com/security/cve/CVE-2022-50141.html * https://www.suse.com/security/cve/CVE-2022-50142.html * https://www.suse.com/security/cve/CVE-2022-50143.html * https://www.suse.com/security/cve/CVE-2022-50144.html * https://www.suse.com/security/cve/CVE-2022-50145.html * https://www.suse.com/security/cve/CVE-2022-50146.html * https://www.suse.com/security/cve/CVE-2022-50149.html * https://www.suse.com/security/cve/CVE-2022-50151.html * https://www.suse.com/security/cve/CVE-2022-50152.html * https://www.suse.com/security/cve/CVE-2022-50153.html * https://www.suse.com/security/cve/CVE-2022-50154.html * https://www.suse.com/security/cve/CVE-2022-50155.html * https://www.suse.com/security/cve/CVE-2022-50156.html * https://www.suse.com/security/cve/CVE-2022-50157.html * https://www.suse.com/security/cve/CVE-2022-50158.html * https://www.suse.com/security/cve/CVE-2022-50160.html * https://www.suse.com/security/cve/CVE-2022-50161.html * https://www.suse.com/security/cve/CVE-2022-50162.html * https://www.suse.com/security/cve/CVE-2022-50164.html * https://www.suse.com/security/cve/CVE-2022-50165.html * https://www.suse.com/security/cve/CVE-2022-50166.html * https://www.suse.com/security/cve/CVE-2022-50169.html * https://www.suse.com/security/cve/CVE-2022-50171.html * https://www.suse.com/security/cve/CVE-2022-50172.html * https://www.suse.com/security/cve/CVE-2022-50173.html * https://www.suse.com/security/cve/CVE-2022-50175.html * https://www.suse.com/security/cve/CVE-2022-50176.html * https://www.suse.com/security/cve/CVE-2022-50178.html * https://www.suse.com/security/cve/CVE-2022-50179.html * https://www.suse.com/security/cve/CVE-2022-50181.html * https://www.suse.com/security/cve/CVE-2022-50183.html * https://www.suse.com/security/cve/CVE-2022-50184.html * https://www.suse.com/security/cve/CVE-2022-50185.html * https://www.suse.com/security/cve/CVE-2022-50186.html * https://www.suse.com/security/cve/CVE-2022-50187.html * https://www.suse.com/security/cve/CVE-2022-50188.html * https://www.suse.com/security/cve/CVE-2022-50190.html * https://www.suse.com/security/cve/CVE-2022-50191.html * https://www.suse.com/security/cve/CVE-2022-50192.html * https://www.suse.com/security/cve/CVE-2022-50194.html * https://www.suse.com/security/cve/CVE-2022-50196.html * https://www.suse.com/security/cve/CVE-2022-50197.html * https://www.suse.com/security/cve/CVE-2022-50198.html * https://www.suse.com/security/cve/CVE-2022-50199.html * https://www.suse.com/security/cve/CVE-2022-50200.html * https://www.suse.com/security/cve/CVE-2022-50201.html * https://www.suse.com/security/cve/CVE-2022-50202.html * https://www.suse.com/security/cve/CVE-2022-50203.html * https://www.suse.com/security/cve/CVE-2022-50204.html * https://www.suse.com/security/cve/CVE-2022-50206.html * https://www.suse.com/security/cve/CVE-2022-50207.html * https://www.suse.com/security/cve/CVE-2022-50208.html * https://www.suse.com/security/cve/CVE-2022-50209.html * https://www.suse.com/security/cve/CVE-2022-50211.html * https://www.suse.com/security/cve/CVE-2022-50212.html * https://www.suse.com/security/cve/CVE-2022-50213.html * https://www.suse.com/security/cve/CVE-2022-50215.html * https://www.suse.com/security/cve/CVE-2022-50218.html * https://www.suse.com/security/cve/CVE-2022-50220.html * https://www.suse.com/security/cve/CVE-2022-50221.html * https://www.suse.com/security/cve/CVE-2022-50222.html * https://www.suse.com/security/cve/CVE-2022-50226.html * https://www.suse.com/security/cve/CVE-2022-50228.html * https://www.suse.com/security/cve/CVE-2022-50229.html * https://www.suse.com/security/cve/CVE-2022-50231.html * https://www.suse.com/security/cve/CVE-2023-3111.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-53046.html * https://www.suse.com/security/cve/CVE-2023-53048.html * https://www.suse.com/security/cve/CVE-2023-53076.html * https://www.suse.com/security/cve/CVE-2023-53097.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-36978.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-53197.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37752.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://www.suse.com/security/cve/CVE-2025-37997.html * https://www.suse.com/security/cve/CVE-2025-38000.html * https://www.suse.com/security/cve/CVE-2025-38001.html * https://www.suse.com/security/cve/CVE-2025-38014.html * https://www.suse.com/security/cve/CVE-2025-38060.html * https://www.suse.com/security/cve/CVE-2025-38083.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1198410 * https://bugzilla.suse.com/show_bug.cgi?id=1199356 * https://bugzilla.suse.com/show_bug.cgi?id=1199487 * https://bugzilla.suse.com/show_bug.cgi?id=1201160 * https://bugzilla.suse.com/show_bug.cgi?id=1201956 * https://bugzilla.suse.com/show_bug.cgi?id=1202094 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1202564 * https://bugzilla.suse.com/show_bug.cgi?id=1202716 * https://bugzilla.suse.com/show_bug.cgi?id=1202823 * https://bugzilla.suse.com/show_bug.cgi?id=1202860 * https://bugzilla.suse.com/show_bug.cgi?id=1203197 * https://bugzilla.suse.com/show_bug.cgi?id=1203361 * https://bugzilla.suse.com/show_bug.cgi?id=1205220 * https://bugzilla.suse.com/show_bug.cgi?id=1205514 * https://bugzilla.suse.com/show_bug.cgi?id=1205701 * https://bugzilla.suse.com/show_bug.cgi?id=1206451 * https://bugzilla.suse.com/show_bug.cgi?id=1206664 * https://bugzilla.suse.com/show_bug.cgi?id=1206878 * https://bugzilla.suse.com/show_bug.cgi?id=1206880 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207638 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212051 * https://bugzilla.suse.com/show_bug.cgi?id=1213090 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1226514 * https://bugzilla.suse.com/show_bug.cgi?id=1226552 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1235464 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1241900 * https://bugzilla.suse.com/show_bug.cgi?id=1242221 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242504 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243832 * https://bugzilla.suse.com/show_bug.cgi?id=1244114 * https://bugzilla.suse.com/show_bug.cgi?id=1244179 * https://bugzilla.suse.com/show_bug.cgi?id=1244180 * https://bugzilla.suse.com/show_bug.cgi?id=1244234 * https://bugzilla.suse.com/show_bug.cgi?id=1244241 * https://bugzilla.suse.com/show_bug.cgi?id=1244277 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244337 * https://bugzilla.suse.com/show_bug.cgi?id=1244732 * https://bugzilla.suse.com/show_bug.cgi?id=1244764 * https://bugzilla.suse.com/show_bug.cgi?id=1244765 * https://bugzilla.suse.com/show_bug.cgi?id=1244767 * https://bugzilla.suse.com/show_bug.cgi?id=1244770 * https://bugzilla.suse.com/show_bug.cgi?id=1244771 * https://bugzilla.suse.com/show_bug.cgi?id=1244772 * https://bugzilla.suse.com/show_bug.cgi?id=1244773 * https://bugzilla.suse.com/show_bug.cgi?id=1244774 * https://bugzilla.suse.com/show_bug.cgi?id=1244776 * https://bugzilla.suse.com/show_bug.cgi?id=1244779 * https://bugzilla.suse.com/show_bug.cgi?id=1244780 * https://bugzilla.suse.com/show_bug.cgi?id=1244781 * https://bugzilla.suse.com/show_bug.cgi?id=1244782 * https://bugzilla.suse.com/show_bug.cgi?id=1244783 * https://bugzilla.suse.com/show_bug.cgi?id=1244784 * https://bugzilla.suse.com/show_bug.cgi?id=1244786 * https://bugzilla.suse.com/show_bug.cgi?id=1244787 * https://bugzilla.suse.com/show_bug.cgi?id=1244788 * https://bugzilla.suse.com/show_bug.cgi?id=1244790 * https://bugzilla.suse.com/show_bug.cgi?id=1244791 * https://bugzilla.suse.com/show_bug.cgi?id=1244793 * https://bugzilla.suse.com/show_bug.cgi?id=1244794 * https://bugzilla.suse.com/show_bug.cgi?id=1244796 * https://bugzilla.suse.com/show_bug.cgi?id=1244797 * https://bugzilla.suse.com/show_bug.cgi?id=1244798 * https://bugzilla.suse.com/show_bug.cgi?id=1244800 * https://bugzilla.suse.com/show_bug.cgi?id=1244802 * https://bugzilla.suse.com/show_bug.cgi?id=1244804 * https://bugzilla.suse.com/show_bug.cgi?id=1244805 * https://bugzilla.suse.com/show_bug.cgi?id=1244806 * https://bugzilla.suse.com/show_bug.cgi?id=1244807 * https://bugzilla.suse.com/show_bug.cgi?id=1244808 * https://bugzilla.suse.com/show_bug.cgi?id=1244811 * https://bugzilla.suse.com/show_bug.cgi?id=1244813 * https://bugzilla.suse.com/show_bug.cgi?id=1244814 * https://bugzilla.suse.com/show_bug.cgi?id=1244815 * https://bugzilla.suse.com/show_bug.cgi?id=1244816 * https://bugzilla.suse.com/show_bug.cgi?id=1244819 * https://bugzilla.suse.com/show_bug.cgi?id=1244820 * https://bugzilla.suse.com/show_bug.cgi?id=1244823 * https://bugzilla.suse.com/show_bug.cgi?id=1244824 * https://bugzilla.suse.com/show_bug.cgi?id=1244825 * https://bugzilla.suse.com/show_bug.cgi?id=1244826 * https://bugzilla.suse.com/show_bug.cgi?id=1244827 * https://bugzilla.suse.com/show_bug.cgi?id=1244830 * https://bugzilla.suse.com/show_bug.cgi?id=1244831 * https://bugzilla.suse.com/show_bug.cgi?id=1244832 * https://bugzilla.suse.com/show_bug.cgi?id=1244834 * https://bugzilla.suse.com/show_bug.cgi?id=1244836 * https://bugzilla.suse.com/show_bug.cgi?id=1244838 * https://bugzilla.suse.com/show_bug.cgi?id=1244839 * https://bugzilla.suse.com/show_bug.cgi?id=1244840 * https://bugzilla.suse.com/show_bug.cgi?id=1244841 * https://bugzilla.suse.com/show_bug.cgi?id=1244842 * https://bugzilla.suse.com/show_bug.cgi?id=1244843 * https://bugzilla.suse.com/show_bug.cgi?id=1244845 * https://bugzilla.suse.com/show_bug.cgi?id=1244846 * https://bugzilla.suse.com/show_bug.cgi?id=1244848 * https://bugzilla.suse.com/show_bug.cgi?id=1244849 * https://bugzilla.suse.com/show_bug.cgi?id=1244851 * https://bugzilla.suse.com/show_bug.cgi?id=1244853 * https://bugzilla.suse.com/show_bug.cgi?id=1244854 * https://bugzilla.suse.com/show_bug.cgi?id=1244856 * https://bugzilla.suse.com/show_bug.cgi?id=1244858 * https://bugzilla.suse.com/show_bug.cgi?id=1244860 * https://bugzilla.suse.com/show_bug.cgi?id=1244861 * https://bugzilla.suse.com/show_bug.cgi?id=1244866 * https://bugzilla.suse.com/show_bug.cgi?id=1244867 * https://bugzilla.suse.com/show_bug.cgi?id=1244868 * https://bugzilla.suse.com/show_bug.cgi?id=1244869 * https://bugzilla.suse.com/show_bug.cgi?id=1244870 * https://bugzilla.suse.com/show_bug.cgi?id=1244871 * https://bugzilla.suse.com/show_bug.cgi?id=1244872 * https://bugzilla.suse.com/show_bug.cgi?id=1244873 * https://bugzilla.suse.com/show_bug.cgi?id=1244875 * https://bugzilla.suse.com/show_bug.cgi?id=1244876 * https://bugzilla.suse.com/show_bug.cgi?id=1244878 * https://bugzilla.suse.com/show_bug.cgi?id=1244879 * https://bugzilla.suse.com/show_bug.cgi?id=1244881 * https://bugzilla.suse.com/show_bug.cgi?id=1244883 * https://bugzilla.suse.com/show_bug.cgi?id=1244884 * https://bugzilla.suse.com/show_bug.cgi?id=1244886 * https://bugzilla.suse.com/show_bug.cgi?id=1244887 * https://bugzilla.suse.com/show_bug.cgi?id=1244888 * https://bugzilla.suse.com/show_bug.cgi?id=1244890 * https://bugzilla.suse.com/show_bug.cgi?id=1244892 * https://bugzilla.suse.com/show_bug.cgi?id=1244893 * https://bugzilla.suse.com/show_bug.cgi?id=1244895 * https://bugzilla.suse.com/show_bug.cgi?id=1244898 * https://bugzilla.suse.com/show_bug.cgi?id=1244899 * https://bugzilla.suse.com/show_bug.cgi?id=1244900 * https://bugzilla.suse.com/show_bug.cgi?id=1244901 * https://bugzilla.suse.com/show_bug.cgi?id=1244902 * https://bugzilla.suse.com/show_bug.cgi?id=1244903 * https://bugzilla.suse.com/show_bug.cgi?id=1244904 * https://bugzilla.suse.com/show_bug.cgi?id=1244905 * https://bugzilla.suse.com/show_bug.cgi?id=1244908 * https://bugzilla.suse.com/show_bug.cgi?id=1244911 * https://bugzilla.suse.com/show_bug.cgi?id=1244912 * https://bugzilla.suse.com/show_bug.cgi?id=1244914 * https://bugzilla.suse.com/show_bug.cgi?id=1244915 * https://bugzilla.suse.com/show_bug.cgi?id=1244928 * https://bugzilla.suse.com/show_bug.cgi?id=1244936 * https://bugzilla.suse.com/show_bug.cgi?id=1244940 * https://bugzilla.suse.com/show_bug.cgi?id=1244941 * https://bugzilla.suse.com/show_bug.cgi?id=1244942 * https://bugzilla.suse.com/show_bug.cgi?id=1244943 * https://bugzilla.suse.com/show_bug.cgi?id=1244944 * https://bugzilla.suse.com/show_bug.cgi?id=1244945 * https://bugzilla.suse.com/show_bug.cgi?id=1244948 * https://bugzilla.suse.com/show_bug.cgi?id=1244949 * https://bugzilla.suse.com/show_bug.cgi?id=1244950 * https://bugzilla.suse.com/show_bug.cgi?id=1244953 * https://bugzilla.suse.com/show_bug.cgi?id=1244955 * https://bugzilla.suse.com/show_bug.cgi?id=1244956 * https://bugzilla.suse.com/show_bug.cgi?id=1244957 * https://bugzilla.suse.com/show_bug.cgi?id=1244958 * https://bugzilla.suse.com/show_bug.cgi?id=1244959 * https://bugzilla.suse.com/show_bug.cgi?id=1244960 * https://bugzilla.suse.com/show_bug.cgi?id=1244961 * https://bugzilla.suse.com/show_bug.cgi?id=1244965 * https://bugzilla.suse.com/show_bug.cgi?id=1244966 * https://bugzilla.suse.com/show_bug.cgi?id=1244967 * https://bugzilla.suse.com/show_bug.cgi?id=1244968 * https://bugzilla.suse.com/show_bug.cgi?id=1244969 * https://bugzilla.suse.com/show_bug.cgi?id=1244970 * https://bugzilla.suse.com/show_bug.cgi?id=1244973 * https://bugzilla.suse.com/show_bug.cgi?id=1244974 * https://bugzilla.suse.com/show_bug.cgi?id=1244976 * https://bugzilla.suse.com/show_bug.cgi?id=1244977 * https://bugzilla.suse.com/show_bug.cgi?id=1244978 * https://bugzilla.suse.com/show_bug.cgi?id=1244979 * https://bugzilla.suse.com/show_bug.cgi?id=1244983 * https://bugzilla.suse.com/show_bug.cgi?id=1244984 * https://bugzilla.suse.com/show_bug.cgi?id=1244985 * https://bugzilla.suse.com/show_bug.cgi?id=1244986 * https://bugzilla.suse.com/show_bug.cgi?id=1244987 * https://bugzilla.suse.com/show_bug.cgi?id=1244991 * https://bugzilla.suse.com/show_bug.cgi?id=1244992 * https://bugzilla.suse.com/show_bug.cgi?id=1244993 * https://bugzilla.suse.com/show_bug.cgi?id=1245006 * https://bugzilla.suse.com/show_bug.cgi?id=1245007 * https://bugzilla.suse.com/show_bug.cgi?id=1245009 * https://bugzilla.suse.com/show_bug.cgi?id=1245011 * https://bugzilla.suse.com/show_bug.cgi?id=1245012 * https://bugzilla.suse.com/show_bug.cgi?id=1245015 * https://bugzilla.suse.com/show_bug.cgi?id=1245018 * https://bugzilla.suse.com/show_bug.cgi?id=1245019 * https://bugzilla.suse.com/show_bug.cgi?id=1245023 * https://bugzilla.suse.com/show_bug.cgi?id=1245024 * https://bugzilla.suse.com/show_bug.cgi?id=1245028 * https://bugzilla.suse.com/show_bug.cgi?id=1245031 * https://bugzilla.suse.com/show_bug.cgi?id=1245032 * https://bugzilla.suse.com/show_bug.cgi?id=1245033 * https://bugzilla.suse.com/show_bug.cgi?id=1245038 * https://bugzilla.suse.com/show_bug.cgi?id=1245039 * https://bugzilla.suse.com/show_bug.cgi?id=1245040 * https://bugzilla.suse.com/show_bug.cgi?id=1245041 * https://bugzilla.suse.com/show_bug.cgi?id=1245047 * https://bugzilla.suse.com/show_bug.cgi?id=1245048 * https://bugzilla.suse.com/show_bug.cgi?id=1245051 * https://bugzilla.suse.com/show_bug.cgi?id=1245052 * https://bugzilla.suse.com/show_bug.cgi?id=1245057 * https://bugzilla.suse.com/show_bug.cgi?id=1245058 * https://bugzilla.suse.com/show_bug.cgi?id=1245060 * https://bugzilla.suse.com/show_bug.cgi?id=1245062 * https://bugzilla.suse.com/show_bug.cgi?id=1245063 * https://bugzilla.suse.com/show_bug.cgi?id=1245064 * https://bugzilla.suse.com/show_bug.cgi?id=1245069 * https://bugzilla.suse.com/show_bug.cgi?id=1245070 * https://bugzilla.suse.com/show_bug.cgi?id=1245072 * https://bugzilla.suse.com/show_bug.cgi?id=1245073 * https://bugzilla.suse.com/show_bug.cgi?id=1245088 * https://bugzilla.suse.com/show_bug.cgi?id=1245089 * https://bugzilla.suse.com/show_bug.cgi?id=1245092 * https://bugzilla.suse.com/show_bug.cgi?id=1245093 * https://bugzilla.suse.com/show_bug.cgi?id=1245094 * https://bugzilla.suse.com/show_bug.cgi?id=1245098 * https://bugzilla.suse.com/show_bug.cgi?id=1245103 * https://bugzilla.suse.com/show_bug.cgi?id=1245116 * https://bugzilla.suse.com/show_bug.cgi?id=1245117 * https://bugzilla.suse.com/show_bug.cgi?id=1245118 * https://bugzilla.suse.com/show_bug.cgi?id=1245119 * https://bugzilla.suse.com/show_bug.cgi?id=1245121 * https://bugzilla.suse.com/show_bug.cgi?id=1245122 * https://bugzilla.suse.com/show_bug.cgi?id=1245125 * https://bugzilla.suse.com/show_bug.cgi?id=1245129 * https://bugzilla.suse.com/show_bug.cgi?id=1245131 * https://bugzilla.suse.com/show_bug.cgi?id=1245133 * https://bugzilla.suse.com/show_bug.cgi?id=1245134 * https://bugzilla.suse.com/show_bug.cgi?id=1245135 * https://bugzilla.suse.com/show_bug.cgi?id=1245136 * https://bugzilla.suse.com/show_bug.cgi?id=1245138 * https://bugzilla.suse.com/show_bug.cgi?id=1245139 * https://bugzilla.suse.com/show_bug.cgi?id=1245140 * https://bugzilla.suse.com/show_bug.cgi?id=1245142 * https://bugzilla.suse.com/show_bug.cgi?id=1245146 * https://bugzilla.suse.com/show_bug.cgi?id=1245147 * https://bugzilla.suse.com/show_bug.cgi?id=1245149 * https://bugzilla.suse.com/show_bug.cgi?id=1245152 * https://bugzilla.suse.com/show_bug.cgi?id=1245154 * https://bugzilla.suse.com/show_bug.cgi?id=1245155 * https://bugzilla.suse.com/show_bug.cgi?id=1245180 * https://bugzilla.suse.com/show_bug.cgi?id=1245183 * https://bugzilla.suse.com/show_bug.cgi?id=1245189 * https://bugzilla.suse.com/show_bug.cgi?id=1245191 * https://bugzilla.suse.com/show_bug.cgi?id=1245195 * https://bugzilla.suse.com/show_bug.cgi?id=1245197 * https://bugzilla.suse.com/show_bug.cgi?id=1245265 * https://bugzilla.suse.com/show_bug.cgi?id=1245340 * https://bugzilla.suse.com/show_bug.cgi?id=1245348 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1245455 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 08:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 08:30:11 -0000 Subject: SUSE-SU-2025:4064-1: important: Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3) Message-ID: <176293621198.6197.4616220761082308065@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 60 for SUSE Linux Enterprise 15 SP3) Announcement ID: SUSE-SU-2025:4064-1 Release Date: 2025-11-12T02:35:07Z Rating: important References: * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249841 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50248 * CVE-2022-50252 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.3.18-150300.59.215 fixes various security issues The following security issues were fixed: * CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249841). * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4064=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-4064=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_60-debugsource-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-default-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-default-5-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_215-preempt-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-preempt-5-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_60-debugsource-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-default-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-default-5-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249841 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 08:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 08:30:15 -0000 Subject: SUSE-SU-2025:4063-1: important: Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) Message-ID: <176293621536.6197.13711659290275588105@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 14 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:4063-1 Release Date: 2025-11-12T02:34:57Z Rating: important References: * bsc#1248631 * bsc#1249207 Cross-References: * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_65 fixes several issues. The following security issues were fixed: * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4063=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-4063=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_14-debugsource-3-150600.4.1 * kernel-livepatch-6_4_0-150600_23_65-default-debuginfo-3-150600.4.1 * kernel-livepatch-6_4_0-150600_23_65-default-3-150600.4.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_14-debugsource-3-150600.4.1 * kernel-livepatch-6_4_0-150600_23_65-default-debuginfo-3-150600.4.1 * kernel-livepatch-6_4_0-150600_23_65-default-3-150600.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:10 -0000 Subject: SUSE-SU-2025:4078-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) Message-ID: <176295061069.13655.7928971748348351932@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2025:4078-1 Release Date: 2025-11-12T11:09:53Z Rating: important References: * bsc#1246019 * bsc#1248631 * bsc#1249207 * bsc#1249208 * bsc#1249847 * bsc#1252946 Cross-References: * CVE-2022-50252 * CVE-2024-53164 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38664 CVSS scores: * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.91 fixes various security issues The following security issues were fixed: * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249847). * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631). The following non security issue was fixed: * bsc#1249208: fix livepatching target module name (bsc#1252946) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4078=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4078=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_91-default-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-14-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-14-150500.4.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_91-default-14-150500.4.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-14-150500.4.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-14-150500.4.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://bugzilla.suse.com/show_bug.cgi?id=1246019 * https://bugzilla.suse.com/show_bug.cgi?id=1248631 * https://bugzilla.suse.com/show_bug.cgi?id=1249207 * https://bugzilla.suse.com/show_bug.cgi?id=1249208 * https://bugzilla.suse.com/show_bug.cgi?id=1249847 * https://bugzilla.suse.com/show_bug.cgi?id=1252946 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:14 -0000 Subject: SUSE-SU-2025:4077-1: important: Security update for runc Message-ID: <176295061410.13655.3191417618560903958@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:4077-1 Release Date: 2025-11-12T10:36:13Z Rating: important References: * bsc#1252110 * bsc#1252232 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.3.3. Upstream changelog is available from . bsc#1252232 * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 Update to runc v1.3.2. Upstream changelog is available from bsc#1252110 * Includes an important fix for the CPUSet translation for cgroupv2. Update to runc v1.3.1. Upstream changelog is available from Update to runc v1.3.0. Upstream changelog is available from ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4077=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4077=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * runc-debuginfo-1.3.3-16.70.1 * runc-1.3.3-16.70.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * runc-debuginfo-1.3.3-16.70.1 * runc-1.3.3-16.70.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252110 * https://bugzilla.suse.com/show_bug.cgi?id=1252232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:16 -0000 Subject: SUSE-SU-2025:4076-1: important: Security update for buildah Message-ID: <176295061668.13655.15802582754538418741@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2025:4076-1 Release Date: 2025-11-12T10:36:00Z Rating: important References: * bsc#1253096 Cross-References: * CVE-2025-52881 CVSS scores: * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for buildah fixes the following issues: * CVE-2025-52881: Fixed container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1253096) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4076=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4076=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-4076=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4076=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4076=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4076=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4076=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4076=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150500.3.45.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.45.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.45.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.45.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * buildah-1.35.5-150500.3.45.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * buildah-1.35.5-150500.3.45.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.45.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * buildah-1.35.5-150500.3.45.1 ## References: * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1253096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:20 -0000 Subject: SUSE-SU-2025:4075-1: important: Security update for buildah Message-ID: <176295062008.13655.13044833959087131405@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2025:4075-1 Release Date: 2025-11-12T10:35:26Z Rating: important References: * bsc#1252543 * bsc#1253096 Cross-References: * CVE-2025-52881 CVSS scores: * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for buildah fixes the following issues: * CVE-2025-52881: Fixed container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1253096) Other fixes: * podman and buildah with runc 1.3.2 fail with lots of warnings as rootless (bsc#1252543) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4075=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4075=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4075=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4075=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4075=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150300.8.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * buildah-1.35.5-150300.8.46.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150300.8.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * buildah-1.35.5-150300.8.46.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * buildah-1.35.5-150300.8.46.1 ## References: * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252543 * https://bugzilla.suse.com/show_bug.cgi?id=1253096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:23 -0000 Subject: SUSE-SU-2025:4074-1: important: Security update for buildah Message-ID: <176295062394.13655.1249608533374745274@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2025:4074-1 Release Date: 2025-11-12T10:35:10Z Rating: important References: * bsc#1252543 * bsc#1253096 Cross-References: * CVE-2025-52881 CVSS scores: * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for buildah fixes the following issues: * CVE-2025-52881: Fixed container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1253096) Other fixes: * podman and buildah with runc 1.3.2 fail with lots of warnings as rootless (bsc#1252543) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4074=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4074=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4074=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4074=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4074=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150400.3.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * buildah-1.35.5-150400.3.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * buildah-1.35.5-150400.3.53.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150400.3.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * buildah-1.35.5-150400.3.53.1 ## References: * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252543 * https://bugzilla.suse.com/show_bug.cgi?id=1253096 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:27 -0000 Subject: SUSE-SU-2025:4073-1: important: Security update for runc Message-ID: <176295062731.13655.12742999375826741340@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:4073-1 Release Date: 2025-11-12T10:34:50Z Rating: important References: * bsc#1252110 * bsc#1252232 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for runc fixes the following issues: Update to runc v1.3.3. Upstream changelog is available from . bsc#1252232 * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 Update to runc v1.3.2. Upstream changelog is available from bsc#1252110 * Includes an important fix for the CPUSet translation for cgroupv2. Update to runc v1.3.1. Upstream changelog is available from Update to runc v1.3.0. Upstream changelog is available from ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4073=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4073=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4073=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4073=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4073=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4073=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4073=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-4073=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4073=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4073=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4073=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * runc-1.3.3-150000.85.1 * runc-debuginfo-1.3.3-150000.85.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252110 * https://bugzilla.suse.com/show_bug.cgi?id=1252232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:31 -0000 Subject: SUSE-SU-2025:4072-1: important: Security update for containerd Message-ID: <176295063197.13655.586680132833599133@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:4072-1 Release Date: 2025-11-12T10:33:42Z Rating: important References: * bsc#1253126 * bsc#1253132 Cross-References: * CVE-2024-25621 * CVE-2025-64329 CVSS scores: * CVE-2024-25621 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-25621 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2024-25621 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-64329 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64329 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64329 ( NVD ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for containerd fixes the following issues: * Update to containerd v1.7.29 * CVE-2024-25621: Fixed an overly broad default permission vulnerability. (bsc#1253126) * CVE-2025-64329: Fixed a goroutine leaks which can lead to memory exhaustion on the host. (bsc#1253132) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4072=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4072=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * containerd-1.7.29-16.105.1 * containerd-ctr-1.7.29-16.105.1 * containerd-devel-1.7.29-16.105.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * containerd-1.7.29-16.105.1 * containerd-ctr-1.7.29-16.105.1 * containerd-devel-1.7.29-16.105.1 ## References: * https://www.suse.com/security/cve/CVE-2024-25621.html * https://www.suse.com/security/cve/CVE-2025-64329.html * https://bugzilla.suse.com/show_bug.cgi?id=1253126 * https://bugzilla.suse.com/show_bug.cgi?id=1253132 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:42 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:42 -0000 Subject: SUSE-SU-2025:4068-1: critical: Security update for lasso Message-ID: <176295064219.13655.10123218210560308872@smelt2.prg2.suse.org> # Security update for lasso Announcement ID: SUSE-SU-2025:4068-1 Release Date: 2025-11-12T08:04:40Z Rating: critical References: * bsc#1253092 * bsc#1253093 * bsc#1253095 Cross-References: * CVE-2025-46404 * CVE-2025-46705 * CVE-2025-47151 CVSS scores: * CVE-2025-46404 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46404 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46404 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46705 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47151 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-47151 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47151 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for lasso fixes the following issues: * CVE-2025-46404: Fixed denial of service in Entr'ouvert Lasso (bsc#1253092) * CVE-2025-46705: Fixed denial of service in Entr'ouvert Lasso (bsc#1253093) * CVE-2025-47151: Fixed type confusion vulnerability in the lasso_node_impl_init_from_xml functionality (bsc#1253095) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4068=1 openSUSE-SLE-15.6-2025-4068=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4068=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4068=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4068=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4068=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * lasso-debuginfo-2.8.2-150600.3.5.1 * python3-lasso-debuginfo-2.8.2-150600.3.5.1 * liblasso-devel-2.8.2-150600.3.5.1 * liblasso3-2.8.2-150600.3.5.1 * python3-lasso-2.8.2-150600.3.5.1 * lasso-debugsource-2.8.2-150600.3.5.1 * liblasso3-debuginfo-2.8.2-150600.3.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * lasso-debuginfo-2.8.2-150600.3.5.1 * python3-lasso-debuginfo-2.8.2-150600.3.5.1 * liblasso-devel-2.8.2-150600.3.5.1 * python3-lasso-2.8.2-150600.3.5.1 * lasso-debugsource-2.8.2-150600.3.5.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * lasso-debuginfo-2.8.2-150600.3.5.1 * python3-lasso-debuginfo-2.8.2-150600.3.5.1 * liblasso-devel-2.8.2-150600.3.5.1 * python3-lasso-2.8.2-150600.3.5.1 * lasso-debugsource-2.8.2-150600.3.5.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * liblasso3-2.8.2-150600.3.5.1 * lasso-debuginfo-2.8.2-150600.3.5.1 * lasso-debugsource-2.8.2-150600.3.5.1 * liblasso3-debuginfo-2.8.2-150600.3.5.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * liblasso3-2.8.2-150600.3.5.1 * lasso-debuginfo-2.8.2-150600.3.5.1 * lasso-debugsource-2.8.2-150600.3.5.1 * liblasso3-debuginfo-2.8.2-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46404.html * https://www.suse.com/security/cve/CVE-2025-46705.html * https://www.suse.com/security/cve/CVE-2025-47151.html * https://bugzilla.suse.com/show_bug.cgi?id=1253092 * https://bugzilla.suse.com/show_bug.cgi?id=1253093 * https://bugzilla.suse.com/show_bug.cgi?id=1253095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:30:45 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:30:45 -0000 Subject: SUSE-SU-2025:4067-1: moderate: Security update for openssh Message-ID: <176295064559.13655.14649273737056658029@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:4067-1 Release Date: 2025-11-12T08:03:50Z Rating: moderate References: * bsc#1251198 * bsc#1251199 Cross-References: * CVE-2025-61984 * CVE-2025-61985 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61985 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61985 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61985 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198) * CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4067=1 openSUSE-SLE-15.6-2025-4067=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4067=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4067=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-4067=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4067=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * openssh-common-9.6p1-150600.6.34.1 * openssh-askpass-gnome-debugsource-9.6p1-150600.6.34.1 * openssh-server-debuginfo-9.6p1-150600.6.34.1 * openssh-debugsource-9.6p1-150600.6.34.1 * openssh-cavs-debuginfo-9.6p1-150600.6.34.1 * openssh-clients-debuginfo-9.6p1-150600.6.34.1 * openssh-server-9.6p1-150600.6.34.1 * openssh-common-debuginfo-9.6p1-150600.6.34.1 * openssh-debuginfo-9.6p1-150600.6.34.1 * openssh-9.6p1-150600.6.34.1 * openssh-askpass-gnome-debuginfo-9.6p1-150600.6.34.1 * openssh-helpers-debuginfo-9.6p1-150600.6.34.1 * openssh-clients-9.6p1-150600.6.34.1 * openssh-cavs-9.6p1-150600.6.34.1 * openssh-askpass-gnome-9.6p1-150600.6.34.1 * openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1 * openssh-helpers-9.6p1-150600.6.34.1 * openssh-fips-9.6p1-150600.6.34.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openssh-common-9.6p1-150600.6.34.1 * openssh-server-debuginfo-9.6p1-150600.6.34.1 * openssh-debugsource-9.6p1-150600.6.34.1 * openssh-clients-debuginfo-9.6p1-150600.6.34.1 * openssh-server-9.6p1-150600.6.34.1 * openssh-common-debuginfo-9.6p1-150600.6.34.1 * openssh-debuginfo-9.6p1-150600.6.34.1 * openssh-9.6p1-150600.6.34.1 * openssh-helpers-debuginfo-9.6p1-150600.6.34.1 * openssh-clients-9.6p1-150600.6.34.1 * openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1 * openssh-helpers-9.6p1-150600.6.34.1 * openssh-fips-9.6p1-150600.6.34.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openssh-common-9.6p1-150600.6.34.1 * openssh-server-debuginfo-9.6p1-150600.6.34.1 * openssh-debugsource-9.6p1-150600.6.34.1 * openssh-clients-debuginfo-9.6p1-150600.6.34.1 * openssh-server-9.6p1-150600.6.34.1 * openssh-common-debuginfo-9.6p1-150600.6.34.1 * openssh-debuginfo-9.6p1-150600.6.34.1 * openssh-9.6p1-150600.6.34.1 * openssh-helpers-debuginfo-9.6p1-150600.6.34.1 * openssh-clients-9.6p1-150600.6.34.1 * openssh-server-config-disallow-rootlogin-9.6p1-150600.6.34.1 * openssh-helpers-9.6p1-150600.6.34.1 * openssh-fips-9.6p1-150600.6.34.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-debuginfo-9.6p1-150600.6.34.1 * openssh-askpass-gnome-debugsource-9.6p1-150600.6.34.1 * openssh-askpass-gnome-9.6p1-150600.6.34.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-debuginfo-9.6p1-150600.6.34.1 * openssh-askpass-gnome-debugsource-9.6p1-150600.6.34.1 * openssh-askpass-gnome-9.6p1-150600.6.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://www.suse.com/security/cve/CVE-2025-61985.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 * https://bugzilla.suse.com/show_bug.cgi?id=1251199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 12:31:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 12:31:09 -0000 Subject: SUSE-SU-2025:20992-1: important: Security update 5.1.1 of SUSE Multi-Linux Manager Message-ID: <176295066913.13655.4702088419968350570@smelt2.prg2.suse.org> # Security update 5.1.1 of SUSE Multi-Linux Manager Announcement ID: SUSE-SU-2025:20992-1 Release Date: 2025-10-17T08:47:21Z Rating: important References: * bsc#1229825 * bsc#1241880 * bsc#1243331 * bsc#1243486 * bsc#1243611 * bsc#1243704 * bsc#1244027 * bsc#1244127 * bsc#1244219 * bsc#1244424 * bsc#1244552 * bsc#1244919 * bsc#1245099 * bsc#1245120 * bsc#1245702 * bsc#1246068 * bsc#1246320 * bsc#1246553 * bsc#1246789 * bsc#1246882 * bsc#1246906 * bsc#1247688 * bsc#1247836 * bsc#1248252 * bsc#1249434 * jsc#MSQA-1023 Cross-References: * CVE-2025-53192 CVSS scores: * CVE-2025-53192 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-53192 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L * CVE-2025-53192 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Multi-Linux Manager Proxy 5.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 * SUSE Multi-Linux Manager Server 5.1 An update that solves one vulnerability, contains one feature and has 24 fixes can now be installed. ## Description: This update for SUSE Multi-Linux Manager fixes the following issues: proxy-helm was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Chart rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use traefik.io API group (bsc#1244919) proxy-httpd-image was updated fromv version 5.1.8 to 5.1.10: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies * Version 5.1.9 * Use absolute paths when invoking external commands * Handle large static files outside of wsgi script (bsc#1244424) * Reorganize proxy apache configuration * remove unused access to pub dir * move cobbler configs from the uyuni-config to the proxy package * add max workers limit to 150 (bsc#1244552) * use proxypass instead of wsgi to pass API calls to the server and anonymous dirs (bsc#1241880) * Use existing systemid in proxy httpd if present (bsc#1246789) proxy-salt-broker-image was updated from version 5.1.8 to 5.1.10: * Image rebuilt to the newest version with updated dependencies proxy-squid-image was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Image rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use absolute paths when invoking external commands proxy-squid-image was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Image rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use absolute paths when invoking external commands proxy-tftpd-image was updated fromv version 5.1.7 to 5.1.9: * Version 5.1.9 * Image rebuilt to the newest version with updated dependencies * Version 5.1.8 * Use absolute paths when invoking external commands * Do not block the main tftpd process (bsc#1244424) * Fix selecting of default saltboot entry in grub server-attestation-image was updated from version 5.1.7 to 5.1.10: * CVE-2025-53192: Do not use apache-commons-ognl but its successor ognl (bsc#1248252) * Image rebuilt to the newest version with updated dependencies server-hub-xmlrpc-api-image was updated from version 5.1.7 to 5.1.9: * Image rebuilt to the newest version with updated dependencies server-image was updated from version 5.1.7 to 5.1.9:: * Version 5.1.9 * Install python311-ldap into the server-image (bsc#1245702) * Version 5.1.8 * Move jmx configuration to a persisting folder (bsc#1244219) server-migration-14-16-image was updated from version 5.1.7 to 5.1.9: * Image rebuilt to the newest version with updated dependencies server-postgresql-image was updated from version 5.1.5 to 5.1.7: * Image rebuilt to the newest version with updated dependencies server-saline-image was updated from version 5.1.7 to 5.1.9: * Image rebuilt to the newest version with updated dependencies uyuni-tools was updated from version 5.1.18-0 to 5.1.22-0: * Version 5.1.22-0 * Fix cobbler config migration to standalone files * Fix generated DB certificate subject alternate names * Version 5.1.21-0 * Remove extraneous quotes when getting the running image (bsc#1249434) * Version 5.1.20-0 * Add migration for server monitoring configuration (bsc#1247688) * Version 5.1.19-0 * Add a lowercase version of --logLevel (bsc#1243611) * Stop executing scripts in temporary folder (bsc#1243704) * support config: collect podman inspect for hub container (bsc#1245099) * Use new dedicated path for Cobbler settings (bsc#1244027) * Migrate custom auto installation snippets (bsc#1246320) * Add SUSE Linux Enterprise 15 SP7 to buildin productmap * Fix loading product map from mgradm configuration file (bsc#1246068) * Fix channel override for distro copy * Do not use sudo when running as a root user (bsc#1246882) * Do not require backups to be at the same location for restoring (bsc#1246906) * Fix recomputing proxy images when installing a PTF or TEST (bsc#1246553) * Add mgradm server rename to change the server FQDN (bsc#1229825) * If no DB SSL CA parameter is given, use the other one (bsc#1245120) * More fault tolerant mgradm stop (bsc#1243331) * Backup systemd dropin directory too and create if missing * Add 3rd party SSL options for upgrade and migration scenarios * Do not consider stderr output of podman as an error (bsc#1247836) * Restore SELinux contexts for restored backup volumes (bsc#1244127) * Automatically get up-to-date systemid file on salt based proxy hosts (bsc#1246789) * Bump the default image tag to 5.1.1 How to apply this update: SUSE Multi-Linux Manager Server: 1. Log in as root user to the SUSE Multi-Linux Manager Server. 2. Upgrade mgradm and mgrctl. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgradm upgrade podman` which will use the default image tags. SUSE Multi-Linux Manager Proxy / Retail Branch Server: 1. Log in as root user to the SUSE Multi-Linux Manager Proxy / Retail Branch Server. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Proxy 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-2=1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-2=1 * SUSE Multi-Linux Manager Server 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-2=1 ## Package List: * SUSE Multi-Linux Manager Proxy 5.1 (aarch64 ppc64le s390x x86_64) * mgrpxy-5.1.22-slfo.1.1.1 * mgrpxy-debuginfo-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Proxy 5.1 (noarch) * mgrpxy-zsh-completion-5.1.22-slfo.1.1.1 * mgrpxy-bash-completion-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Proxy 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-aarch64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-aarch64-proxy-tftpd-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Proxy 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-ppc64le-proxy-salt-broker-image-5.1.1-9.5.33 * SUSE Multi-Linux Manager Proxy 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-s390x-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-s390x-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-squid-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Proxy 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-x86_64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-httpd-image-5.1.1-8.7.18 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (aarch64 ppc64le s390x x86_64) * mgrpxy-5.1.22-slfo.1.1.1 * mgrpxy-debuginfo-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (noarch) * mgrpxy-zsh-completion-5.1.22-slfo.1.1.1 * mgrpxy-bash-completion-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-aarch64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-aarch64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-aarch64-proxy-tftpd-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-ppc64le-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-ppc64le-proxy-salt-broker-image-5.1.1-9.5.33 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-s390x-proxy-httpd-image-5.1.1-8.7.18 * suse-multi-linux-manager-5.1-s390x-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-s390x-proxy-squid-image-5.1.1-8.5.13 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-proxy-ssh-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-salt-broker-image-5.1.1-9.5.33 * suse-multi-linux-manager-5.1-x86_64-proxy-squid-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-tftpd-image-5.1.1-8.5.13 * suse-multi-linux-manager-5.1-x86_64-proxy-httpd-image-5.1.1-8.7.18 * SUSE Multi-Linux Manager Server 5.1 (aarch64 ppc64le s390x x86_64) * mgradm-debuginfo-5.1.22-slfo.1.1.1 * mgrctl-debuginfo-5.1.22-slfo.1.1.1 * mgradm-5.1.22-slfo.1.1.1 * mgrctl-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Server 5.1 (noarch) * mgradm-bash-completion-5.1.22-slfo.1.1.1 * mgrctl-bash-completion-5.1.22-slfo.1.1.1 * mgrctl-zsh-completion-5.1.22-slfo.1.1.1 * mgradm-zsh-completion-5.1.22-slfo.1.1.1 * SUSE Multi-Linux Manager Server 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-aarch64-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-aarch64-server-attestation-image-5.1.1-8.7.8 * suse-multi-linux-manager-5.1-aarch64-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-aarch64-server-migration-14-16-image-5.1.1-8.5.26 * suse-multi-linux-manager-5.1-aarch64-server-saline-image-5.1.1-9.5.24 * SUSE Multi-Linux Manager Server 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-ppc64le-server-saline-image-5.1.1-9.5.24 * suse-multi-linux-manager-5.1-ppc64le-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-ppc64le-server-migration-14-16-image-5.1.1-8.5.26 * suse-multi-linux-manager-5.1-ppc64le-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-ppc64le-server-attestation-image-5.1.1-8.7.8 * SUSE Multi-Linux Manager Server 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-s390x-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-s390x-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-s390x-server-migration-14-16-image-5.1.1-8.5.26 * suse-multi-linux-manager-5.1-s390x-server-saline-image-5.1.1-9.5.24 * suse-multi-linux-manager-5.1-s390x-server-attestation-image-5.1.1-8.7.8 * SUSE Multi-Linux Manager Server 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-server-attestation-image-5.1.1-8.7.8 * suse-multi-linux-manager-5.1-x86_64-server-postgresql-image-5.1.1-6.5.4 * suse-multi-linux-manager-5.1-x86_64-server-hub-xmlrpc-api-image-5.1.1-8.5.19 * suse-multi-linux-manager-5.1-x86_64-server-saline-image-5.1.1-9.5.24 * suse-multi-linux-manager-5.1-x86_64-server-image-5.1.1-8.5.45 * suse-multi-linux-manager-5.1-x86_64-server-migration-14-16-image-5.1.1-8.5.26 ## References: * https://www.suse.com/security/cve/CVE-2025-53192.html * https://bugzilla.suse.com/show_bug.cgi?id=1229825 * https://bugzilla.suse.com/show_bug.cgi?id=1241880 * https://bugzilla.suse.com/show_bug.cgi?id=1243331 * https://bugzilla.suse.com/show_bug.cgi?id=1243486 * https://bugzilla.suse.com/show_bug.cgi?id=1243611 * https://bugzilla.suse.com/show_bug.cgi?id=1243704 * https://bugzilla.suse.com/show_bug.cgi?id=1244027 * https://bugzilla.suse.com/show_bug.cgi?id=1244127 * https://bugzilla.suse.com/show_bug.cgi?id=1244219 * https://bugzilla.suse.com/show_bug.cgi?id=1244424 * https://bugzilla.suse.com/show_bug.cgi?id=1244552 * https://bugzilla.suse.com/show_bug.cgi?id=1244919 * https://bugzilla.suse.com/show_bug.cgi?id=1245099 * https://bugzilla.suse.com/show_bug.cgi?id=1245120 * https://bugzilla.suse.com/show_bug.cgi?id=1245702 * https://bugzilla.suse.com/show_bug.cgi?id=1246068 * https://bugzilla.suse.com/show_bug.cgi?id=1246320 * https://bugzilla.suse.com/show_bug.cgi?id=1246553 * https://bugzilla.suse.com/show_bug.cgi?id=1246789 * https://bugzilla.suse.com/show_bug.cgi?id=1246882 * https://bugzilla.suse.com/show_bug.cgi?id=1246906 * https://bugzilla.suse.com/show_bug.cgi?id=1247688 * https://bugzilla.suse.com/show_bug.cgi?id=1247836 * https://bugzilla.suse.com/show_bug.cgi?id=1248252 * https://bugzilla.suse.com/show_bug.cgi?id=1249434 * https://jira.suse.com/browse/MSQA-1023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 16:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 16:30:07 -0000 Subject: SUSE-SU-2025:4086-1: important: Security update for tomcat11 Message-ID: <176296500772.20159.18071590301044914010@smelt2.prg2.suse.org> # Security update for tomcat11 Announcement ID: SUSE-SU-2025:4086-1 Release Date: 2025-11-12T15:02:38Z Rating: important References: * bsc#1252753 * bsc#1252756 * bsc#1252905 Cross-References: * CVE-2025-55752 * CVE-2025-55754 * CVE-2025-61795 CVSS scores: * CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55752 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55754 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61795 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61795 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP6 * Web and Scripting Module 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for tomcat11 fixes the following issues: Update to Tomcat 11.0.13 * CVE-2025-55752: Fixed directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753) * CVE-2025-55754: Fixed improper neutralization of escape, meta, or control sequences vulnerability (bsc#1252905) * CVE-2025-61795: Fixed denial of service due to temporary copies during the processing of multipart upload (bsc#1252756) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4086=1 openSUSE-SLE-15.6-2025-4086=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-4086=1 * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-4086=1 ## Package List: * openSUSE Leap 15.6 (noarch) * tomcat11-docs-webapp-11.0.13-150600.13.12.1 * tomcat11-jsvc-11.0.13-150600.13.12.1 * tomcat11-embed-11.0.13-150600.13.12.1 * tomcat11-11.0.13-150600.13.12.1 * tomcat11-doc-11.0.13-150600.13.12.1 * tomcat11-admin-webapps-11.0.13-150600.13.12.1 * tomcat11-el-6_0-api-11.0.13-150600.13.12.1 * tomcat11-webapps-11.0.13-150600.13.12.1 * tomcat11-servlet-6_1-api-11.0.13-150600.13.12.1 * tomcat11-lib-11.0.13-150600.13.12.1 * tomcat11-jsp-4_0-api-11.0.13-150600.13.12.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat11-11.0.13-150600.13.12.1 * tomcat11-webapps-11.0.13-150600.13.12.1 * tomcat11-admin-webapps-11.0.13-150600.13.12.1 * tomcat11-el-6_0-api-11.0.13-150600.13.12.1 * tomcat11-servlet-6_1-api-11.0.13-150600.13.12.1 * tomcat11-lib-11.0.13-150600.13.12.1 * tomcat11-jsp-4_0-api-11.0.13-150600.13.12.1 * Web and Scripting Module 15-SP7 (noarch) * tomcat11-11.0.13-150600.13.12.1 * tomcat11-webapps-11.0.13-150600.13.12.1 * tomcat11-admin-webapps-11.0.13-150600.13.12.1 * tomcat11-el-6_0-api-11.0.13-150600.13.12.1 * tomcat11-servlet-6_1-api-11.0.13-150600.13.12.1 * tomcat11-lib-11.0.13-150600.13.12.1 * tomcat11-jsp-4_0-api-11.0.13-150600.13.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55752.html * https://www.suse.com/security/cve/CVE-2025-55754.html * https://www.suse.com/security/cve/CVE-2025-61795.html * https://bugzilla.suse.com/show_bug.cgi?id=1252753 * https://bugzilla.suse.com/show_bug.cgi?id=1252756 * https://bugzilla.suse.com/show_bug.cgi?id=1252905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 16:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 16:30:20 -0000 Subject: SUSE-SU-2025:4081-1: important: Security update for podman Message-ID: <176296502001.20159.1448102594297587967@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:4081-1 Release Date: 2025-11-12T12:49:51Z Rating: important References: * bsc#1252376 * bsc#1252543 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252376) * CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252376) * CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252376) Other fixes: * Fix: podman and buildah with runc 1.3.2 fail with lots of warnings as rootless (bsc#1252543) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4081=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4081=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4081=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-4081=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4081=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4081=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4081=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4081=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4081=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * openSUSE Leap 15.5 (noarch) * podman-docker-4.9.5-150500.3.56.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * openSUSE Leap 15.6 (noarch) * podman-docker-4.9.5-150500.3.56.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * podman-docker-4.9.5-150500.3.56.2 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * Containers Module 15-SP6 (noarch) * podman-docker-4.9.5-150500.3.56.2 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * Containers Module 15-SP7 (noarch) * podman-docker-4.9.5-150500.3.56.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * podman-docker-4.9.5-150500.3.56.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * podman-docker-4.9.5-150500.3.56.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * podman-docker-4.9.5-150500.3.56.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * podman-4.9.5-150500.3.56.2 * podman-remote-4.9.5-150500.3.56.2 * podman-debuginfo-4.9.5-150500.3.56.2 * podman-remote-debuginfo-4.9.5-150500.3.56.2 * podmansh-4.9.5-150500.3.56.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * podman-docker-4.9.5-150500.3.56.2 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252376 * https://bugzilla.suse.com/show_bug.cgi?id=1252543 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 16:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 16:30:24 -0000 Subject: SUSE-SU-2025:4080-1: important: Security update for podman Message-ID: <176296502419.20159.6006001662814701579@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:4080-1 Release Date: 2025-11-12T12:49:14Z Rating: important References: * bsc#1248988 * bsc#1252376 * bsc#1252543 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252376) * CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252376) * CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252376) Other fixes: * Fix: podman and buildah with runc 1.3.2 fail with lots of warnings as rootless (bsc#1252543) * Add symlink to catatonit in /usr/libexec/podman (bsc#1248988) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4080=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4080=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4080=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4080=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4080=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-4080=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4080=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4080=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * podman-debuginfo-4.9.5-150300.9.63.2 * podmansh-4.9.5-150300.9.63.2 * podman-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * openSUSE Leap 15.3 (noarch) * podman-docker-4.9.5-150300.9.63.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * podman-debuginfo-4.9.5-150300.9.63.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * podman-debuginfo-4.9.5-150300.9.63.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.63.2 * podman-remote-4.9.5-150300.9.63.2 * podman-remote-debuginfo-4.9.5-150300.9.63.2 * podman-debuginfo-4.9.5-150300.9.63.2 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1248988 * https://bugzilla.suse.com/show_bug.cgi?id=1252376 * https://bugzilla.suse.com/show_bug.cgi?id=1252543 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 16:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 16:30:27 -0000 Subject: SUSE-SU-2025:4079-1: important: Security update for podman Message-ID: <176296502759.20159.14665949580644851547@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:4079-1 Release Date: 2025-11-12T12:48:52Z Rating: important References: * bsc#1252376 * bsc#1252543 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves three vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-31133: Fixed container escape via 'masked path' abuse due to mount race conditions (bsc#1252376) * CVE-2025-52565: Fixed container escape with malicious config due to /dev/console mount and related races (bsc#1252376) * CVE-2025-52881: Fixed container escape and denial of service due to arbitrary write gadgets and procfs write redirects (bsc#1252376) Other fixes: \- podman and buildah with runc 1.3.2 fail with lots of warnings as rootless (bsc#1252543) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4079=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4079=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4079=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4079=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4079=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4079=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4079=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4079=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4079=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * podman-4.9.5-150400.4.59.2 * podmansh-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * openSUSE Leap 15.4 (noarch) * podman-docker-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.59.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * podman-docker-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * podman-4.9.5-150400.4.59.2 * podman-debuginfo-4.9.5-150400.4.59.2 * podman-remote-debuginfo-4.9.5-150400.4.59.2 * podman-remote-4.9.5-150400.4.59.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.59.2 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://bugzilla.suse.com/show_bug.cgi?id=1252376 * https://bugzilla.suse.com/show_bug.cgi?id=1252543 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 20:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 20:30:05 -0000 Subject: SUSE-SU-2025:4087-1: moderate: Security update for netty, netty-tcnative Message-ID: <176297940547.20308.40713653786503656@smelt2.prg2.suse.org> # Security update for netty, netty-tcnative Announcement ID: SUSE-SU-2025:4087-1 Release Date: 2025-11-12T19:35:33Z Rating: moderate References: * bsc#1252097 Cross-References: * CVE-2025-59419 CVSS scores: * CVE-2025-59419 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-59419 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-59419 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for netty, netty-tcnative fixes the following issues: * CVE-2025-59419: fixed SMTP command injection vulnerability that allowed email forgery (bsc#1252097) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4087=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4087=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4087=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4087=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4087=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * netty-tcnative-2.0.74-150200.3.33.1 * netty-4.1.128-150200.4.37.1 * openSUSE Leap 15.6 (noarch) * netty-javadoc-4.1.128-150200.4.37.1 * netty-tcnative-javadoc-2.0.74-150200.3.33.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * netty-tcnative-2.0.74-150200.3.33.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * netty-tcnative-2.0.74-150200.3.33.1 * netty-tcnative-debugsource-2.0.74-150200.3.33.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * netty-4.1.128-150200.4.37.1 * SUSE Package Hub 15 15-SP6 (noarch) * netty-javadoc-4.1.128-150200.4.37.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * netty-4.1.128-150200.4.37.1 * SUSE Package Hub 15 15-SP7 (noarch) * netty-javadoc-4.1.128-150200.4.37.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59419.html * https://bugzilla.suse.com/show_bug.cgi?id=1252097 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 20:39:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 20:39:31 -0000 Subject: SUSE-SU-2025:20996-1: important: Security update for the Linux Kernel Message-ID: <176297997129.20308.13350556313133497025@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20996-1 Release Date: 2025-11-06T15:34:33Z Rating: important References: * bsc#1215199 * bsc#1218644 * bsc#1230062 * bsc#1234634 * bsc#1234693 * bsc#1234863 * bsc#1235953 * bsc#1236897 * bsc#1237108 * bsc#1237131 * bsc#1237542 * bsc#1237776 * bsc#1238972 * bsc#1239206 * bsc#1240324 * bsc#1240696 * bsc#1240966 * bsc#1240998 * bsc#1241166 * bsc#1241353 * bsc#1241403 * bsc#1241435 * bsc#1242034 * bsc#1242086 * bsc#1242414 * bsc#1242782 * bsc#1242864 * bsc#1242965 * bsc#1242995 * bsc#1243000 * bsc#1243055 * bsc#1243068 * bsc#1243100 * bsc#1243112 * bsc#1243774 * bsc#1244309 * bsc#1244723 * bsc#1244734 * bsc#1244749 * bsc#1244792 * bsc#1244812 * bsc#1244930 * bsc#1244939 * bsc#1245000 * bsc#1245151 * bsc#1245193 * bsc#1245206 * bsc#1245216 * bsc#1245260 * bsc#1245410 * bsc#1245457 * bsc#1245504 * bsc#1245506 * bsc#1245508 * bsc#1245510 * bsc#1245596 * bsc#1245621 * bsc#1245630 * bsc#1245654 * bsc#1245657 * bsc#1245658 * bsc#1245659 * bsc#1245663 * bsc#1245664 * bsc#1245665 * bsc#1245666 * bsc#1245668 * bsc#1245669 * bsc#1245670 * bsc#1245671 * bsc#1245675 * bsc#1245676 * bsc#1245678 * bsc#1245683 * bsc#1245684 * bsc#1245686 * bsc#1245688 * bsc#1245690 * bsc#1245691 * bsc#1245695 * bsc#1245700 * bsc#1245703 * bsc#1245705 * bsc#1245710 * bsc#1245711 * bsc#1245713 * bsc#1245714 * bsc#1245715 * bsc#1245717 * bsc#1245719 * bsc#1245721 * bsc#1245723 * bsc#1245726 * bsc#1245728 * bsc#1245729 * bsc#1245730 * bsc#1245731 * bsc#1245735 * bsc#1245737 * bsc#1245744 * bsc#1245745 * bsc#1245746 * bsc#1245747 * bsc#1245748 * bsc#1245749 * bsc#1245751 * bsc#1245757 * bsc#1245763 * bsc#1245765 * bsc#1245767 * bsc#1245769 * bsc#1245777 * bsc#1245780 * bsc#1245781 * bsc#1245784 * bsc#1245785 * bsc#1245787 * bsc#1245812 * bsc#1245814 * bsc#1245815 * bsc#1245937 * bsc#1245945 * bsc#1245952 * bsc#1245955 * bsc#1245956 * bsc#1245963 * bsc#1245966 * bsc#1245970 * bsc#1245973 * bsc#1245976 * bsc#1245977 * bsc#1245986 * bsc#1246000 * bsc#1246002 * bsc#1246005 * bsc#1246008 * bsc#1246012 * bsc#1246022 * bsc#1246023 * bsc#1246031 * bsc#1246034 * bsc#1246037 * bsc#1246041 * bsc#1246042 * bsc#1246047 * bsc#1246049 * bsc#1246050 * bsc#1246053 * bsc#1246054 * bsc#1246055 * bsc#1246057 * bsc#1246098 * bsc#1246109 * bsc#1246125 * bsc#1246166 * bsc#1246171 * bsc#1246176 * bsc#1246181 * bsc#1246183 * bsc#1246185 * bsc#1246186 * bsc#1246188 * bsc#1246190 * bsc#1246192 * bsc#1246193 * bsc#1246195 * bsc#1246220 * bsc#1246234 * bsc#1246236 * bsc#1246240 * bsc#1246243 * bsc#1246244 * bsc#1246245 * bsc#1246246 * bsc#1246248 * bsc#1246250 * bsc#1246252 * bsc#1246253 * bsc#1246255 * bsc#1246258 * bsc#1246259 * bsc#1246260 * bsc#1246262 * bsc#1246266 * bsc#1246268 * bsc#1246283 * bsc#1246285 * bsc#1246286 * bsc#1246287 * bsc#1246290 * bsc#1246292 * bsc#1246293 * bsc#1246295 * bsc#1246297 * bsc#1246333 * bsc#1246334 * bsc#1246337 * bsc#1246342 * bsc#1246349 * bsc#1246351 * bsc#1246353 * bsc#1246354 * bsc#1246358 * bsc#1246364 * bsc#1246366 * bsc#1246370 * bsc#1246375 * bsc#1246376 * bsc#1246385 * bsc#1246386 * bsc#1246387 * bsc#1246438 * bsc#1246443 * bsc#1246444 * bsc#1246447 * bsc#1246450 * bsc#1246453 * bsc#1246473 * bsc#1246490 * bsc#1246509 * bsc#1246547 * bsc#1246631 * bsc#1246651 * bsc#1246688 * bsc#1246777 * bsc#1246781 * bsc#1246782 * bsc#1246868 * bsc#1246896 * bsc#1246911 * bsc#1246979 * bsc#1247018 * bsc#1247020 * bsc#1247022 * bsc#1247023 * bsc#1247024 * bsc#1247027 * bsc#1247028 * bsc#1247031 * bsc#1247033 * bsc#1247035 * bsc#1247061 * bsc#1247062 * bsc#1247064 * bsc#1247076 * bsc#1247078 * bsc#1247079 * bsc#1247088 * bsc#1247089 * bsc#1247091 * bsc#1247097 * bsc#1247098 * bsc#1247099 * bsc#1247101 * bsc#1247102 * bsc#1247103 * bsc#1247104 * bsc#1247112 * bsc#1247113 * bsc#1247116 * bsc#1247118 * bsc#1247119 * bsc#1247123 * bsc#1247125 * bsc#1247126 * bsc#1247128 * bsc#1247130 * bsc#1247131 * bsc#1247132 * bsc#1247136 * bsc#1247137 * bsc#1247138 * bsc#1247141 * bsc#1247143 * bsc#1247145 * bsc#1247146 * bsc#1247147 * bsc#1247149 * bsc#1247150 * bsc#1247151 * bsc#1247152 * bsc#1247153 * bsc#1247154 * bsc#1247155 * bsc#1247156 * bsc#1247157 * bsc#1247160 * bsc#1247162 * bsc#1247163 * bsc#1247164 * bsc#1247167 * bsc#1247169 * bsc#1247170 * bsc#1247171 * bsc#1247174 * bsc#1247176 * bsc#1247177 * bsc#1247178 * bsc#1247181 * bsc#1247209 * bsc#1247210 * bsc#1247220 * bsc#1247223 * bsc#1247227 * bsc#1247229 * bsc#1247231 * bsc#1247233 * bsc#1247234 * bsc#1247235 * bsc#1247236 * bsc#1247238 * bsc#1247239 * bsc#1247241 * bsc#1247243 * bsc#1247250 * bsc#1247251 * bsc#1247252 * bsc#1247253 * bsc#1247255 * bsc#1247262 * bsc#1247265 * bsc#1247270 * bsc#1247271 * bsc#1247273 * bsc#1247274 * bsc#1247276 * bsc#1247277 * bsc#1247278 * bsc#1247279 * bsc#1247280 * bsc#1247282 * bsc#1247283 * bsc#1247284 * bsc#1247285 * bsc#1247288 * bsc#1247289 * bsc#1247290 * bsc#1247293 * bsc#1247308 * bsc#1247311 * bsc#1247313 * bsc#1247314 * bsc#1247317 * bsc#1247325 * bsc#1247347 * bsc#1247348 * bsc#1247349 * bsc#1247366 * bsc#1247372 * bsc#1247376 * bsc#1247426 * bsc#1247437 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247712 * bsc#1247837 * bsc#1247838 * bsc#1247935 * bsc#1247936 * bsc#1247949 * bsc#1247950 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248111 * bsc#1248121 * bsc#1248183 * bsc#1248186 * bsc#1248190 * bsc#1248192 * bsc#1248194 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248211 * bsc#1248223 * bsc#1248224 * bsc#1248225 * bsc#1248230 * bsc#1248235 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248299 * bsc#1248302 * bsc#1248304 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248359 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248367 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248396 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248616 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248624 * bsc#1248627 * bsc#1248628 * bsc#1248634 * bsc#1248635 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248662 * bsc#1248664 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248727 * bsc#1248728 * bsc#1248748 * bsc#1248754 * bsc#1248775 * bsc#1249022 * bsc#1249038 * bsc#1249060 * bsc#1249061 * bsc#1249062 * bsc#1249064 * bsc#1249065 * bsc#1249066 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249160 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249167 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249182 * bsc#1249186 * bsc#1249190 * bsc#1249193 * bsc#1249195 * bsc#1249199 * bsc#1249201 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249258 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249269 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249274 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249286 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249297 * bsc#1249299 * bsc#1249300 * bsc#1249301 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249306 * bsc#1249308 * bsc#1249309 * bsc#1249312 * bsc#1249313 * bsc#1249314 * bsc#1249315 * bsc#1249316 * bsc#1249318 * bsc#1249319 * bsc#1249320 * bsc#1249321 * bsc#1249322 * bsc#1249323 * bsc#1249324 * bsc#1249333 * bsc#1249334 * bsc#1249338 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249477 * bsc#1249478 * bsc#1249479 * bsc#1249486 * bsc#1249490 * bsc#1249494 * bsc#1249500 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249509 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249547 * bsc#1249548 * bsc#1249550 * bsc#1249552 * bsc#1249554 * bsc#1249562 * bsc#1249566 * bsc#1249587 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249618 * bsc#1249774 * bsc#1249833 * bsc#1249887 * bsc#1249888 * bsc#1249901 * bsc#1249904 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1249975 * bsc#1250002 * bsc#1250007 * bsc#1250021 * bsc#1250025 * bsc#1250028 * bsc#1250032 * bsc#1250087 * bsc#1250088 * bsc#1250119 * bsc#1250123 * bsc#1250124 * bsc#1250177 * bsc#1250179 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250237 * bsc#1250242 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250258 * bsc#1250262 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250296 * bsc#1250297 * bsc#1250298 * bsc#1250334 * bsc#1250344 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250386 * bsc#1250389 * bsc#1250398 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250408 * bsc#1250450 * bsc#1250491 * bsc#1250519 * bsc#1250522 * bsc#1250650 * bsc#1250655 * bsc#1250671 * bsc#1250702 * bsc#1250711 * bsc#1250712 * bsc#1250713 * bsc#1250716 * bsc#1250719 * bsc#1250722 * bsc#1250729 * bsc#1250736 * bsc#1250737 * bsc#1250739 * bsc#1250741 * bsc#1250742 * bsc#1250758 * bsc#1250952 * bsc#1251100 * bsc#1251114 * bsc#1251134 * bsc#1251135 * bsc#1251143 * bsc#1251146 * bsc#1251186 * bsc#1251216 * bsc#1251230 * bsc#1251810 * bsc#1252084 * jsc#PED-10909 * jsc#PED-12405 * jsc#PED-12745 * jsc#PED-12882 * jsc#PED-13113 * jsc#PED-13256 * jsc#PED-13302 * jsc#PED-13331 * jsc#PED-13343 * jsc#PED-13345 * jsc#PED-13631 * jsc#PED-13704 * jsc#PED-13728 * jsc#PED-13762 * jsc#PED-13815 * jsc#PED-348 * jsc#PED-7249 Cross-References: * CVE-2024-53164 * CVE-2024-57891 * CVE-2024-57951 * CVE-2024-57952 * CVE-2024-58090 * CVE-2025-22034 * CVE-2025-22077 * CVE-2025-23141 * CVE-2025-37798 * CVE-2025-37821 * CVE-2025-37849 * CVE-2025-37856 * CVE-2025-37861 * CVE-2025-37864 * CVE-2025-38006 * CVE-2025-38008 * CVE-2025-38019 * CVE-2025-38034 * CVE-2025-38038 * CVE-2025-38052 * CVE-2025-38058 * CVE-2025-38062 * CVE-2025-38075 * CVE-2025-38087 * CVE-2025-38088 * CVE-2025-38089 * CVE-2025-38090 * CVE-2025-38091 * CVE-2025-38095 * CVE-2025-38096 * CVE-2025-38098 * CVE-2025-38099 * CVE-2025-38101 * CVE-2025-38102 * CVE-2025-38103 * CVE-2025-38106 * CVE-2025-38107 * CVE-2025-38108 * CVE-2025-38109 * CVE-2025-38110 * CVE-2025-38111 * CVE-2025-38112 * CVE-2025-38113 * CVE-2025-38114 * CVE-2025-38117 * CVE-2025-38118 * CVE-2025-38119 * CVE-2025-38120 * CVE-2025-38122 * CVE-2025-38123 * CVE-2025-38124 * CVE-2025-38125 * CVE-2025-38127 * CVE-2025-38128 * CVE-2025-38129 * CVE-2025-38134 * CVE-2025-38135 * CVE-2025-38136 * CVE-2025-38137 * CVE-2025-38138 * CVE-2025-38140 * CVE-2025-38141 * CVE-2025-38142 * CVE-2025-38143 * CVE-2025-38145 * CVE-2025-38146 * CVE-2025-38148 * CVE-2025-38149 * CVE-2025-38151 * CVE-2025-38153 * CVE-2025-38154 * CVE-2025-38155 * CVE-2025-38156 * CVE-2025-38157 * CVE-2025-38159 * CVE-2025-38160 * CVE-2025-38161 * CVE-2025-38165 * CVE-2025-38168 * CVE-2025-38169 * CVE-2025-38170 * CVE-2025-38172 * CVE-2025-38173 * CVE-2025-38174 * CVE-2025-38177 * CVE-2025-38180 * CVE-2025-38181 * CVE-2025-38182 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38186 * CVE-2025-38188 * CVE-2025-38189 * CVE-2025-38190 * CVE-2025-38193 * CVE-2025-38197 * CVE-2025-38198 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38209 * CVE-2025-38211 * CVE-2025-38213 * CVE-2025-38214 * CVE-2025-38215 * CVE-2025-38216 * CVE-2025-38217 * CVE-2025-38220 * CVE-2025-38222 * CVE-2025-38224 * CVE-2025-38225 * CVE-2025-38226 * CVE-2025-38227 * CVE-2025-38228 * CVE-2025-38229 * CVE-2025-38231 * CVE-2025-38232 * CVE-2025-38233 * CVE-2025-38234 * CVE-2025-38242 * CVE-2025-38244 * CVE-2025-38245 * CVE-2025-38246 * CVE-2025-38249 * CVE-2025-38251 * CVE-2025-38253 * CVE-2025-38255 * CVE-2025-38256 * CVE-2025-38257 * CVE-2025-38258 * CVE-2025-38259 * CVE-2025-38263 * CVE-2025-38265 * CVE-2025-38267 * CVE-2025-38268 * CVE-2025-38270 * CVE-2025-38272 * CVE-2025-38273 * CVE-2025-38274 * CVE-2025-38275 * CVE-2025-38277 * CVE-2025-38278 * CVE-2025-38286 * CVE-2025-38287 * CVE-2025-38288 * CVE-2025-38289 * CVE-2025-38290 * CVE-2025-38291 * CVE-2025-38292 * CVE-2025-38293 * CVE-2025-38299 * CVE-2025-38300 * CVE-2025-38301 * CVE-2025-38302 * CVE-2025-38303 * CVE-2025-38304 * CVE-2025-38305 * CVE-2025-38306 * CVE-2025-38307 * CVE-2025-38311 * CVE-2025-38312 * CVE-2025-38313 * CVE-2025-38315 * CVE-2025-38317 * CVE-2025-38318 * CVE-2025-38319 * CVE-2025-38322 * CVE-2025-38323 * CVE-2025-38326 * CVE-2025-38332 * CVE-2025-38335 * CVE-2025-38336 * CVE-2025-38337 * CVE-2025-38338 * CVE-2025-38339 * CVE-2025-38341 * CVE-2025-38342 * CVE-2025-38343 * CVE-2025-38344 * CVE-2025-38345 * CVE-2025-38348 * CVE-2025-38349 * CVE-2025-38350 * CVE-2025-38351 * CVE-2025-38352 * CVE-2025-38353 * CVE-2025-38354 * CVE-2025-38355 * CVE-2025-38356 * CVE-2025-38359 * CVE-2025-38360 * CVE-2025-38361 * CVE-2025-38362 * CVE-2025-38363 * CVE-2025-38364 * CVE-2025-38365 * CVE-2025-38368 * CVE-2025-38369 * CVE-2025-38371 * CVE-2025-38372 * CVE-2025-38373 * CVE-2025-38374 * CVE-2025-38375 * CVE-2025-38376 * CVE-2025-38377 * CVE-2025-38380 * CVE-2025-38381 * CVE-2025-38382 * CVE-2025-38383 * CVE-2025-38384 * CVE-2025-38385 * CVE-2025-38386 * CVE-2025-38387 * CVE-2025-38389 * CVE-2025-38390 * CVE-2025-38391 * CVE-2025-38392 * CVE-2025-38393 * CVE-2025-38395 * CVE-2025-38396 * CVE-2025-38397 * CVE-2025-38399 * CVE-2025-38400 * CVE-2025-38401 * CVE-2025-38402 * CVE-2025-38403 * CVE-2025-38404 * CVE-2025-38405 * CVE-2025-38406 * CVE-2025-38408 * CVE-2025-38409 * CVE-2025-38410 * CVE-2025-38412 * CVE-2025-38413 * CVE-2025-38414 * CVE-2025-38415 * CVE-2025-38416 * CVE-2025-38417 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38420 * CVE-2025-38421 * CVE-2025-38424 * CVE-2025-38425 * CVE-2025-38426 * CVE-2025-38427 * CVE-2025-38428 * CVE-2025-38429 * CVE-2025-38430 * CVE-2025-38436 * CVE-2025-38438 * CVE-2025-38439 * CVE-2025-38440 * CVE-2025-38441 * CVE-2025-38443 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38446 * CVE-2025-38448 * CVE-2025-38449 * CVE-2025-38450 * CVE-2025-38451 * CVE-2025-38453 * CVE-2025-38454 * CVE-2025-38455 * CVE-2025-38456 * CVE-2025-38457 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38460 * CVE-2025-38461 * CVE-2025-38462 * CVE-2025-38463 * CVE-2025-38464 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38467 * CVE-2025-38468 * CVE-2025-38470 * CVE-2025-38472 * CVE-2025-38473 * CVE-2025-38474 * CVE-2025-38475 * CVE-2025-38476 * CVE-2025-38477 * CVE-2025-38478 * CVE-2025-38480 * CVE-2025-38481 * CVE-2025-38482 * CVE-2025-38483 * CVE-2025-38484 * CVE-2025-38485 * CVE-2025-38487 * CVE-2025-38488 * CVE-2025-38489 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38493 * CVE-2025-38494 * CVE-2025-38495 * CVE-2025-38496 * CVE-2025-38497 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38508 * CVE-2025-38514 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38539 * CVE-2025-38544 * CVE-2025-38545 * CVE-2025-38546 * CVE-2025-38549 * CVE-2025-38552 * CVE-2025-38553 * CVE-2025-38554 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38557 * CVE-2025-38559 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38564 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38573 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38586 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38619 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38628 * CVE-2025-38630 * CVE-2025-38631 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38646 * CVE-2025-38648 * CVE-2025-38656 * CVE-2025-38658 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38662 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38686 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38700 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38717 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38733 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39673 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39683 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39687 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39695 * CVE-2025-39697 * CVE-2025-39698 * CVE-2025-39700 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39707 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39711 * CVE-2025-39712 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39722 * CVE-2025-39723 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39727 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39748 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39765 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39775 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39788 * CVE-2025-39790 * CVE-2025-39791 * CVE-2025-39792 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39807 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39811 * CVE-2025-39813 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39830 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39836 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39841 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39851 * CVE-2025-39852 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39875 * CVE-2025-39877 * CVE-2025-39882 * CVE-2025-39884 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39890 * CVE-2025-39891 * CVE-2025-39896 * CVE-2025-39898 * CVE-2025-39899 * CVE-2025-39900 * CVE-2025-39902 * CVE-2025-39907 * CVE-2025-39909 * CVE-2025-39916 * CVE-2025-39918 * CVE-2025-39922 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-39926 * CVE-2025-39931 * CVE-2025-39934 * CVE-2025-39937 * CVE-2025-39938 * CVE-2025-39945 * CVE-2025-39946 * CVE-2025-39952 * CVE-2025-39957 * CVE-2025-40300 * CVE-2026-38264 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57952 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37856 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38019 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38019 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38034 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38038 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38058 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38062 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38088 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38088 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38090 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38098 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38099 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38101 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38102 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38106 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38106 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38107 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38108 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38109 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38110 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38117 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38118 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38120 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-38122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38128 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38128 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38137 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38137 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38140 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38143 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38148 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38149 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38153 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38157 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38159 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38168 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38168 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38169 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38170 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38172 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38172 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38173 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38174 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38181 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38193 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38197 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38209 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38209 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38211 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38213 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38214 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38217 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38220 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38222 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38224 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38226 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38227 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38228 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38228 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38229 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38231 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38232 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38242 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38244 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38249 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38253 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38256 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38258 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38259 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38267 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38267 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38270 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38270 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38272 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38273 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38274 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38275 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38277 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38286 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38289 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38291 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38291 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38292 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38293 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38300 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38302 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38306 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38311 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38315 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38315 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38317 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38317 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38318 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38318 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38322 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38323 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38339 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38339 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38341 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38344 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38345 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38349 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38350 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38355 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38356 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38356 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38362 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38363 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38364 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38365 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38371 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38372 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38372 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38373 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38375 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38377 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38382 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38384 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38385 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38387 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38389 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38391 ( SUSE ): 5.2 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38393 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38395 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38396 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38397 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38399 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38400 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38401 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38403 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38404 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38409 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38410 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38412 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38415 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38416 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38417 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38417 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38420 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38421 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38421 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38424 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38425 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38426 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38428 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38429 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38440 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38443 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38446 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38446 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38448 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38449 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38449 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38450 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38454 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38455 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38460 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38461 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38462 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38467 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38468 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38470 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38473 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38474 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38475 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38475 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38478 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38481 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38482 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38483 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38485 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38489 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38494 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38495 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38496 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38508 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38549 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38549 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38554 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38554 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38564 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38564 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38573 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38586 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38619 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38619 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38648 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38648 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38658 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38662 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38662 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39698 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-39700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39791 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39792 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39792 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39896 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39918 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-39918 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39926 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39926 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves 573 vulnerabilities, contains 17 features and has 96 fixes can now be installed. ## Description: The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953). * CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108). * CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435). * CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403). * CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782). * CVE-2025-37821: sched/eevdf: Fix se->slice being set to U64_MAX and resulting (bsc#1242864). * CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000). * CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068). * CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055). * CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939). * CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000). * CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792). * CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812). * CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151). * CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664). * CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763). * CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970). * CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963). * CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966). * CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976). * CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176). * CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188). * CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path on write (bsc#1246185). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245). * CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252). * CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268). * CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351). * CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366). * CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376). * CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444). * CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447). * CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473). * CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253). * CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260). * CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777). * CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023). * CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024). * CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031). * CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250). * CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169). * CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156). * CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143). * CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283). * CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235). * CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped (bsc#1248299). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374). * CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160). * CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324). * CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550). * CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032). * CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205). * CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292). * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276). * CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296). * CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258). * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275). * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742). * CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758). * CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702). * CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722). * CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). * CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387). The following non-security bugs were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI/processor_idle: Add FFH state handling (jsc#PED-13815). * ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815). * ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: LPSS: Remove AudioDSP related ID (git-fixes). * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git- fixes). * ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes). * ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes). * ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: battery: Add synchronization between interface updates (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes). * ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes). * ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable- fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: timer: fix ida_free call while not allocated (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes). * ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git- fixes). * ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes). * ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes). * ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes). * ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git- fixes). * ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes). * ASoC: amd: acp: Adjust pdm gain value (stable-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes). * ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes). * ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes). * ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git- fixes). * ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: qcom: use drvdata instead of component to keep id (stable-fixes). * ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes). * ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: ISO: free rx_skb if not consumed (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git- fixes). * Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable- fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git- fixes). * Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes). * Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git- fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Disable CET before shutdown by tboot (bsc#1247950). * Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes). * Documentation/x86: Document new attack vector controls (git-fixes). * Documentation: ACPI: Fix parent device references (git-fixes). * Documentation: KVM: Fix unexpected unindent warning (git-fixes). * Documentation: KVM: Fix unexpected unindent warnings (git-fixes). * Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes). * Drop ath12k patch that was reverted in the upstream (git-fixes) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone using CMA or investigating CMA issues, with a small and simple code base and no runtime overhead. * Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325) * Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256). * Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself. * Fix dma_unmap_sg() nents value (git-fixes) * HID: amd_sfh: Add sync across amd sfh work functions (git-fixes). * HID: apple: avoid setting up battery timer for devices without battery (git- fixes). * HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes). * HID: asus: add support for missing PX series fn keys (stable-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: core: do not bypass hid_hw_raw_request (stable-fixes). * HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: hidraw: tighten ioctl command parsing (git-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes). * HID: magicmouse: avoid setting up battery timer when not needed (git-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * Input: psxpad-spi - add a check for the return value of spi_setup() (git- fixes). * Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes). * KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * KVM: Allow CPU to reschedule while setting per-page memory attributes (git- fixes). * KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes). * KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes). * KVM: Conditionally reschedule when resetting the dirty ring (git-fixes). * KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes). * KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302). * KVM: TDX: Do not report base TDVMCALLs (git-fixes). * KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302). * KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302). * KVM: TDX: Handle TDG.VP.VMCALL<GetQuote> (jsc#PED-13302). * KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302). * KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302). * KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes). * KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes). * KVM: arm64: Fix error path in init_hyp_mode() (git-fixes). * KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move upstreamed SPI patch into sorted section * NFS: Fix a race when updating an existing write (git-fixes). * NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes). * NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes). * NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git- fixes). * NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes). * NFS: nfs_invalidate_folio() must observe the offset and size arguments (git- fixes). * NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes). * NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes). * NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git- fixes). * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes). * NFSv4.2: another fix for listxattr (git-fixes). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git- fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * Octeontx2-af: Skip overlap check for SPI field (git-fixes). * PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/AER: Fix missing uevent on recovery when a reset is requested (git- fixes). * PCI/ERR: Fix uevent on failure to recover (git-fixes). * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git- fixes). * PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI/pwrctrl: Fix device leak at registration (git-fixes). * PCI/sysfs: Ensure devices are powered for config reads (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes). * PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git- fixes). * PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes). * PCI: endpoint: Fix configfs group list head handling (git-fixes). * PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes). * PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes). * PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes). * PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes). * PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: j721e: Fix programming sequence of "strap" settings (git-fixes). * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes). * PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes). * PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes). * PCI: rcar-gen4: Fix PHY initialization (git-fixes). * PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git- fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: rcar-host: Drop PMSR spinlock (git-fixes). * PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes). * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes). * PCI: tegra194: Handle errors in BPMP response (git-fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation (git-fixes). * PCI: xilinx-nwl: Fix ECAM programming (git-fixes). * PM / devfreq: Check governor before using governor->name (git-fixes). * PM / devfreq: Fix a index typo in trans_stat (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes). * PM: EM: use kfree_rcu() to simplify the code (stable-fixes). * PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes). * PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112). * PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112). * PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112). * PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes) * RDMA/core: Rate limit GID cache warning messages (git-fixes) * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Drop GFP_NOWARN (git-fixes) * RDMA/hns: Fix -Wframe-larger-than issue (git-fixes) * RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes) * RDMA/hns: Fix accessing uninitialized resources (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/hns: Fix double destruction of rsv_qp (git-fixes) * RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes) * RDMA/hns: Get message length of ack_req from FW (git-fixes) * RDMA/mana_ib: Add device statistics support (bsc#1246651). * RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135). * RDMA/mana_ib: Extend modify QP (bsc#1251135). * RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes). * RDMA/mana_ib: add additional port counters (git-fixes). * RDMA/mana_ib: add support of multiple ports (git-fixes). * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes) * RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes) * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes) * RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes) * RDMA/rxe: Fix race in do_task() when draining (git-fixes) * RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes) * RDMA/siw: Always report immediate post SQ errors (git-fixes) * RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes) * RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git- fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * README.BRANCH: mfranc at suse.cz leaving SUSE * RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348). * Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815). * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "drm/nouveau: check ioctl command codes better" (git-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes). * Revert "mac80211: Dynamically set CoDel parameters per station" (stable- fixes). * Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes). * Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes). * Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git- fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes). * USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes). * USB: serial: option: add Foxconn T99W640 (stable-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add SIMCom 8230C compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable- fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps. * Update config files: revive pwc driver for Leap (bsc#1249060) * accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes). * accel/ivpu: Correct DCT interrupt handling (git-fixes). * accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes). * accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes). * accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes). * amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable- fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes) * arm64/mm: Close theoretical race where stale TLB entry remains valid (git- fixes) * arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes) * arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: config: Make tpm_tis_spi module build-in (bsc#1246896) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: add big-endian property back into watchdog node (git-fixes) * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes) * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git- fixes) * arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes) * arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes) * arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git- fixes) * arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes) * arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git- fixes) * arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git- fixes) * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git- fixes). * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git- fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git- fixes) * arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git- fixes) * arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git- fixes) * arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git- fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes) * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: dts: st: fix timer used for ticks (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: map [_text, _stext) virtual address range (git-fixes) * arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes) * arm64: poe: Handle spurious Overlay faults (git-fixes) * arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes) * arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes) * arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: ahci: Disable DIPM if host lacks support (stable-fixes). * ata: ahci: Disallow LPM policy control if not supported (stable-fixes). * ata: libata-sata: Add link_power_management_supported sysfs attribute (git- fixes). * ata: libata-sata: Disallow changing LPM state if not supported (stable- fixes). * ata: libata-scsi: Fix CDL control (git-fixes). * audit,module: restore audit logging in load failure case (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * benet: fix BUG when creating VFs (git-fixes). * block: Introduce bio_needs_zone_write_plugging() (git-fixes). * block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552). * block: ensure discard_granularity is zero when discard is not supported (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * block: sanitize chunk_sectors for atomic write limits (git-fixes). * bnxt_en: Add a helper function to configure MRU and RSS (git-fixes). * bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes). * bnxt_en: Fix DCB ETS validation (git-fixes). * bnxt_en: Fix memory corruption when FW resources change during ifdown (git- fixes). * bnxt_en: Fix stats context reservation logic (git-fixes). * bnxt_en: Flush FW trace before copying to the coredump (git-fixes). * bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git- fixes). * bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes). * bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git- fixes) * bpf, arm64: Fix fp initialization for exception boundary (git-fixes) * bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes). * bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git- fixes). * bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes). * bpf: Check link_create.flags parameter for multi_kprobe (git-fixes). * bpf: Check link_create.flags parameter for multi_uprobe (git-fixes). * bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes). * bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes). * bpf: Forget ranges when refining tnum after JSET (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes). * bpf: Reject %p% format string in bprintf-like helpers (git-fixes). * bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes). * bpf: Reject narrower access to pointer ctx fields (git-fixes). * bpf: Return prog btf_id without capable check (git-fixes). * bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes). * bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git- fixes). * bpf: fix possible endless loop in BPF map iteration (git-fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes). * btrfs: add debug build only WARN (bsc#1249038). * btrfs: add function comment for check_committed_ref() (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes). * btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes). * btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes). * btrfs: codify pattern for adding block_group to bg_list (git-fixes). * btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * btrfs: do not ignore inode missing when replaying log tree (git-fixes). * btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes). * btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949). * btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes). * btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes). * btrfs: enhance ASSERT() to take optional format string (bsc#1249038). * btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes). * btrfs: exit after state split error at set_extent_bit() (git-fixes). * btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068) * btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949). * btrfs: fix assertion when building free space tree (git-fixes). * btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix incorrect log message for nobarrier mount option (git-fixes). * btrfs: fix inode lookup error handling during log replay (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix invalid inode pointer after failure to create reloc inode (git- fixes). * btrfs: fix invalid inode pointer dereferences during log replay (git-fixes). * btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes). * btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes). * btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes). * btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes). * btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git- fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix squota compressed stats leak (git-fixes). * btrfs: fix ssd_spread overallocation (git-fixes). * btrfs: fix subvolume deletion lockup caused by inodes xarray race (git- fixes). * btrfs: fix the inode leak in btrfs_iget() (git-fixes). * btrfs: fix two misuses of folio_shift() (git-fixes). * btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git- fixes). * btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038). * btrfs: initialize inode::file_extent_tree after i_mode has been set (git- fixes). * btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068) * btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes). * btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes). * btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes). * btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes). * btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git- fixes). * btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes). * btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes). * btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949). * btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes). * btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes). * btrfs: props: switch prop_handler::extract to struct btrfs_inode (git- fixes). * btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes). * btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: qgroup: remove no longer used fs_info->qgroup_ulist (git-fixes). * btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes). * btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes). * btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git- fixes). * btrfs: remove no longer needed strict argument from can_nocow_extent() (git- fixes). * btrfs: remove redundant path release when replaying a log tree (git-fixes). * btrfs: remove the snapshot check from check_committed_ref() (git-fixes). * btrfs: restore mount option info messages during mount (git-fixes). * btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes). * btrfs: return a btrfs_inode from read_one_inode() (git-fixes). * btrfs: return any hit error from extent_writepage_io() (git-fixes). * btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes). * btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes). * btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949). * btrfs: simplify error detection flow during log replay (git-fixes). * btrfs: simplify return logic at check_committed_ref() (git-fixes). * btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes). * btrfs: tests: fix chunk map leak after failure to add it to the tree (git- fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: unfold transaction aborts when replaying log trees (git-fixes). * btrfs: unify ordering of btrfs_key initializations (git-fixes). * btrfs: update superblock's device bytes_used when dropping chunk (git- fixes). * btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949). * btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes). * btrfs: use filemap_get_folio() helper (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git- fixes). * btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes). * btrfs: use verbose ASSERT() in volumes.c (bsc#1249038). * build_bug.h: Add KABI assert (bsc#1249186). * bus: firewall: Fix missing static inline annotations for stubs (git-fixes). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes). * bus: mhi: ep: Fix chained transfer handling in read path (git-fixes). * bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git- fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: kvaser_pciefd: Store device channel index (git-fixes). * can: kvaser_usb: Assign netdev.dev_port based on device channel index (git- fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes). * can: peak_usb: fix USB FD devices potential malfunction (git-fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: rcar_canfd: Fix controller mode setting (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc-acm: fix race between initial clearing halt and open (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405). * cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * clk: at91: peripheral: fix return value (git-fixes). * clk: at91: sam9x7: update pll clk ranges (git-fixes). * clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes). * clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes). * clk: imx95-blk-ctl: Fix synchronous abort (git-fixes). * clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes). * clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git- fixes). * clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes). * clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git- fixes). * clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git- fixes). * clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git- fixes). * clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes). * clk: samsung: exynos850: fix a comment (git-fixes). * clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes). * clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git- fixes). * clk: sunxi-ng: v3s: Fix de clock definition (git-fixes). * clk: tegra: do not overallocate memory for bpmp clocks (git-fixes). * clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes). * clk: xilinx: vcu: unregister pll_post only if registered correctly (git- fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * config.sh: SLFO 1.2 branched in IBS * config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206) * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cpu: Define attack vectors (git-fixes). * cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git- fixes). * cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes). * cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes) * cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes) * cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes). * cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable- fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes). * cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes). * cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes). * cpufreq: armada-8k: make both cpu masks static (git-fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: mediatek: fix device leak on probe failure (git-fixes). * cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git- fixes). * cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable- fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: sun50i: prevent out-of-bounds access (git-fixes). * cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes). * crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes). * crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes). * crypto: ccp - Fix locking on alloc failure handling (git-fixes). * crypto: essiv - Check ssize for decryption and in-place encryption (git- fixes). * crypto: hisilicon - re-enable address prefetch after device resuming (git- fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes). * crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes). * crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes). * crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes). * crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes). * crypto: octeontx2 - Fix address alignment issue on ucode loading (stable- fixes). * crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes). * crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable- fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes). * crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes). * crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes). * crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes). * crypto: qat - fix state restore for banks with exceptions (git-fixes). * crypto: qat - flush misc workqueue during device shutdown (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * crypto: qat - use unmanaged allocation for dc_data (git-fixes). * crypto: rng - Ensure set_ent is always present (git-fixes). * crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes). * crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes). * devlink: Add support for u64 parameters (jsc#PED-13331). * devlink: avoid param type value translations (jsc#PED-13331). * devlink: define enum for attr types of dynamic attributes (jsc#PED-13331). * devlink: introduce devlink_nl_put_u64() (jsc#PED-13331). * devlink: let driver opt out of automatic phys_port_name generation (git- fixes). * dm-mpath: do not print the "loaded" message if registering fails (git- fixes). * dm-stripe: limit chunk_sectors to the stripe size (git-fixes). * dm-table: fix checking for rq stackable devices (git-fixes). * dm: Check for forbidden splitting of zone write operations (git-fixes). * dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes). * dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes). * dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git- fixes). * dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes). * dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * dpll: Add basic Microchip ZL3073x support (jsc#PED-13331). * dpll: Make ZL3073X invisible (jsc#PED-13331). * dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331). * dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331). * dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331). * dpll: zl3073x: Fix build failure (jsc#PED-13331). * dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331). * dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331). * dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331). * dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331). * dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331). * driver core/PM: Set power.no_callbacks along with power.no_pm (stable- fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers: base: handle module_kobject creation (git-fixes). * drm/amd : Update MES API header file for v11 & v12 (stable-fixes). * drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112). * drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable- fixes). * drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112). * drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Allow DCN301 to clear update flags (git-fixes). * drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git- fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes). * drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes). * drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable- fixes). * drm/amd/display: Disable scaling on DCE6 for now (git-fixes). * drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes). * drm/amd/display: Do not print errors for nonexistent connectors (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable- fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Fix mismatch type comparison (stable-fixes). * drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112). * drm/amd/display: Free memory allocation (stable-fixes). * drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes). * drm/amd/display: Initialize mode_select to 0 (stable-fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes). * drm/amd/display: Properly disable scaling on DCE6 (git-fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: fix a Null pointer dereference vulnerability (stable- fixes). * drm/amd/display: fix dmub access race condition (bsc#1243112). * drm/amd/display: fix initial backlight brightness calculation (git-fixes). * drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112). * drm/amd/display: remove output_tf_change flag (git-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/include : MES v11 and v12 API header update (stable-fixes). * drm/amd/include : Update MES v12 API for fence update (stable-fixes). * drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git- fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd/pm: fix null pointer access (stable-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Avoid evicting resources at S5 (bsc#1243112). * drm/amd: Check whether secure display TA loaded successfully (bsc#1243112). * drm/amd: Fix hybrid sleep (bsc#1243112). * drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112). * drm/amd: Restore cached manual clock settings during resume (bsc#1243112). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/discovery: fix fw based ip discovery (git-fixes). * drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes). * drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes). * drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112). * drm/amdgpu/mes: add missing locking in helper functions (stable-fixes). * drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes). * drm/amdgpu/mes: optimize compute loop handling (stable-fixes). * drm/amdgpu/swm14: Update power limit logic (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu/vcn: fix ref counting for ring based profile handling (git- fixes). * drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112). * drm/amdgpu: Add additional DCE6 SCL registers (git-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112). * drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes). * drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes). * drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112). * drm/amdgpu: Increase reset counter only on success (stable-fixes). * drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git- fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes). * drm/amdgpu: Report individual reset error (bsc#1243112). * drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes). * drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes). * drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable- fixes). * drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes). * drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes). * drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: fix vram reservation issue (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/amdkfd: Fix mmap write lock not release (bsc#1243112). * drm/ast: Use msleep instead of mdelay for edid read (git-fixes). * drm/bridge: fix OF node leak (git-fixes). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/cirrus-qemu: Fix pitch programming (git-fixes). * drm/connector: hdmi: Evaluate limited range after computing format (git- fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes). * drm/gem: Internally test import_attach for imported objects (git-fixes). * drm/gem: Test for imported GEM buffers with helper (stable-fixes). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes). * drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes). * drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes). * drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes). * drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git- fixes). * drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes). * drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes). * drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes). * drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes). * drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable- fixes). * drm/i915/icl+/tc: Cache the max lane count value (stable-fixes). * drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable- fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/imagination: Clear runtime PM errors while resetting the GPU (stable- fixes). * drm/mediatek: Add error handling for old state CRTC in atomic_disable (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dp: account for widebus and yuv420 during mode validation (git- fixes). * drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Add error handling for krealloc in metadata setup (stable-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: update the high bitfield of certain DSI registers (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/gsp: fix potential leak of memory used during acpi init (git- fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes). * drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git- fixes). * drm/panthor: Defer scheduler entitiy destruction to queue release (git- fixes). * drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes). * drm/panthor: validate group queue count (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes). * drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes). * drm/simpledrm: Do not upcast in release helpers (git-fixes). * drm/tests: Fix endian warning (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes). * drm/vmwgfx: Fix Use-after-free in validation (git-fixes). * drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes). * drm/vmwgfx: Fix copy-paste typo in validation (git-fixes). * drm/xe/bmg: Add new PCI IDs (stable-fixes). * drm/xe/bmg: Add one additional PCI ID (stable-fixes). * drm/xe/bmg: Update Wa_22019338487 (git-fixes). * drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes). * drm/xe/hw_engine_group: Fix double write lock release in error path (git- fixes). * drm/xe/mocs: Initialize MOCS index early (stable-fixes). * drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes). * drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes). * drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes). * drm/xe/tile: Release kobject for the failure path (git-fixes). * drm/xe/uapi: Correct sync type definition in comments (git-fixes). * drm/xe/uapi: loosen used tracking restriction (git-fixes). * drm/xe/vf: Disable CSC support on VF (git-fixes). * drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes). * drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes). * drm/xe/xe_sync: avoid race during ufence signaling (git-fixes). * drm/xe: Allow dropping kunit dependency as built-in (git-fixes). * drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes). * drm/xe: Carve out wopcm portion from the stolen memory (git-fixes). * drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes). * drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes). * drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git- fixes). * drm/xe: Fix build without debugfs (git-fixes). * drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes). * drm/xe: Move page fault init after topology init (git-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes). * dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331). * dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331). * e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes). * e1000e: ignore uninitialized checksum word on tgp (git-fixes). * efi: stmm: Fix incorrect buffer allocation method (git-fixes). * erofs: avoid reading more for fragment maps (git-fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * exfat: fdatasync flag should be same like generic_write_sync() (git-fixes). * ext4: fix checks for orphan inodes (bsc#1250119). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: Fix outdated registered_fb reference in comment (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix logic error in "offb" name match (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes). * fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes). * fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firewire: ohci: correct code comments about bus_reset tasklet (git-fixes). * firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes). * firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes). * firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes). * firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes). * firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes). * firmware: firmware: meson-sm: fix compile-test default (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * firmware: tegra: Fix IVC dependency problems (stable-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/proc/task_mmu: check p->vec_buf for NULL (git-fixes). * fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450 * ftrace: Fix function profiler's filtering functionality (git-fixes). * ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes). * gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220). * gfs2: Clean up delete work processing (bsc#1247220). * gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220). * gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220). * gfs2: Minor delete_work_func cleanup (bsc#1247220). * gfs2: Only defer deletes when we have an iopen glock (bsc#1247220). * gfs2: Prevent inode creation race (2) (bsc#1247220). * gfs2: Prevent inode creation race (bsc#1247220). * gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220). * gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (bsc#1247220). * gfs2: Rename dinode_demise to evict_behavior (bsc#1247220). * gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220). * gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220). * gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220). * gfs2: Update to the evict / remote delete documentation (bsc#1247220). * gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220). * gfs2: gfs2_evict_inode clarification (bsc#1247220). * gfs2: minor evict fix (bsc#1247220). * gfs2: skip if we cannot defer delete (bsc#1247220). * gpio: mlxbf2: use platform_get_irq_optional() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: virtio: Fix config space reading (git-fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes). * gpiolib: Extend software-node support to support secondary software-nodes (git-fixes). * gve: Fix stuck TX queue for DQ queue format (git-fixes). * gve: prevent ethtool ops after shutdown (git-fixes). * habanalabs: fix UAF in export_dmabuf() (git-fixes). * hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Link queues to NAPIs (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: designware: Add quirk for Intel Xe (stable-fixes). * i2c: designware: Fix clock issue when PM is disabled (git-fixes). * i2c: designware: Use temporary variable for struct device (stable-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git- fixes). * i2c: omap: Add support for setting mux (stable-fixes). * i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes). * i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes). * i2c: omap: fix deprecated of_property_read_bool() use (git-fixes). * i2c: qup: jump out of the loop in case of timeout (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Fix reset error handling with ACPI (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes). * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: add missing include to internal header (stable-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * i3c: master: svc: Use manual response for IBI events (git-fixes). * i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes). * i40e: report VF tx_dropped with tx_errors instead of tx_discards (git- fixes). * ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git- fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice/ptp: fix crosstimestamp reporting (git-fixes). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762). * ice: check correct pointer in fwlog debugfs (git-fixes). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: do not leave device non-functional if Tx scheduler config fails (git- fixes). * ice: enable_rdma devlink param (bsc#1247712). * ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728). * ice: fix incorrect counter for buffer allocation failures (git-fixes). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * ice: use fixed adapter index for E825C embedded devices (git-fixes). * idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762). * idpf: add cross timestamping (jsc#PED-13728). * idpf: add flow steering support (jsc#PED-13728). * idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762). * idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728). * idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762). * idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762). * idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728). * idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762). * idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762). * idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762). * idpf: improve when to set RE bit logic (jsc#PED-13728). * idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762). * idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762). * idpf: preserve coalescing settings across resets (jsc#PED-13728). * idpf: remove obsolete stashing code (jsc#PED-13728). * idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762). * idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728). * idpf: set mac type when adding and removing MAC filters (jsc#PED-13728). * idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728). * idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728). * idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762). * igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes). * igc: disable L1.2 PCI-E link substate to avoid performance issue (git- fixes). * igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes). * iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762). * iio/adc/pac1934: fix channel disable configuration (git-fixes). * iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git- fixes). * iio: accel: fxls8962af: Fix temperature calculation (git-fixes). * iio: adc: ad7173: fix setting ODR in probe (git-fixes). * iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes). * iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes). * iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes). * iio: adc: max1363: Reorder mode_list[] entries (stable-fixes). * iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes). * iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes). * iio: common: st_sensors: Fix use of uninitialize device structs (stable- fixes). * iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes). * iio: hid-sensor-prox: Restore lost scale assignments (git-fixes). * iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes). * iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes). * iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes). * iio: light: as73211: Ensure buffer holes are zeroed (git-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * intel_idle: Provide the default enter_dead() handler (jsc#PED-13815). * intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815). * interconnect: qcom: sc8180x: specify num_nodes (git-fixes). * interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git- fixes). * io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting. * io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542). * io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes). * iommu/amd: Enable PASID and ATS capabilities in the correct order (git- fixes). * iommu/amd: Fix alias device DTE setting (git-fixes). * iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes). * iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes). * iommu/arm-smmu-v3: Fix smmu_domain->nr_ats_masters decrement (git-fixes). * iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git- fixes). * iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes). * iommu/vt-d: Fix possible circular locking dependency (git-fixes). * iommu/vt-d: Fix system hang on reboot -f (git-fixes). * iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes). * iommu: Handle race with default domain setup (git-fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * ipv6: annotate data-races around rt->fib6_nsiblings (git-fixes). * ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes). * ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes). * ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes). * ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes). * ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410). * ixgbe: prevent from unwanted interface name changes (git-fixes). * ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git- fixes). * kABI fix after Add TDX support for vSphere (jsc#PED-13302). * kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * kABI fix after vhost: Reintroduce kthread API and add mode selection (git- fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for amd_sfh (git-fixes). * kABI workaround for drm_gem.h (git-fixes). * kABI workaround for struct mtk_base_afe changes (git-fixes). * kABI: Fix the module::name type in audit_context (git-fixes). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: fix for struct devlink_port_attrs: move new member to the end (git- fixes). * kABI: netfilter: supress warnings for nft_set_ops (git-fixes). * kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git- fixes). * kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally * kabi/severities: ignore two unused/dropped symbols from MEI * kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kbuild: rust: add rustc-min-version support function (git-fixes) * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kernel: globalize lookup_or_create_module_kobject() (stable-fixes). * kernel: param: rename locate_module_kobject (stable-fixes). * leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes). * leds: flash: leds-qcom-flash: Update torch current clamp setting (git- fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * leds: leds-lp55xx: Use correct address for memory programming (git-fixes). * lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897). * libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes). * libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762). * livepatch: Add stack_order sysfs attribute (poo#187320). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * lpfc: do not use file->f_path.dentry for comparisons (bsc#1250519). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes). * mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git- fixes). * mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes). * mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable- fixes). * mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes). * mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes). * mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git- fixes). * mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git- fixes). * mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * maple_tree: fix status setup on restore to active (git-fixes). * maple_tree: fix testing for 32 bit builds (git-fixes). * mctp: no longer rely on net->dev_index_head (git-fixes). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: cec: extron-da-hd-4k-plus: drop external-module make commands (git- fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: gspca: Add bounds checking to firmware parser (git-fixes). * media: hi556: Fix reset GPIO timings (stable-fixes). * media: hi556: correct the test pattern configuration (git-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes). * media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes). * media: ipu-bridge: Add _HID for OV5670 (stable-fixes). * media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes). * media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes). * media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git- fixes). * media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: pci: mg4b: fix uninitialized iio scan data (git-fixes). * media: pisp_be: Fix pm_runtime underrun in probe (git-fixes). * media: qcom: camss: cleanup media device allocated resource on error path (git-fixes). * media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git- fixes). * media: rc: fix races with imon_disconnect() (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: s5p-mfc: remove an unused/uninitialized variable (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes). * media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes). * media: ti: j721e-csi2rx: fix list_del corruption (git-fixes). * media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: usbtv: Lock resolution while streaming (git-fixes). * media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes). * media: uvcvideo: Do not mark valid metadata as invalid (git-fixes). * media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git- fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: uvcvideo: Rollback non processed entities on error (git-fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes). * media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes). * media: venus: Add a check for packet size after reading from shared memory (git-fixes). * media: venus: Fix MSM8998 frequency table (git-fixes). * media: venus: Fix OOB read due to missing payload bound check (git-fixes). * media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes). * media: venus: hfi: explicitly release IRQ during teardown (git-fixes). * media: venus: protect against spurious interrupts during probe (git-fixes). * media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: verisilicon: Fix AV1 decoder clock frequency (git-fixes). * media: vivid: fix wrong pixel_array control size (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * mei: vsc: Destroy mutex after freeing the IRQ (git-fixes). * mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes). * mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable- fixes). * mei: vsc: Event notifier fixes (git-fixes). * mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes). * mei: vsc: Run event callback from a workqueue (git-fixes). * mei: vsc: Unset the event callback on remove and probe errors (git-fixes). * memory: mtk-smi: Add ostd setting for mt8186 (git-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes). * mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes). * mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * microchip: lan865x: Fix LAN8651 autoloading (git-fixes). * microchip: lan865x: Fix module autoloading (git-fixes). * microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git- fixes). * microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes). * misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes). * misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes). * misc: fastrpc: Skip reference for DMA handles (git-fixes). * misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git- fixes). * misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable- fixes). * misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes). * mm/damon/core: avoid destroyed target reference from DAMOS quota (git- fixes). * mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes). * mm/damon/core: set quota->charged_from to jiffies at first charge window (git-fixes). * mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes). * mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes). * mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes). * mm/damon/sysfs: fix use-after-free in state_show() (git-fixes). * mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes). * mm: close theoretical race where stale TLB entries could linger (git-fixes). * mm: fault in complete folios instead of individual pages for tmpfs (git- fixes). * mm: fix the inaccurate memory statistics issue for users (bsc#1244723). * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git- fixes). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes). * mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable- fixes). * mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes). * mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes). * mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes). * module: Fix memory deallocation on error path in move_module() (git-fixes). * module: Prevent silent truncation of module name in delete_module(2) (git- fixes). * module: Remove unnecessary +1 from last_unloaded_module::name size (git- fixes). * module: Restore the moduleparam prefix length check (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fix spurious wake-up on under memory pressure (git-fixes). * mtd: fix possible integer overflow in erase_xfer() (git-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes). * mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes). * mtd: rawnand: atmel: set pmecc data setup time (git-fixes). * mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes). * mtd: rawnand: renesas: Add missing check after DMA map (git-fixes). * mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes). * mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER (git- fixes). * mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes). * mwl8k: Add missing check after DMA map (git-fixes). * neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes). * net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes). * net/mlx5: CT: Use the correct counter offset (git-fixes). * net/mlx5: Check device memory pointer before usage (git-fixes). * net/mlx5: Correctly set gso_segs when LRO is used (git-fixes). * net/mlx5: Correctly set gso_size when LRO is used (git-fixes). * net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes). * net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes). * net/mlx5: Fix memory leak in cmd_exec() (git-fixes). * net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes). * net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes). * net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes). * net/mlx5: Nack sync reset when SFs are present (git-fixes). * net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes). * net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes). * net/mlx5e: Add new prio for promiscuous mode (git-fixes). * net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git- fixes). * net/mlx5e: Preserve shared buffer capacity during headroom updates (git- fixes). * net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes). * net/mlx5e: Set local Xoff after FW update (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes). * net/packet: fix a race in packet_set_ring() and packet_notifier() (git- fixes). * net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes). * net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git- fixes). * net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes). * net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes). * net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes). * net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes). * net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN- untagged traffic (git-fixes). * net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes). * net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes). * net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: ieee8021q: fix insufficient table-size assertion (stable-fixes). * net: llc: reset skb->transport_header (git-fixes). * net: mana: Add handler for hardware servicing events (bsc#1245730). * net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726). * net: mana: Add support for net_shaper_ops (bsc#1245726). * net: mana: Allocate MSI-X vectors dynamically (bsc#1245457). * net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457). * net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729). * net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes). * net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726). * net: mana: Handle Reset Request from MANA NIC (bsc#1245728). * net: mana: Handle unsupported HWC commands (bsc#1245726). * net: mana: Set tx_packets to post gso processing packet count (bsc#1245731). * net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754). * net: mana: explain irq_setup() algorithm (bsc#1245457). * net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes). * net: mctp: handle skb cleanup on sock_queue failures (git-fixes). * net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes). * net: phy: bcm54811: PHY initialization (stable-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable- fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes). * net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes). * net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes). * net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes). * netfilter: ctnetlink: fix refcount leak on table dump (git-fixes). * netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes). * netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes). * netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git- fixes). * netfilter: nf_reject: do not leak dst refcount for loopback packets (git- fixes). * netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes). * netfilter: nf_tables: adjust lockdep assertions handling (git-fixes). * netfilter: nf_tables: fix set size with rbtree backend (git-fixes). * netfilter: nf_tables: imbalance in flowtable binding (git-fixes). * netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes). * netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes). * netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237). * netfilter: nft_set_hash: skip duplicated elements pending gc run (git- fixes). * netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git- fixes). * netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes). * netfilter: nft_tunnel: fix geneve_opt dump (git-fixes). * netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes). * netlink: fix policy dump for int with validation callback (jsc#PED-13331). * netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331). * netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes). * nfs/localio: add direct IO enablement with sync and async IO support (git- fixes). * nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes). * nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes). * nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes). * nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-auth: update bi_directional flag (git-fixes). * nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500). * nvme-pci: try function level reset on init failure (git-fixes). * nvme-tcp: log TLS handshake failures at error level (git-fixes). * nvme-tcp: send only permitted commands for secure concat (git-fixes). * nvme: fix PI insert on write (git-fixes). * nvme: fix endianness of command word prints in nvme_log_err_passthru() (git- fixes). * nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes). * nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes). * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500). * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500). * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500). * nvmet-tcp: fix callback lock for TLS handshake (git-fixes). * nvmet: exit debugfs after discovery subsystem exits (git-fixes). * nvmet: initialize discovery subsys after debugfs is initialized (git-fixes). * nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes). * objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes). * objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes). * objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes). * of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes). * of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git- fixes). * of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes). * of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes). * of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes). * of: unittest: Unlock on error in unittest_data_add() (git-fixes). * pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * percpu: fix race on alloc failed warning limit (git-fixes). * perf bpf-event: Fix use-after-free in synthesis (git-fixes). * perf bpf-utils: Constify bpil_array_desc (git-fixes). * perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes). * perf dso: Add missed dso__put to dso__load_kcore (git-fixes). * perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes). * perf parse-events: Set default GH modifier properly (git-fixes). * perf record: Cache build-ID of hit DSOs only (git-fixes). * perf sched: Fix memory leaks for evsel->priv in timehist (git-fixes). * perf sched: Fix memory leaks in 'perf sched latency' (git-fixes). * perf sched: Fix memory leaks in 'perf sched map' (git-fixes). * perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes). * perf sched: Free thread->priv using priv_destructor (git-fixes). * perf sched: Make sure it frees the usage string (git-fixes). * perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes). * perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git- fixes). * perf test: Fix a build error in x86 topdown test (git-fixes). * perf tests bp_account: Fix leaked file descriptor (git-fixes). * perf tools: Remove libtraceevent in .gitignore (git-fixes). * perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes). * perf trace: Remove --map-dump documentation (git-fixes). * phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: mscc: Fix timestamping for vsc8584 (git-fixes). * phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git- fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes). * phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy->rate in case of errors (git-fixes). * phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * phy: ti: omap-usb2: fix device leak at unbind (git-fixes). * pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113). * pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git- fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes). * pinmux: fix race causing mux_owner NULL with active mux_usecount (git- fixes). * platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git- fixes). * platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git- fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes). * platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes). * platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes). * platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes). * platform/x86: Fix initialization order for firmware_attributes_class (git- fixes). * platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes). * platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes). * platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git- fixes). * platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git- fixes). * platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git- fixes). * platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes). * platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git- fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git- fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git- fixes). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199). * powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199). * powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * powerpc: floppy: Add missing checks after DMA map (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * printk: nbcon: Allow reacquire during panic (bsc#1246688). * psample: adjust size if rate_as_probability is set (git-fixes). * ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: rockchip: Round period/duty down on apply, up on get (git-fixes). * pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git- fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * r8169: add support for RTL8125D (stable-fixes). * r8169: disable RTL8126 ZRX-DC timeout (stable-fixes). * r8169: do not scan PHY addresses > 0 (stable-fixes). * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * reset: eyeq: fix OF node leak (git-fixes). * resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762). * resource: fix false warning in __request_region() (git-fixes). * ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes). * ring-buffer: Make reading page consistent with the code logic (git-fixes). * rpm/config.sh: SLFO 1.2 is now synced to OBS as well * rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes). * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes). * rtc: optee: fix memory leak on driver removal (git-fixes). * rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes). * rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes). * rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes). * s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837). * s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477). * s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes). * s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372). * s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838). * s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066). * s390/mm: Remove possible false-positive warning in pte_free_defer() (git- fixes bsc#1247366). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478). * s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249065). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064). * samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes). * samples: mei: Fix building on musl libc (git-fixes). * sched/deadline: Always stop dl-server before changing parameters (bsc#1247936). * sched/deadline: Do not count nr_running for dl_server proxy tasks (git- fixes, bsc#1247936). * sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936). * sched/deadline: Fix dl_server_stopped() (bsc#1247936). * sched/deadline: Initialize dl_servers after SMP (git-fixes) * sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519). * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519). * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519). * scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519). * scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519). * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519). * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519). * scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519). * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519). * scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519). * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519). * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519). * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519). * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519). * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519). * scsi: lpfc: Use int type to store negative error codes (bsc#1250519). * scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519). * scsi: lpfc: use min() to improve code (bsc#1250519). * scsi: mpi3mr: Event processing debug improvement (bsc#1251186). * scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186). * scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186). * scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186). * scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes). * scsi: qla2xxx: Remove firmware URL (git-fixes). * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git- fixes). * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * scsi: smartpqi: Enhance WWID logging logic (bsc#1246631). * scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631). * scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631). * scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes). * scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git- fixes). * scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes). * scsi: ufs: core: Add missing post notify for power mode change (git-fixes). * scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes). * scsi: ufs: core: Always initialize the UIC done completion (git-fixes). * scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git- fixes). * scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes). * scsi: ufs: core: Fix error return with query response (git-fixes). * scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes). * scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes). * scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes). * scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes). * scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes). * scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes). * scsi: ufs: core: Remove redundant query_complete trace (git-fixes). * scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes). * scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes). * scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes). * scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes). * scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes). * scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git- fixes). * scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes). * scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes). * scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes). * scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes). * scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes). * scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes). * scsi: ufs: exynos: Remove empty drv_init method (git-fixes). * scsi: ufs: exynos: Remove superfluous function parameter (git-fixes). * scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes). * scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git- fixes). * scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git- fixes). * scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes). * scsi: ufs: qcom: Fix crypto key eviction (git-fixes). * scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git- fixes). * scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes). * scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671). * selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320). * selftests/livepatch: Replace hardcoded module name with variable in test- callbacks.sh (poo#187320). * selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320). * selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: ALSA: fix memory leak in utimer test (git-fixes). * selftests: livepatch: add new ftrace helpers functions (poo#187320). * selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320). * selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320). * selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320). * selftests: livepatch: save and restore kprobe state (poo#187320). * selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320). * selftests: livepatch: test livepatching a kprobed function (poo#187320). * selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443). * selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes). * selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable- fixes). * serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206). * smb: client: fix netns refcount leak after net_passive changes (git-fixes). * soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git- fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git- fixes). * soc: qcom: QMI encoding/decoding for big endian (git-fixes). * soc: qcom: fix endianness for QMI header (git-fixes). * soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes). * soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes). * soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git- fixes). * soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git- fixes). * soc: qcom: pmic_glink: fix OF node leak (git-fixes). * soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes). * soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes). * soundwire: amd: fix for handling slave alerts after link is down (git- fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * soundwire: stream: restore params when prepare ports fail (git-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable- fixes). * spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979). * spi: fix return code when spi device has too many chipselects (git-fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes). * spi: spi-fsl-lpspi: Clear status register after disabling the module (git- fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes). * sprintf.h requires stdarg.h (git-fixes). * sprintf.h: mask additional include (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes). * staging: axis-fifo: fix maximum TX packet length check (git-fixes). * staging: axis-fifo: flush RX FIFO on read errors (git-fixes). * staging: axis-fifo: remove sysfs interface (git-fixes). * staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git- fixes). * staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes). * staging: nvec: Fix incorrect null termination of battery manufacturer (git- fixes). * staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes). * struct cdc_ncm_ctx: move new member to end (git-fixes). * sunrpc: fix client side handling of tls alerts (git-fixes). * sunrpc: fix handling of server side tls alerts (git-fixes). * sunrpc: fix null pointer dereference on zero-length checksum (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: Mark ZL3073X modules supported * supported.conf: mark hyperv_drm as external * tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes). * tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650). * thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes). * thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes). * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * thunderbolt: Fix copy+paste error in match_service_id() (git-fixes). * tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes). * tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes). * tools/power turbostat: Fix build with musl (stable-fixes). * tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes). * tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes). * tools/resolve_btfids: Fix build when cross compiling kernel with clang (git- fixes). * tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes). * trace/fgraph: Fix error handling (git-fixes). * trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes). * tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631). * tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes). * tracing/kprobes: Fix to free objects when failed to copy a symbol (git- fixes). * tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes). * tracing: Fix filter string testing (git-fixes). * tracing: Fix using ret variable in tracing_set_tracer() (git-fixes). * tracing: Remove unneeded goto out logic (bsc#1249286). * tracing: Switch trace.c code over to use guard() (git-fixes). * tracing: Switch trace_events_hist.c code over to use guard() (git-fixes). * tracing: fprobe events: Fix possible UAF on modules (git-fixes). * tracing: tprobe-events: Fix leakage of module refcount (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * tty: serial: fix print format specifiers (stable-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * ucount: fix atomic_long_inc_below() argument type (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes). * usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git- fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes). * usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes). * usb: gadget: midi2: Fix missing UMP group attributes initialization (git- fixes). * usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes). * usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: musb: omap2430: fix device leak at unbind (git-fixes). * usb: phy: twl6030: Fix incorrect type for ret (git-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes). * usb: typec: tcpm: allow switching to mode accessory to mux properly (stable- fixes). * usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes). * usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git- fixes). * usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git- fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: Update power_supply on power role change (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes). * vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes). * vhost: Reintroduce kthread API and add mode selection (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * virtchnl2: add flow steering support (jsc#PED-13728). * virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728). * virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762). * virtio_net: Enforce minimum TX ring size for reliability (git-fixes). * virtio_ring: Fix error reporting in virtqueue_resize (git-fixes). * vmci: Prevent the dispatching of uninitialized payloads (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: Validate length in packet header before skb_put() (git-fixes). * vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes). * vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git- fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes). * wifi: ath11k: fix source ring-buffer corruption (git-fixes). * wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes). * wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath12k: fix endianness handling while accessing wmi service bit (git- fixes). * wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes). * wifi: ath12k: fix source ring-buffer corruption (git-fixes). * wifi: ath12k: fix the fetching of combined rssi (git-fixes). * wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath12k: fix wrong logging ID used for CE (git-fixes). * wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084). * wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes). * wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes). * wifi: iwlwifi: Remove redundant header files (git-fixes). * wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes). * wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes). * wifi: mac80211: Do not schedule stopped TXQs (git-fixes). * wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes). * wifi: mac80211: avoid weird state in error path (stable-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: reject TDLS operations when station is not associated (git- fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix linked list corruption (git-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes). * wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes). * wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes). * wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes). * wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes). * wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes). * wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: nl80211: Set num_sub_specs before looping through sub_specs (git- fixes). * wifi: plfxlc: Fix error handling in usb driver probe (git-fixes). * wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes). * wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtw88: Fix macid assigned to TDLS station (git-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes). * wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704). * x86/Kconfig: Add arch attack vector support (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/boot: Sanitize boot params before parsing command line (git-fixes). * x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes). * x86/bugs: Add attack vector controls for BHI (git-fixes). * x86/bugs: Add attack vector controls for GDS (git-fixes). * x86/bugs: Add attack vector controls for ITS (git-fixes). * x86/bugs: Add attack vector controls for L1TF (git-fixes). * x86/bugs: Add attack vector controls for MDS (git-fixes). * x86/bugs: Add attack vector controls for MMIO (git-fixes). * x86/bugs: Add attack vector controls for RFDS (git-fixes). * x86/bugs: Add attack vector controls for SRBDS (git-fixes). * x86/bugs: Add attack vector controls for SRSO (git-fixes). * x86/bugs: Add attack vector controls for SSB (git-fixes). * x86/bugs: Add attack vector controls for TAA (git-fixes). * x86/bugs: Add attack vector controls for TSA (git-fixes). * x86/bugs: Add attack vector controls for retbleed (git-fixes). * x86/bugs: Add attack vector controls for spectre_v1 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes). * x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes). * x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git- fixes). * x86/bugs: Avoid warning when overriding return thunk (git-fixes). * x86/bugs: Clean up SRSO microcode handling (git-fixes). * x86/bugs: Define attack vectors relevant for each bug (git-fixes). * x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes). * x86/bugs: Introduce cdt_possible() (git-fixes). * x86/bugs: Print enabled attack vectors (git-fixes). * x86/bugs: Remove its=stuff dependency on retbleed (git-fixes). * x86/bugs: Select best SRSO mitigation (git-fixes). * x86/bugs: Simplify the retbleed=stuff checks (git-fixes). * x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes). * x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes). * x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git- fixes). * x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git- fixes). * x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes). * x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes). * x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git- fixes). * x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes). * x86/headers: Replace **ASSEMBLY** with **ASSEMBLER** in UAPI headers (git- fixes). * x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes). * x86/mce/amd: Add default names for MCA banks and blocks (git-fixes). * x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes). * x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes). * x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git- fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/microcode: Consolidate the loader enablement checking (git-fixes). * x86/microcode: Update the Intel processor flag scan check (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/mm/pat: do not collapse pages without PSE set (git-fixes). * x86/nmi: Add an emergency handler in nmi_desc & use it in nmi_shootdown_cpus() (git-fixes). * x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC < 14.2 (git-fixes). * x86/pkeys: Simplify PKRU update in signal frame (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/pti: Add attack vector controls for PTI (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815). * x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815). * x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815). * x86/smpboot: Fix INIT delay assignment for extended Intel Families (git- fixes). * x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815). * x86/traps: Initialize DR6 by writing its architectural reset value (git- fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: fix UAF in dmabuf_exp_from_pages() (git-fixes). * xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO (git-fixes). * xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes). * xfs: do not propagate ENODATA disk errors into xattr code (git-fixes). * xfs: fix scrub trace with null pointer in quotacheck (git-fixes). * xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes). * xfs: remove unused event xfs_alloc_near_error (git-fixes). * xfs: remove unused event xfs_alloc_near_nominleft (git-fixes). * xfs: remove unused event xfs_attr_node_removename (git-fixes). * xfs: remove unused event xfs_ioctl_clone (git-fixes). * xfs: remove unused event xfs_pagecache_inval (git-fixes). * xfs: remove unused event xlog_iclog_want_sync (git-fixes). * xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes). * xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes). * xfs: remove unused trace event xfs_discard_rtrelax (git-fixes). * xfs: remove unused trace event xfs_log_cil_return (git-fixes). * xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes). * xfs: remove unused xfs_attr events (git-fixes). * xfs: remove unused xfs_reflink_compare_extents events (git-fixes). * xfs: remove usused xfs_end_io_direct events (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: dbc: decouple endpoint allocation from initialization (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). * zram: permit only one post-processing operation at a time (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-11=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * kernel-macros-6.12.0-160000.6.1 * kernel-devel-6.12.0-160000.6.1 * kernel-source-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.12.0-160000.6.1 * kernel-default-extra-debuginfo-6.12.0-160000.6.1 * kernel-default-extra-6.12.0-160000.6.1 * kernel-default-debuginfo-6.12.0-160000.6.1 * kernel-default-debugsource-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (x86_64) * kernel-rt-livepatch-6.12.0-160000.6.1 * kernel-rt-devel-debuginfo-6.12.0-160000.6.1 * kernel-default-devel-debuginfo-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (aarch64 nosrc x86_64) * kernel-rt-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (aarch64 x86_64) * kernel-rt-debuginfo-6.12.0-160000.6.1 * kernel-rt-debugsource-6.12.0-160000.6.1 * kernel-rt-devel-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.6.1 * SUSE Linux Micro 6.2 (aarch64) * kernel-64kb-debuginfo-6.12.0-160000.6.1 * kernel-64kb-debugsource-6.12.0-160000.6.1 * kernel-64kb-devel-6.12.0-160000.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-57891.html * https://www.suse.com/security/cve/CVE-2024-57951.html * https://www.suse.com/security/cve/CVE-2024-57952.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2025-22034.html * https://www.suse.com/security/cve/CVE-2025-22077.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37821.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37856.html * https://www.suse.com/security/cve/CVE-2025-37861.html * https://www.suse.com/security/cve/CVE-2025-37864.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38008.html * https://www.suse.com/security/cve/CVE-2025-38019.html * https://www.suse.com/security/cve/CVE-2025-38034.html * https://www.suse.com/security/cve/CVE-2025-38038.html * https://www.suse.com/security/cve/CVE-2025-38052.html * https://www.suse.com/security/cve/CVE-2025-38058.html * https://www.suse.com/security/cve/CVE-2025-38062.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38087.html * https://www.suse.com/security/cve/CVE-2025-38088.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38090.html * https://www.suse.com/security/cve/CVE-2025-38091.html * https://www.suse.com/security/cve/CVE-2025-38095.html * https://www.suse.com/security/cve/CVE-2025-38096.html * https://www.suse.com/security/cve/CVE-2025-38098.html * https://www.suse.com/security/cve/CVE-2025-38099.html * https://www.suse.com/security/cve/CVE-2025-38101.html * https://www.suse.com/security/cve/CVE-2025-38102.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38106.html * https://www.suse.com/security/cve/CVE-2025-38107.html * https://www.suse.com/security/cve/CVE-2025-38108.html * https://www.suse.com/security/cve/CVE-2025-38109.html * https://www.suse.com/security/cve/CVE-2025-38110.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38112.html * https://www.suse.com/security/cve/CVE-2025-38113.html * https://www.suse.com/security/cve/CVE-2025-38114.html * https://www.suse.com/security/cve/CVE-2025-38117.html * https://www.suse.com/security/cve/CVE-2025-38118.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38120.html * https://www.suse.com/security/cve/CVE-2025-38122.html * https://www.suse.com/security/cve/CVE-2025-38123.html * https://www.suse.com/security/cve/CVE-2025-38124.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38127.html * https://www.suse.com/security/cve/CVE-2025-38128.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://www.suse.com/security/cve/CVE-2025-38134.html * https://www.suse.com/security/cve/CVE-2025-38135.html * https://www.suse.com/security/cve/CVE-2025-38136.html * https://www.suse.com/security/cve/CVE-2025-38137.html * https://www.suse.com/security/cve/CVE-2025-38138.html * https://www.suse.com/security/cve/CVE-2025-38140.html * https://www.suse.com/security/cve/CVE-2025-38141.html * https://www.suse.com/security/cve/CVE-2025-38142.html * https://www.suse.com/security/cve/CVE-2025-38143.html * https://www.suse.com/security/cve/CVE-2025-38145.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38148.html * https://www.suse.com/security/cve/CVE-2025-38149.html * https://www.suse.com/security/cve/CVE-2025-38151.html * https://www.suse.com/security/cve/CVE-2025-38153.html * https://www.suse.com/security/cve/CVE-2025-38154.html * https://www.suse.com/security/cve/CVE-2025-38155.html * https://www.suse.com/security/cve/CVE-2025-38156.html * https://www.suse.com/security/cve/CVE-2025-38157.html * https://www.suse.com/security/cve/CVE-2025-38159.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38161.html * https://www.suse.com/security/cve/CVE-2025-38165.html * https://www.suse.com/security/cve/CVE-2025-38168.html * https://www.suse.com/security/cve/CVE-2025-38169.html * https://www.suse.com/security/cve/CVE-2025-38170.html * https://www.suse.com/security/cve/CVE-2025-38172.html * https://www.suse.com/security/cve/CVE-2025-38173.html * https://www.suse.com/security/cve/CVE-2025-38174.html * https://www.suse.com/security/cve/CVE-2025-38177.html * https://www.suse.com/security/cve/CVE-2025-38180.html * https://www.suse.com/security/cve/CVE-2025-38181.html * https://www.suse.com/security/cve/CVE-2025-38182.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38186.html * https://www.suse.com/security/cve/CVE-2025-38188.html * https://www.suse.com/security/cve/CVE-2025-38189.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38193.html * https://www.suse.com/security/cve/CVE-2025-38197.html * https://www.suse.com/security/cve/CVE-2025-38198.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38209.html * https://www.suse.com/security/cve/CVE-2025-38211.html * https://www.suse.com/security/cve/CVE-2025-38213.html * https://www.suse.com/security/cve/CVE-2025-38214.html * https://www.suse.com/security/cve/CVE-2025-38215.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38217.html * https://www.suse.com/security/cve/CVE-2025-38220.html * https://www.suse.com/security/cve/CVE-2025-38222.html * https://www.suse.com/security/cve/CVE-2025-38224.html * https://www.suse.com/security/cve/CVE-2025-38225.html * https://www.suse.com/security/cve/CVE-2025-38226.html * https://www.suse.com/security/cve/CVE-2025-38227.html * https://www.suse.com/security/cve/CVE-2025-38228.html * https://www.suse.com/security/cve/CVE-2025-38229.html * https://www.suse.com/security/cve/CVE-2025-38231.html * https://www.suse.com/security/cve/CVE-2025-38232.html * https://www.suse.com/security/cve/CVE-2025-38233.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38242.html * https://www.suse.com/security/cve/CVE-2025-38244.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38246.html * https://www.suse.com/security/cve/CVE-2025-38249.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38253.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38256.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://www.suse.com/security/cve/CVE-2025-38258.html * https://www.suse.com/security/cve/CVE-2025-38259.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38265.html * https://www.suse.com/security/cve/CVE-2025-38267.html * https://www.suse.com/security/cve/CVE-2025-38268.html * https://www.suse.com/security/cve/CVE-2025-38270.html * https://www.suse.com/security/cve/CVE-2025-38272.html * https://www.suse.com/security/cve/CVE-2025-38273.html * https://www.suse.com/security/cve/CVE-2025-38274.html * https://www.suse.com/security/cve/CVE-2025-38275.html * https://www.suse.com/security/cve/CVE-2025-38277.html * https://www.suse.com/security/cve/CVE-2025-38278.html * https://www.suse.com/security/cve/CVE-2025-38286.html * https://www.suse.com/security/cve/CVE-2025-38287.html * https://www.suse.com/security/cve/CVE-2025-38288.html * https://www.suse.com/security/cve/CVE-2025-38289.html * https://www.suse.com/security/cve/CVE-2025-38290.html * https://www.suse.com/security/cve/CVE-2025-38291.html * https://www.suse.com/security/cve/CVE-2025-38292.html * https://www.suse.com/security/cve/CVE-2025-38293.html * https://www.suse.com/security/cve/CVE-2025-38299.html * https://www.suse.com/security/cve/CVE-2025-38300.html * https://www.suse.com/security/cve/CVE-2025-38301.html * https://www.suse.com/security/cve/CVE-2025-38302.html * https://www.suse.com/security/cve/CVE-2025-38303.html * https://www.suse.com/security/cve/CVE-2025-38304.html * https://www.suse.com/security/cve/CVE-2025-38305.html * https://www.suse.com/security/cve/CVE-2025-38306.html * https://www.suse.com/security/cve/CVE-2025-38307.html * https://www.suse.com/security/cve/CVE-2025-38311.html * https://www.suse.com/security/cve/CVE-2025-38312.html * https://www.suse.com/security/cve/CVE-2025-38313.html * https://www.suse.com/security/cve/CVE-2025-38315.html * https://www.suse.com/security/cve/CVE-2025-38317.html * https://www.suse.com/security/cve/CVE-2025-38318.html * https://www.suse.com/security/cve/CVE-2025-38319.html * https://www.suse.com/security/cve/CVE-2025-38322.html * https://www.suse.com/security/cve/CVE-2025-38323.html * https://www.suse.com/security/cve/CVE-2025-38326.html * https://www.suse.com/security/cve/CVE-2025-38332.html * https://www.suse.com/security/cve/CVE-2025-38335.html * https://www.suse.com/security/cve/CVE-2025-38336.html * https://www.suse.com/security/cve/CVE-2025-38337.html * https://www.suse.com/security/cve/CVE-2025-38338.html * https://www.suse.com/security/cve/CVE-2025-38339.html * https://www.suse.com/security/cve/CVE-2025-38341.html * https://www.suse.com/security/cve/CVE-2025-38342.html * https://www.suse.com/security/cve/CVE-2025-38343.html * https://www.suse.com/security/cve/CVE-2025-38344.html * https://www.suse.com/security/cve/CVE-2025-38345.html * https://www.suse.com/security/cve/CVE-2025-38348.html * https://www.suse.com/security/cve/CVE-2025-38349.html * https://www.suse.com/security/cve/CVE-2025-38350.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38353.html * https://www.suse.com/security/cve/CVE-2025-38354.html * https://www.suse.com/security/cve/CVE-2025-38355.html * https://www.suse.com/security/cve/CVE-2025-38356.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-38362.html * https://www.suse.com/security/cve/CVE-2025-38363.html * https://www.suse.com/security/cve/CVE-2025-38364.html * https://www.suse.com/security/cve/CVE-2025-38365.html * https://www.suse.com/security/cve/CVE-2025-38368.html * https://www.suse.com/security/cve/CVE-2025-38369.html * https://www.suse.com/security/cve/CVE-2025-38371.html * https://www.suse.com/security/cve/CVE-2025-38372.html * https://www.suse.com/security/cve/CVE-2025-38373.html * https://www.suse.com/security/cve/CVE-2025-38374.html * https://www.suse.com/security/cve/CVE-2025-38375.html * https://www.suse.com/security/cve/CVE-2025-38376.html * https://www.suse.com/security/cve/CVE-2025-38377.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38381.html * https://www.suse.com/security/cve/CVE-2025-38382.html * https://www.suse.com/security/cve/CVE-2025-38383.html * https://www.suse.com/security/cve/CVE-2025-38384.html * https://www.suse.com/security/cve/CVE-2025-38385.html * https://www.suse.com/security/cve/CVE-2025-38386.html * https://www.suse.com/security/cve/CVE-2025-38387.html * https://www.suse.com/security/cve/CVE-2025-38389.html * https://www.suse.com/security/cve/CVE-2025-38390.html * https://www.suse.com/security/cve/CVE-2025-38391.html * https://www.suse.com/security/cve/CVE-2025-38392.html * https://www.suse.com/security/cve/CVE-2025-38393.html * https://www.suse.com/security/cve/CVE-2025-38395.html * https://www.suse.com/security/cve/CVE-2025-38396.html * https://www.suse.com/security/cve/CVE-2025-38397.html * https://www.suse.com/security/cve/CVE-2025-38399.html * https://www.suse.com/security/cve/CVE-2025-38400.html * https://www.suse.com/security/cve/CVE-2025-38401.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38403.html * https://www.suse.com/security/cve/CVE-2025-38404.html * https://www.suse.com/security/cve/CVE-2025-38405.html * https://www.suse.com/security/cve/CVE-2025-38406.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38409.html * https://www.suse.com/security/cve/CVE-2025-38410.html * https://www.suse.com/security/cve/CVE-2025-38412.html * https://www.suse.com/security/cve/CVE-2025-38413.html * https://www.suse.com/security/cve/CVE-2025-38414.html * https://www.suse.com/security/cve/CVE-2025-38415.html * https://www.suse.com/security/cve/CVE-2025-38416.html * https://www.suse.com/security/cve/CVE-2025-38417.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38420.html * https://www.suse.com/security/cve/CVE-2025-38421.html * https://www.suse.com/security/cve/CVE-2025-38424.html * https://www.suse.com/security/cve/CVE-2025-38425.html * https://www.suse.com/security/cve/CVE-2025-38426.html * https://www.suse.com/security/cve/CVE-2025-38427.html * https://www.suse.com/security/cve/CVE-2025-38428.html * https://www.suse.com/security/cve/CVE-2025-38429.html * https://www.suse.com/security/cve/CVE-2025-38430.html * https://www.suse.com/security/cve/CVE-2025-38436.html * https://www.suse.com/security/cve/CVE-2025-38438.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38440.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38443.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38446.html * https://www.suse.com/security/cve/CVE-2025-38448.html * https://www.suse.com/security/cve/CVE-2025-38449.html * https://www.suse.com/security/cve/CVE-2025-38450.html * https://www.suse.com/security/cve/CVE-2025-38451.html * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38454.html * https://www.suse.com/security/cve/CVE-2025-38455.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38457.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38460.html * https://www.suse.com/security/cve/CVE-2025-38461.html * https://www.suse.com/security/cve/CVE-2025-38462.html * https://www.suse.com/security/cve/CVE-2025-38463.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38467.html * https://www.suse.com/security/cve/CVE-2025-38468.html * https://www.suse.com/security/cve/CVE-2025-38470.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38473.html * https://www.suse.com/security/cve/CVE-2025-38474.html * https://www.suse.com/security/cve/CVE-2025-38475.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://www.suse.com/security/cve/CVE-2025-38478.html * https://www.suse.com/security/cve/CVE-2025-38480.html * https://www.suse.com/security/cve/CVE-2025-38481.html * https://www.suse.com/security/cve/CVE-2025-38482.html * https://www.suse.com/security/cve/CVE-2025-38483.html * https://www.suse.com/security/cve/CVE-2025-38484.html * https://www.suse.com/security/cve/CVE-2025-38485.html * https://www.suse.com/security/cve/CVE-2025-38487.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38489.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38493.html * https://www.suse.com/security/cve/CVE-2025-38494.html * https://www.suse.com/security/cve/CVE-2025-38495.html * https://www.suse.com/security/cve/CVE-2025-38496.html * https://www.suse.com/security/cve/CVE-2025-38497.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38508.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38545.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38549.html * https://www.suse.com/security/cve/CVE-2025-38552.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38554.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38557.html * https://www.suse.com/security/cve/CVE-2025-38559.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38564.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38573.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38586.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38619.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38631.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38648.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38658.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38662.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38686.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38700.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38717.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38733.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39673.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39683.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39687.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39697.html * https://www.suse.com/security/cve/CVE-2025-39698.html * https://www.suse.com/security/cve/CVE-2025-39700.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39712.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39722.html * https://www.suse.com/security/cve/CVE-2025-39723.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39727.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39748.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39765.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39775.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39791.html * https://www.suse.com/security/cve/CVE-2025-39792.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39836.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39841.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39851.html * https://www.suse.com/security/cve/CVE-2025-39852.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39875.html * https://www.suse.com/security/cve/CVE-2025-39877.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39884.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39896.html * https://www.suse.com/security/cve/CVE-2025-39898.html * https://www.suse.com/security/cve/CVE-2025-39899.html * https://www.suse.com/security/cve/CVE-2025-39900.html * https://www.suse.com/security/cve/CVE-2025-39902.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39909.html * https://www.suse.com/security/cve/CVE-2025-39916.html * https://www.suse.com/security/cve/CVE-2025-39918.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-39926.html * https://www.suse.com/security/cve/CVE-2025-39931.html * https://www.suse.com/security/cve/CVE-2025-39934.html * https://www.suse.com/security/cve/CVE-2025-39937.html * https://www.suse.com/security/cve/CVE-2025-39938.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39946.html * https://www.suse.com/security/cve/CVE-2025-39952.html * https://www.suse.com/security/cve/CVE-2025-39957.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://www.suse.com/security/cve/CVE-2026-38264.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1234634 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1235953 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237108 * https://bugzilla.suse.com/show_bug.cgi?id=1237131 * https://bugzilla.suse.com/show_bug.cgi?id=1237542 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240998 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241403 * https://bugzilla.suse.com/show_bug.cgi?id=1241435 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242864 * https://bugzilla.suse.com/show_bug.cgi?id=1242965 * https://bugzilla.suse.com/show_bug.cgi?id=1242995 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243055 * https://bugzilla.suse.com/show_bug.cgi?id=1243068 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1243774 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244723 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244749 * https://bugzilla.suse.com/show_bug.cgi?id=1244792 * https://bugzilla.suse.com/show_bug.cgi?id=1244812 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1244939 * https://bugzilla.suse.com/show_bug.cgi?id=1245000 * https://bugzilla.suse.com/show_bug.cgi?id=1245151 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245206 * https://bugzilla.suse.com/show_bug.cgi?id=1245216 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245410 * https://bugzilla.suse.com/show_bug.cgi?id=1245457 * https://bugzilla.suse.com/show_bug.cgi?id=1245504 * https://bugzilla.suse.com/show_bug.cgi?id=1245506 * https://bugzilla.suse.com/show_bug.cgi?id=1245508 * https://bugzilla.suse.com/show_bug.cgi?id=1245510 * https://bugzilla.suse.com/show_bug.cgi?id=1245596 * https://bugzilla.suse.com/show_bug.cgi?id=1245621 * https://bugzilla.suse.com/show_bug.cgi?id=1245630 * https://bugzilla.suse.com/show_bug.cgi?id=1245654 * https://bugzilla.suse.com/show_bug.cgi?id=1245657 * https://bugzilla.suse.com/show_bug.cgi?id=1245658 * https://bugzilla.suse.com/show_bug.cgi?id=1245659 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245664 * https://bugzilla.suse.com/show_bug.cgi?id=1245665 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1245668 * https://bugzilla.suse.com/show_bug.cgi?id=1245669 * https://bugzilla.suse.com/show_bug.cgi?id=1245670 * https://bugzilla.suse.com/show_bug.cgi?id=1245671 * https://bugzilla.suse.com/show_bug.cgi?id=1245675 * https://bugzilla.suse.com/show_bug.cgi?id=1245676 * https://bugzilla.suse.com/show_bug.cgi?id=1245678 * https://bugzilla.suse.com/show_bug.cgi?id=1245683 * https://bugzilla.suse.com/show_bug.cgi?id=1245684 * https://bugzilla.suse.com/show_bug.cgi?id=1245686 * https://bugzilla.suse.com/show_bug.cgi?id=1245688 * https://bugzilla.suse.com/show_bug.cgi?id=1245690 * https://bugzilla.suse.com/show_bug.cgi?id=1245691 * https://bugzilla.suse.com/show_bug.cgi?id=1245695 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245703 * https://bugzilla.suse.com/show_bug.cgi?id=1245705 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245711 * https://bugzilla.suse.com/show_bug.cgi?id=1245713 * https://bugzilla.suse.com/show_bug.cgi?id=1245714 * https://bugzilla.suse.com/show_bug.cgi?id=1245715 * https://bugzilla.suse.com/show_bug.cgi?id=1245717 * https://bugzilla.suse.com/show_bug.cgi?id=1245719 * https://bugzilla.suse.com/show_bug.cgi?id=1245721 * https://bugzilla.suse.com/show_bug.cgi?id=1245723 * https://bugzilla.suse.com/show_bug.cgi?id=1245726 * https://bugzilla.suse.com/show_bug.cgi?id=1245728 * https://bugzilla.suse.com/show_bug.cgi?id=1245729 * https://bugzilla.suse.com/show_bug.cgi?id=1245730 * https://bugzilla.suse.com/show_bug.cgi?id=1245731 * https://bugzilla.suse.com/show_bug.cgi?id=1245735 * https://bugzilla.suse.com/show_bug.cgi?id=1245737 * https://bugzilla.suse.com/show_bug.cgi?id=1245744 * https://bugzilla.suse.com/show_bug.cgi?id=1245745 * https://bugzilla.suse.com/show_bug.cgi?id=1245746 * https://bugzilla.suse.com/show_bug.cgi?id=1245747 * https://bugzilla.suse.com/show_bug.cgi?id=1245748 * https://bugzilla.suse.com/show_bug.cgi?id=1245749 * https://bugzilla.suse.com/show_bug.cgi?id=1245751 * https://bugzilla.suse.com/show_bug.cgi?id=1245757 * https://bugzilla.suse.com/show_bug.cgi?id=1245763 * https://bugzilla.suse.com/show_bug.cgi?id=1245765 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245769 * https://bugzilla.suse.com/show_bug.cgi?id=1245777 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245781 * https://bugzilla.suse.com/show_bug.cgi?id=1245784 * https://bugzilla.suse.com/show_bug.cgi?id=1245785 * https://bugzilla.suse.com/show_bug.cgi?id=1245787 * https://bugzilla.suse.com/show_bug.cgi?id=1245812 * https://bugzilla.suse.com/show_bug.cgi?id=1245814 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245937 * https://bugzilla.suse.com/show_bug.cgi?id=1245945 * https://bugzilla.suse.com/show_bug.cgi?id=1245952 * https://bugzilla.suse.com/show_bug.cgi?id=1245955 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1245966 * https://bugzilla.suse.com/show_bug.cgi?id=1245970 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245976 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1245986 * https://bugzilla.suse.com/show_bug.cgi?id=1246000 * https://bugzilla.suse.com/show_bug.cgi?id=1246002 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246008 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246022 * https://bugzilla.suse.com/show_bug.cgi?id=1246023 * https://bugzilla.suse.com/show_bug.cgi?id=1246031 * https://bugzilla.suse.com/show_bug.cgi?id=1246034 * https://bugzilla.suse.com/show_bug.cgi?id=1246037 * https://bugzilla.suse.com/show_bug.cgi?id=1246041 * https://bugzilla.suse.com/show_bug.cgi?id=1246042 * https://bugzilla.suse.com/show_bug.cgi?id=1246047 * https://bugzilla.suse.com/show_bug.cgi?id=1246049 * https://bugzilla.suse.com/show_bug.cgi?id=1246050 * https://bugzilla.suse.com/show_bug.cgi?id=1246053 * https://bugzilla.suse.com/show_bug.cgi?id=1246054 * https://bugzilla.suse.com/show_bug.cgi?id=1246055 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246098 * https://bugzilla.suse.com/show_bug.cgi?id=1246109 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246166 * https://bugzilla.suse.com/show_bug.cgi?id=1246171 * https://bugzilla.suse.com/show_bug.cgi?id=1246176 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246183 * https://bugzilla.suse.com/show_bug.cgi?id=1246185 * https://bugzilla.suse.com/show_bug.cgi?id=1246186 * https://bugzilla.suse.com/show_bug.cgi?id=1246188 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246192 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246195 * https://bugzilla.suse.com/show_bug.cgi?id=1246220 * https://bugzilla.suse.com/show_bug.cgi?id=1246234 * https://bugzilla.suse.com/show_bug.cgi?id=1246236 * https://bugzilla.suse.com/show_bug.cgi?id=1246240 * https://bugzilla.suse.com/show_bug.cgi?id=1246243 * https://bugzilla.suse.com/show_bug.cgi?id=1246244 * https://bugzilla.suse.com/show_bug.cgi?id=1246245 * https://bugzilla.suse.com/show_bug.cgi?id=1246246 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246250 * https://bugzilla.suse.com/show_bug.cgi?id=1246252 * https://bugzilla.suse.com/show_bug.cgi?id=1246253 * https://bugzilla.suse.com/show_bug.cgi?id=1246255 * https://bugzilla.suse.com/show_bug.cgi?id=1246258 * https://bugzilla.suse.com/show_bug.cgi?id=1246259 * https://bugzilla.suse.com/show_bug.cgi?id=1246260 * https://bugzilla.suse.com/show_bug.cgi?id=1246262 * https://bugzilla.suse.com/show_bug.cgi?id=1246266 * https://bugzilla.suse.com/show_bug.cgi?id=1246268 * https://bugzilla.suse.com/show_bug.cgi?id=1246283 * https://bugzilla.suse.com/show_bug.cgi?id=1246285 * https://bugzilla.suse.com/show_bug.cgi?id=1246286 * https://bugzilla.suse.com/show_bug.cgi?id=1246287 * https://bugzilla.suse.com/show_bug.cgi?id=1246290 * https://bugzilla.suse.com/show_bug.cgi?id=1246292 * https://bugzilla.suse.com/show_bug.cgi?id=1246293 * https://bugzilla.suse.com/show_bug.cgi?id=1246295 * https://bugzilla.suse.com/show_bug.cgi?id=1246297 * https://bugzilla.suse.com/show_bug.cgi?id=1246333 * https://bugzilla.suse.com/show_bug.cgi?id=1246334 * https://bugzilla.suse.com/show_bug.cgi?id=1246337 * https://bugzilla.suse.com/show_bug.cgi?id=1246342 * https://bugzilla.suse.com/show_bug.cgi?id=1246349 * https://bugzilla.suse.com/show_bug.cgi?id=1246351 * https://bugzilla.suse.com/show_bug.cgi?id=1246353 * https://bugzilla.suse.com/show_bug.cgi?id=1246354 * https://bugzilla.suse.com/show_bug.cgi?id=1246358 * https://bugzilla.suse.com/show_bug.cgi?id=1246364 * https://bugzilla.suse.com/show_bug.cgi?id=1246366 * https://bugzilla.suse.com/show_bug.cgi?id=1246370 * https://bugzilla.suse.com/show_bug.cgi?id=1246375 * https://bugzilla.suse.com/show_bug.cgi?id=1246376 * https://bugzilla.suse.com/show_bug.cgi?id=1246385 * https://bugzilla.suse.com/show_bug.cgi?id=1246386 * https://bugzilla.suse.com/show_bug.cgi?id=1246387 * https://bugzilla.suse.com/show_bug.cgi?id=1246438 * https://bugzilla.suse.com/show_bug.cgi?id=1246443 * https://bugzilla.suse.com/show_bug.cgi?id=1246444 * https://bugzilla.suse.com/show_bug.cgi?id=1246447 * https://bugzilla.suse.com/show_bug.cgi?id=1246450 * https://bugzilla.suse.com/show_bug.cgi?id=1246453 * https://bugzilla.suse.com/show_bug.cgi?id=1246473 * https://bugzilla.suse.com/show_bug.cgi?id=1246490 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246547 * https://bugzilla.suse.com/show_bug.cgi?id=1246631 * https://bugzilla.suse.com/show_bug.cgi?id=1246651 * https://bugzilla.suse.com/show_bug.cgi?id=1246688 * https://bugzilla.suse.com/show_bug.cgi?id=1246777 * https://bugzilla.suse.com/show_bug.cgi?id=1246781 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1246868 * https://bugzilla.suse.com/show_bug.cgi?id=1246896 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1246979 * https://bugzilla.suse.com/show_bug.cgi?id=1247018 * https://bugzilla.suse.com/show_bug.cgi?id=1247020 * https://bugzilla.suse.com/show_bug.cgi?id=1247022 * https://bugzilla.suse.com/show_bug.cgi?id=1247023 * https://bugzilla.suse.com/show_bug.cgi?id=1247024 * https://bugzilla.suse.com/show_bug.cgi?id=1247027 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247031 * https://bugzilla.suse.com/show_bug.cgi?id=1247033 * https://bugzilla.suse.com/show_bug.cgi?id=1247035 * https://bugzilla.suse.com/show_bug.cgi?id=1247061 * https://bugzilla.suse.com/show_bug.cgi?id=1247062 * https://bugzilla.suse.com/show_bug.cgi?id=1247064 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247088 * https://bugzilla.suse.com/show_bug.cgi?id=1247089 * https://bugzilla.suse.com/show_bug.cgi?id=1247091 * https://bugzilla.suse.com/show_bug.cgi?id=1247097 * https://bugzilla.suse.com/show_bug.cgi?id=1247098 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247101 * https://bugzilla.suse.com/show_bug.cgi?id=1247102 * https://bugzilla.suse.com/show_bug.cgi?id=1247103 * https://bugzilla.suse.com/show_bug.cgi?id=1247104 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247113 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247123 * https://bugzilla.suse.com/show_bug.cgi?id=1247125 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247128 * https://bugzilla.suse.com/show_bug.cgi?id=1247130 * https://bugzilla.suse.com/show_bug.cgi?id=1247131 * https://bugzilla.suse.com/show_bug.cgi?id=1247132 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247138 * https://bugzilla.suse.com/show_bug.cgi?id=1247141 * https://bugzilla.suse.com/show_bug.cgi?id=1247143 * https://bugzilla.suse.com/show_bug.cgi?id=1247145 * https://bugzilla.suse.com/show_bug.cgi?id=1247146 * https://bugzilla.suse.com/show_bug.cgi?id=1247147 * https://bugzilla.suse.com/show_bug.cgi?id=1247149 * https://bugzilla.suse.com/show_bug.cgi?id=1247150 * https://bugzilla.suse.com/show_bug.cgi?id=1247151 * https://bugzilla.suse.com/show_bug.cgi?id=1247152 * https://bugzilla.suse.com/show_bug.cgi?id=1247153 * https://bugzilla.suse.com/show_bug.cgi?id=1247154 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247156 * https://bugzilla.suse.com/show_bug.cgi?id=1247157 * https://bugzilla.suse.com/show_bug.cgi?id=1247160 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247163 * https://bugzilla.suse.com/show_bug.cgi?id=1247164 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247169 * https://bugzilla.suse.com/show_bug.cgi?id=1247170 * https://bugzilla.suse.com/show_bug.cgi?id=1247171 * https://bugzilla.suse.com/show_bug.cgi?id=1247174 * https://bugzilla.suse.com/show_bug.cgi?id=1247176 * https://bugzilla.suse.com/show_bug.cgi?id=1247177 * https://bugzilla.suse.com/show_bug.cgi?id=1247178 * https://bugzilla.suse.com/show_bug.cgi?id=1247181 * https://bugzilla.suse.com/show_bug.cgi?id=1247209 * https://bugzilla.suse.com/show_bug.cgi?id=1247210 * https://bugzilla.suse.com/show_bug.cgi?id=1247220 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247227 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247231 * https://bugzilla.suse.com/show_bug.cgi?id=1247233 * https://bugzilla.suse.com/show_bug.cgi?id=1247234 * https://bugzilla.suse.com/show_bug.cgi?id=1247235 * https://bugzilla.suse.com/show_bug.cgi?id=1247236 * https://bugzilla.suse.com/show_bug.cgi?id=1247238 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247241 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247250 * https://bugzilla.suse.com/show_bug.cgi?id=1247251 * https://bugzilla.suse.com/show_bug.cgi?id=1247252 * https://bugzilla.suse.com/show_bug.cgi?id=1247253 * https://bugzilla.suse.com/show_bug.cgi?id=1247255 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247265 * https://bugzilla.suse.com/show_bug.cgi?id=1247270 * https://bugzilla.suse.com/show_bug.cgi?id=1247271 * https://bugzilla.suse.com/show_bug.cgi?id=1247273 * https://bugzilla.suse.com/show_bug.cgi?id=1247274 * https://bugzilla.suse.com/show_bug.cgi?id=1247276 * https://bugzilla.suse.com/show_bug.cgi?id=1247277 * https://bugzilla.suse.com/show_bug.cgi?id=1247278 * https://bugzilla.suse.com/show_bug.cgi?id=1247279 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247282 * https://bugzilla.suse.com/show_bug.cgi?id=1247283 * https://bugzilla.suse.com/show_bug.cgi?id=1247284 * https://bugzilla.suse.com/show_bug.cgi?id=1247285 * https://bugzilla.suse.com/show_bug.cgi?id=1247288 * https://bugzilla.suse.com/show_bug.cgi?id=1247289 * https://bugzilla.suse.com/show_bug.cgi?id=1247290 * https://bugzilla.suse.com/show_bug.cgi?id=1247293 * https://bugzilla.suse.com/show_bug.cgi?id=1247308 * https://bugzilla.suse.com/show_bug.cgi?id=1247311 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247314 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1247325 * https://bugzilla.suse.com/show_bug.cgi?id=1247347 * https://bugzilla.suse.com/show_bug.cgi?id=1247348 * https://bugzilla.suse.com/show_bug.cgi?id=1247349 * https://bugzilla.suse.com/show_bug.cgi?id=1247366 * https://bugzilla.suse.com/show_bug.cgi?id=1247372 * https://bugzilla.suse.com/show_bug.cgi?id=1247376 * https://bugzilla.suse.com/show_bug.cgi?id=1247426 * https://bugzilla.suse.com/show_bug.cgi?id=1247437 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247837 * https://bugzilla.suse.com/show_bug.cgi?id=1247838 * https://bugzilla.suse.com/show_bug.cgi?id=1247935 * https://bugzilla.suse.com/show_bug.cgi?id=1247936 * https://bugzilla.suse.com/show_bug.cgi?id=1247949 * https://bugzilla.suse.com/show_bug.cgi?id=1247950 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248190 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248224 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248230 * https://bugzilla.suse.com/show_bug.cgi?id=1248235 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248299 * https://bugzilla.suse.com/show_bug.cgi?id=1248302 * https://bugzilla.suse.com/show_bug.cgi?id=1248304 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248359 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248367 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248396 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248624 * https://bugzilla.suse.com/show_bug.cgi?id=1248627 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248635 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248662 * https://bugzilla.suse.com/show_bug.cgi?id=1248664 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248727 * https://bugzilla.suse.com/show_bug.cgi?id=1248728 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249038 * https://bugzilla.suse.com/show_bug.cgi?id=1249060 * https://bugzilla.suse.com/show_bug.cgi?id=1249061 * https://bugzilla.suse.com/show_bug.cgi?id=1249062 * https://bugzilla.suse.com/show_bug.cgi?id=1249064 * https://bugzilla.suse.com/show_bug.cgi?id=1249065 * https://bugzilla.suse.com/show_bug.cgi?id=1249066 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249160 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249167 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249182 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249269 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249286 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249297 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249301 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249309 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249313 * https://bugzilla.suse.com/show_bug.cgi?id=1249314 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249316 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249319 * https://bugzilla.suse.com/show_bug.cgi?id=1249320 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249322 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249477 * https://bugzilla.suse.com/show_bug.cgi?id=1249478 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249500 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249509 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249550 * https://bugzilla.suse.com/show_bug.cgi?id=1249552 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249562 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249587 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249618 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249904 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250087 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250119 * https://bugzilla.suse.com/show_bug.cgi?id=1250123 * https://bugzilla.suse.com/show_bug.cgi?id=1250124 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250258 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250296 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250386 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250398 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250408 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250650 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250671 * https://bugzilla.suse.com/show_bug.cgi?id=1250702 * https://bugzilla.suse.com/show_bug.cgi?id=1250711 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250716 * https://bugzilla.suse.com/show_bug.cgi?id=1250719 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250729 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250737 * https://bugzilla.suse.com/show_bug.cgi?id=1250739 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250758 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1251100 * https://bugzilla.suse.com/show_bug.cgi?id=1251114 * https://bugzilla.suse.com/show_bug.cgi?id=1251134 * https://bugzilla.suse.com/show_bug.cgi?id=1251135 * https://bugzilla.suse.com/show_bug.cgi?id=1251143 * https://bugzilla.suse.com/show_bug.cgi?id=1251146 * https://bugzilla.suse.com/show_bug.cgi?id=1251186 * https://bugzilla.suse.com/show_bug.cgi?id=1251216 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251810 * https://bugzilla.suse.com/show_bug.cgi?id=1252084 * https://jira.suse.com/browse/PED-10909 * https://jira.suse.com/browse/PED-12405 * https://jira.suse.com/browse/PED-12745 * https://jira.suse.com/browse/PED-12882 * https://jira.suse.com/browse/PED-13113 * https://jira.suse.com/browse/PED-13256 * https://jira.suse.com/browse/PED-13302 * https://jira.suse.com/browse/PED-13331 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 * https://jira.suse.com/browse/PED-13631 * https://jira.suse.com/browse/PED-13704 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-13762 * https://jira.suse.com/browse/PED-13815 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7249 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Nov 12 20:48:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 12 Nov 2025 20:48:18 -0000 Subject: SUSE-SU-2025:20994-1: important: Security update for the Linux Kernel Message-ID: <176298049891.20308.12159088452235161588@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:20994-1 Release Date: 2025-11-06T17:15:12Z Rating: important References: * bsc#1215199 * bsc#1218644 * bsc#1230062 * bsc#1234634 * bsc#1234693 * bsc#1234863 * bsc#1235953 * bsc#1236897 * bsc#1237108 * bsc#1237131 * bsc#1237542 * bsc#1237776 * bsc#1238972 * bsc#1239206 * bsc#1240324 * bsc#1240696 * bsc#1240966 * bsc#1240998 * bsc#1241166 * bsc#1241353 * bsc#1241403 * bsc#1241435 * bsc#1242034 * bsc#1242086 * bsc#1242414 * bsc#1242782 * bsc#1242864 * bsc#1242965 * bsc#1242995 * bsc#1243000 * bsc#1243055 * bsc#1243068 * bsc#1243100 * bsc#1243112 * bsc#1243774 * bsc#1244309 * bsc#1244723 * bsc#1244734 * bsc#1244749 * bsc#1244792 * bsc#1244812 * bsc#1244930 * bsc#1244939 * bsc#1245000 * bsc#1245151 * bsc#1245193 * bsc#1245206 * bsc#1245216 * bsc#1245260 * bsc#1245410 * bsc#1245457 * bsc#1245504 * bsc#1245506 * bsc#1245508 * bsc#1245510 * bsc#1245596 * bsc#1245621 * bsc#1245630 * bsc#1245654 * bsc#1245657 * bsc#1245658 * bsc#1245659 * bsc#1245663 * bsc#1245664 * bsc#1245665 * bsc#1245666 * bsc#1245668 * bsc#1245669 * bsc#1245670 * bsc#1245671 * bsc#1245675 * bsc#1245676 * bsc#1245678 * bsc#1245683 * bsc#1245684 * bsc#1245686 * bsc#1245688 * bsc#1245690 * bsc#1245691 * bsc#1245695 * bsc#1245700 * bsc#1245703 * bsc#1245705 * bsc#1245710 * bsc#1245711 * bsc#1245713 * bsc#1245714 * bsc#1245715 * bsc#1245717 * bsc#1245719 * bsc#1245721 * bsc#1245723 * bsc#1245726 * bsc#1245728 * bsc#1245729 * bsc#1245730 * bsc#1245731 * bsc#1245735 * bsc#1245737 * bsc#1245744 * bsc#1245745 * bsc#1245746 * bsc#1245747 * bsc#1245748 * bsc#1245749 * bsc#1245751 * bsc#1245757 * bsc#1245763 * bsc#1245765 * bsc#1245767 * bsc#1245769 * bsc#1245777 * bsc#1245780 * bsc#1245781 * bsc#1245784 * bsc#1245785 * bsc#1245787 * bsc#1245812 * bsc#1245814 * bsc#1245815 * bsc#1245937 * bsc#1245945 * bsc#1245952 * bsc#1245955 * bsc#1245956 * bsc#1245963 * bsc#1245966 * bsc#1245970 * bsc#1245973 * bsc#1245976 * bsc#1245977 * bsc#1245986 * bsc#1246000 * bsc#1246002 * bsc#1246005 * bsc#1246008 * bsc#1246012 * bsc#1246022 * bsc#1246023 * bsc#1246031 * bsc#1246034 * bsc#1246037 * bsc#1246041 * bsc#1246042 * bsc#1246047 * bsc#1246049 * bsc#1246050 * bsc#1246053 * bsc#1246054 * bsc#1246055 * bsc#1246057 * bsc#1246098 * bsc#1246109 * bsc#1246125 * bsc#1246166 * bsc#1246171 * bsc#1246176 * bsc#1246181 * bsc#1246183 * bsc#1246185 * bsc#1246186 * bsc#1246188 * bsc#1246190 * bsc#1246192 * bsc#1246193 * bsc#1246195 * bsc#1246220 * bsc#1246234 * bsc#1246236 * bsc#1246240 * bsc#1246243 * bsc#1246244 * bsc#1246245 * bsc#1246246 * bsc#1246248 * bsc#1246250 * bsc#1246252 * bsc#1246253 * bsc#1246255 * bsc#1246258 * bsc#1246259 * bsc#1246260 * bsc#1246262 * bsc#1246266 * bsc#1246268 * bsc#1246283 * bsc#1246285 * bsc#1246286 * bsc#1246287 * bsc#1246290 * bsc#1246292 * bsc#1246293 * bsc#1246295 * bsc#1246297 * bsc#1246333 * bsc#1246334 * bsc#1246337 * bsc#1246342 * bsc#1246349 * bsc#1246351 * bsc#1246353 * bsc#1246354 * bsc#1246358 * bsc#1246364 * bsc#1246366 * bsc#1246370 * bsc#1246375 * bsc#1246376 * bsc#1246385 * bsc#1246386 * bsc#1246387 * bsc#1246438 * bsc#1246443 * bsc#1246444 * bsc#1246447 * bsc#1246450 * bsc#1246453 * bsc#1246473 * bsc#1246490 * bsc#1246509 * bsc#1246547 * bsc#1246631 * bsc#1246651 * bsc#1246688 * bsc#1246777 * bsc#1246781 * bsc#1246782 * bsc#1246868 * bsc#1246896 * bsc#1246911 * bsc#1246979 * bsc#1247018 * bsc#1247020 * bsc#1247022 * bsc#1247023 * bsc#1247024 * bsc#1247027 * bsc#1247028 * bsc#1247031 * bsc#1247033 * bsc#1247035 * bsc#1247061 * bsc#1247062 * bsc#1247064 * bsc#1247076 * bsc#1247078 * bsc#1247079 * bsc#1247088 * bsc#1247089 * bsc#1247091 * bsc#1247097 * bsc#1247098 * bsc#1247099 * bsc#1247101 * bsc#1247102 * bsc#1247103 * bsc#1247104 * bsc#1247112 * bsc#1247113 * bsc#1247116 * bsc#1247118 * bsc#1247119 * bsc#1247123 * bsc#1247125 * bsc#1247126 * bsc#1247128 * bsc#1247130 * bsc#1247131 * bsc#1247132 * bsc#1247136 * bsc#1247137 * bsc#1247138 * bsc#1247141 * bsc#1247143 * bsc#1247145 * bsc#1247146 * bsc#1247147 * bsc#1247149 * bsc#1247150 * bsc#1247151 * bsc#1247152 * bsc#1247153 * bsc#1247154 * bsc#1247155 * bsc#1247156 * bsc#1247157 * bsc#1247160 * bsc#1247162 * bsc#1247163 * bsc#1247164 * bsc#1247167 * bsc#1247169 * bsc#1247170 * bsc#1247171 * bsc#1247174 * bsc#1247176 * bsc#1247177 * bsc#1247178 * bsc#1247181 * bsc#1247209 * bsc#1247210 * bsc#1247220 * bsc#1247223 * bsc#1247227 * bsc#1247229 * bsc#1247231 * bsc#1247233 * bsc#1247234 * bsc#1247235 * bsc#1247236 * bsc#1247238 * bsc#1247239 * bsc#1247241 * bsc#1247243 * bsc#1247250 * bsc#1247251 * bsc#1247252 * bsc#1247253 * bsc#1247255 * bsc#1247262 * bsc#1247265 * bsc#1247270 * bsc#1247271 * bsc#1247273 * bsc#1247274 * bsc#1247276 * bsc#1247277 * bsc#1247278 * bsc#1247279 * bsc#1247280 * bsc#1247282 * bsc#1247283 * bsc#1247284 * bsc#1247285 * bsc#1247288 * bsc#1247289 * bsc#1247290 * bsc#1247293 * bsc#1247308 * bsc#1247311 * bsc#1247313 * bsc#1247314 * bsc#1247317 * bsc#1247325 * bsc#1247347 * bsc#1247348 * bsc#1247349 * bsc#1247366 * bsc#1247372 * bsc#1247376 * bsc#1247426 * bsc#1247437 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247712 * bsc#1247837 * bsc#1247838 * bsc#1247935 * bsc#1247936 * bsc#1247949 * bsc#1247950 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248111 * bsc#1248121 * bsc#1248183 * bsc#1248186 * bsc#1248190 * bsc#1248192 * bsc#1248194 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248211 * bsc#1248223 * bsc#1248224 * bsc#1248225 * bsc#1248230 * bsc#1248235 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248299 * bsc#1248302 * bsc#1248304 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248359 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248367 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248396 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248616 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248624 * bsc#1248627 * bsc#1248628 * bsc#1248634 * bsc#1248635 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248662 * bsc#1248664 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248727 * bsc#1248728 * bsc#1248748 * bsc#1248754 * bsc#1248775 * bsc#1249022 * bsc#1249038 * bsc#1249060 * bsc#1249061 * bsc#1249062 * bsc#1249064 * bsc#1249065 * bsc#1249066 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249160 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249167 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249182 * bsc#1249186 * bsc#1249190 * bsc#1249193 * bsc#1249195 * bsc#1249199 * bsc#1249201 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249258 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249269 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249274 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249286 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249297 * bsc#1249299 * bsc#1249300 * bsc#1249301 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249306 * bsc#1249308 * bsc#1249309 * bsc#1249312 * bsc#1249313 * bsc#1249314 * bsc#1249315 * bsc#1249316 * bsc#1249318 * bsc#1249319 * bsc#1249320 * bsc#1249321 * bsc#1249322 * bsc#1249323 * bsc#1249324 * bsc#1249333 * bsc#1249334 * bsc#1249338 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249477 * bsc#1249478 * bsc#1249479 * bsc#1249486 * bsc#1249490 * bsc#1249494 * bsc#1249500 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249509 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249547 * bsc#1249548 * bsc#1249550 * bsc#1249552 * bsc#1249554 * bsc#1249562 * bsc#1249566 * bsc#1249587 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249618 * bsc#1249774 * bsc#1249833 * bsc#1249887 * bsc#1249888 * bsc#1249901 * bsc#1249904 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1249975 * bsc#1250002 * bsc#1250007 * bsc#1250021 * bsc#1250025 * bsc#1250028 * bsc#1250032 * bsc#1250087 * bsc#1250088 * bsc#1250119 * bsc#1250123 * bsc#1250124 * bsc#1250177 * bsc#1250179 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250237 * bsc#1250242 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250258 * bsc#1250262 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250296 * bsc#1250297 * bsc#1250298 * bsc#1250334 * bsc#1250344 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250386 * bsc#1250389 * bsc#1250398 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250408 * bsc#1250450 * bsc#1250491 * bsc#1250519 * bsc#1250522 * bsc#1250650 * bsc#1250655 * bsc#1250671 * bsc#1250702 * bsc#1250711 * bsc#1250712 * bsc#1250713 * bsc#1250716 * bsc#1250719 * bsc#1250722 * bsc#1250729 * bsc#1250736 * bsc#1250737 * bsc#1250739 * bsc#1250741 * bsc#1250742 * bsc#1250758 * bsc#1250952 * bsc#1251100 * bsc#1251114 * bsc#1251134 * bsc#1251135 * bsc#1251143 * bsc#1251146 * bsc#1251186 * bsc#1251216 * bsc#1251230 * bsc#1251810 * bsc#1252084 * jsc#PED-10909 * jsc#PED-12405 * jsc#PED-12745 * jsc#PED-12882 * jsc#PED-13113 * jsc#PED-13256 * jsc#PED-13302 * jsc#PED-13331 * jsc#PED-13343 * jsc#PED-13345 * jsc#PED-13631 * jsc#PED-13704 * jsc#PED-13728 * jsc#PED-13762 * jsc#PED-13815 * jsc#PED-348 * jsc#PED-7249 Cross-References: * CVE-2024-53164 * CVE-2024-57891 * CVE-2024-57951 * CVE-2024-57952 * CVE-2024-58090 * CVE-2025-22034 * CVE-2025-22077 * CVE-2025-23141 * CVE-2025-37798 * CVE-2025-37821 * CVE-2025-37849 * CVE-2025-37856 * CVE-2025-37861 * CVE-2025-37864 * CVE-2025-38006 * CVE-2025-38008 * CVE-2025-38019 * CVE-2025-38034 * CVE-2025-38038 * CVE-2025-38052 * CVE-2025-38058 * CVE-2025-38062 * CVE-2025-38075 * CVE-2025-38087 * CVE-2025-38088 * CVE-2025-38089 * CVE-2025-38090 * CVE-2025-38091 * CVE-2025-38095 * CVE-2025-38096 * CVE-2025-38098 * CVE-2025-38099 * CVE-2025-38101 * CVE-2025-38102 * CVE-2025-38103 * CVE-2025-38106 * CVE-2025-38107 * CVE-2025-38108 * CVE-2025-38109 * CVE-2025-38110 * CVE-2025-38111 * CVE-2025-38112 * CVE-2025-38113 * CVE-2025-38114 * CVE-2025-38117 * CVE-2025-38118 * CVE-2025-38119 * CVE-2025-38120 * CVE-2025-38122 * CVE-2025-38123 * CVE-2025-38124 * CVE-2025-38125 * CVE-2025-38127 * CVE-2025-38128 * CVE-2025-38129 * CVE-2025-38134 * CVE-2025-38135 * CVE-2025-38136 * CVE-2025-38137 * CVE-2025-38138 * CVE-2025-38140 * CVE-2025-38141 * CVE-2025-38142 * CVE-2025-38143 * CVE-2025-38145 * CVE-2025-38146 * CVE-2025-38148 * CVE-2025-38149 * CVE-2025-38151 * CVE-2025-38153 * CVE-2025-38154 * CVE-2025-38155 * CVE-2025-38156 * CVE-2025-38157 * CVE-2025-38159 * CVE-2025-38160 * CVE-2025-38161 * CVE-2025-38165 * CVE-2025-38168 * CVE-2025-38169 * CVE-2025-38170 * CVE-2025-38172 * CVE-2025-38173 * CVE-2025-38174 * CVE-2025-38177 * CVE-2025-38180 * CVE-2025-38181 * CVE-2025-38182 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38186 * CVE-2025-38188 * CVE-2025-38189 * CVE-2025-38190 * CVE-2025-38193 * CVE-2025-38197 * CVE-2025-38198 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38209 * CVE-2025-38211 * CVE-2025-38213 * CVE-2025-38214 * CVE-2025-38215 * CVE-2025-38216 * CVE-2025-38217 * CVE-2025-38220 * CVE-2025-38222 * CVE-2025-38224 * CVE-2025-38225 * CVE-2025-38226 * CVE-2025-38227 * CVE-2025-38228 * CVE-2025-38229 * CVE-2025-38231 * CVE-2025-38232 * CVE-2025-38233 * CVE-2025-38234 * CVE-2025-38242 * CVE-2025-38244 * CVE-2025-38245 * CVE-2025-38246 * CVE-2025-38249 * CVE-2025-38251 * CVE-2025-38253 * CVE-2025-38255 * CVE-2025-38256 * CVE-2025-38257 * CVE-2025-38258 * CVE-2025-38259 * CVE-2025-38263 * CVE-2025-38265 * CVE-2025-38267 * CVE-2025-38268 * CVE-2025-38270 * CVE-2025-38272 * CVE-2025-38273 * CVE-2025-38274 * CVE-2025-38275 * CVE-2025-38277 * CVE-2025-38278 * CVE-2025-38286 * CVE-2025-38287 * CVE-2025-38288 * CVE-2025-38289 * CVE-2025-38290 * CVE-2025-38291 * CVE-2025-38292 * CVE-2025-38293 * CVE-2025-38299 * CVE-2025-38300 * CVE-2025-38301 * CVE-2025-38302 * CVE-2025-38303 * CVE-2025-38304 * CVE-2025-38305 * CVE-2025-38306 * CVE-2025-38307 * CVE-2025-38311 * CVE-2025-38312 * CVE-2025-38313 * CVE-2025-38315 * CVE-2025-38317 * CVE-2025-38318 * CVE-2025-38319 * CVE-2025-38322 * CVE-2025-38323 * CVE-2025-38326 * CVE-2025-38332 * CVE-2025-38335 * CVE-2025-38336 * CVE-2025-38337 * CVE-2025-38338 * CVE-2025-38339 * CVE-2025-38341 * CVE-2025-38342 * CVE-2025-38343 * CVE-2025-38344 * CVE-2025-38345 * CVE-2025-38348 * CVE-2025-38349 * CVE-2025-38350 * CVE-2025-38351 * CVE-2025-38352 * CVE-2025-38353 * CVE-2025-38354 * CVE-2025-38355 * CVE-2025-38356 * CVE-2025-38359 * CVE-2025-38360 * CVE-2025-38361 * CVE-2025-38362 * CVE-2025-38363 * CVE-2025-38364 * CVE-2025-38365 * CVE-2025-38368 * CVE-2025-38369 * CVE-2025-38371 * CVE-2025-38372 * CVE-2025-38373 * CVE-2025-38374 * CVE-2025-38375 * CVE-2025-38376 * CVE-2025-38377 * CVE-2025-38380 * CVE-2025-38381 * CVE-2025-38382 * CVE-2025-38383 * CVE-2025-38384 * CVE-2025-38385 * CVE-2025-38386 * CVE-2025-38387 * CVE-2025-38389 * CVE-2025-38390 * CVE-2025-38391 * CVE-2025-38392 * CVE-2025-38393 * CVE-2025-38395 * CVE-2025-38396 * CVE-2025-38397 * CVE-2025-38399 * CVE-2025-38400 * CVE-2025-38401 * CVE-2025-38402 * CVE-2025-38403 * CVE-2025-38404 * CVE-2025-38405 * CVE-2025-38406 * CVE-2025-38408 * CVE-2025-38409 * CVE-2025-38410 * CVE-2025-38412 * CVE-2025-38413 * CVE-2025-38414 * CVE-2025-38415 * CVE-2025-38416 * CVE-2025-38417 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38420 * CVE-2025-38421 * CVE-2025-38424 * CVE-2025-38425 * CVE-2025-38426 * CVE-2025-38427 * CVE-2025-38428 * CVE-2025-38429 * CVE-2025-38430 * CVE-2025-38436 * CVE-2025-38438 * CVE-2025-38439 * CVE-2025-38440 * CVE-2025-38441 * CVE-2025-38443 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38446 * CVE-2025-38448 * CVE-2025-38449 * CVE-2025-38450 * CVE-2025-38451 * CVE-2025-38453 * CVE-2025-38454 * CVE-2025-38455 * CVE-2025-38456 * CVE-2025-38457 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38460 * CVE-2025-38461 * CVE-2025-38462 * CVE-2025-38463 * CVE-2025-38464 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38467 * CVE-2025-38468 * CVE-2025-38470 * CVE-2025-38472 * CVE-2025-38473 * CVE-2025-38474 * CVE-2025-38475 * CVE-2025-38476 * CVE-2025-38477 * CVE-2025-38478 * CVE-2025-38480 * CVE-2025-38481 * CVE-2025-38482 * CVE-2025-38483 * CVE-2025-38484 * CVE-2025-38485 * CVE-2025-38487 * CVE-2025-38488 * CVE-2025-38489 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38493 * CVE-2025-38494 * CVE-2025-38495 * CVE-2025-38496 * CVE-2025-38497 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38508 * CVE-2025-38514 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38539 * CVE-2025-38544 * CVE-2025-38545 * CVE-2025-38546 * CVE-2025-38549 * CVE-2025-38552 * CVE-2025-38553 * CVE-2025-38554 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38557 * CVE-2025-38559 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38564 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38573 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38586 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38619 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38628 * CVE-2025-38630 * CVE-2025-38631 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38646 * CVE-2025-38648 * CVE-2025-38656 * CVE-2025-38658 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38662 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38686 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38700 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38717 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38733 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39673 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39683 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39687 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39695 * CVE-2025-39697 * CVE-2025-39698 * CVE-2025-39700 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39707 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39711 * CVE-2025-39712 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39722 * CVE-2025-39723 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39727 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39748 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39765 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39775 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39788 * CVE-2025-39790 * CVE-2025-39791 * CVE-2025-39792 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39807 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39811 * CVE-2025-39813 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39830 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39836 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39841 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39851 * CVE-2025-39852 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39875 * CVE-2025-39877 * CVE-2025-39882 * CVE-2025-39884 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39890 * CVE-2025-39891 * CVE-2025-39896 * CVE-2025-39898 * CVE-2025-39899 * CVE-2025-39900 * CVE-2025-39902 * CVE-2025-39907 * CVE-2025-39909 * CVE-2025-39916 * CVE-2025-39918 * CVE-2025-39922 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-39926 * CVE-2025-39931 * CVE-2025-39934 * CVE-2025-39937 * CVE-2025-39938 * CVE-2025-39945 * CVE-2025-39946 * CVE-2025-39952 * CVE-2025-39957 * CVE-2025-40300 * CVE-2026-38264 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57952 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37856 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38019 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38019 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38034 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38038 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38058 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38062 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38088 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38088 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38090 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38098 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38099 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38101 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38102 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38106 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38106 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38107 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38108 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38109 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38110 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38117 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38118 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38120 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-38122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38128 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38128 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38137 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38137 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38140 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38143 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38148 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38149 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38153 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38157 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38159 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38168 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38168 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38169 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38170 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38172 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38172 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38173 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38174 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38181 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38193 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38197 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38209 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38209 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38211 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38213 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38214 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38217 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38220 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38222 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38224 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38226 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38227 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38228 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38228 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38229 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38231 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38232 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38242 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38244 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38249 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38253 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38256 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38258 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38259 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38267 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38267 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38270 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38270 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38272 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38273 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38274 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38275 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38277 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38286 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38289 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38291 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38291 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38292 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38293 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38300 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38302 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38306 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38311 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38315 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38315 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38317 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38317 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38318 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38318 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38322 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38323 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38339 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38339 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38341 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38344 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38345 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38349 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38350 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38355 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38356 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38356 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38362 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38363 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38364 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38365 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38371 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38372 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38372 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38373 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38375 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38377 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38382 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38384 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38385 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38387 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38389 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38391 ( SUSE ): 5.2 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38393 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38395 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38396 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38397 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38399 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38400 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38401 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38403 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38404 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38409 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38410 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38412 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38415 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38416 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38417 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38417 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38420 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38421 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38421 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38424 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38425 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38426 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38428 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38429 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38440 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38443 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38446 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38446 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38448 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38449 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38449 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38450 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38454 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38455 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38460 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38461 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38462 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38467 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38468 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38470 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38473 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38474 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38475 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38475 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38478 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38481 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38482 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38483 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38485 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38489 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38494 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38495 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38496 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38508 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38549 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38549 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38554 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38554 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38564 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38564 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38573 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38586 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38619 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38619 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38648 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38648 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38658 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38662 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38662 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39698 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-39700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39791 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39792 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39792 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39896 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39918 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-39918 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39926 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39926 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves 573 vulnerabilities, contains 17 features and has 96 fixes can now be installed. ## Description: The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953). * CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108). * CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435). * CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403). * CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782). * CVE-2025-37821: sched/eevdf: Fix se->slice being set to U64_MAX and resulting (bsc#1242864). * CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000). * CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068). * CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055). * CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939). * CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000). * CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792). * CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812). * CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151). * CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664). * CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763). * CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970). * CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963). * CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966). * CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976). * CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176). * CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188). * CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path on write (bsc#1246185). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245). * CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252). * CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268). * CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351). * CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366). * CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376). * CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444). * CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447). * CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473). * CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253). * CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260). * CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777). * CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023). * CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024). * CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031). * CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250). * CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169). * CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156). * CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143). * CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283). * CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235). * CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped (bsc#1248299). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374). * CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160). * CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324). * CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550). * CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032). * CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205). * CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292). * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276). * CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296). * CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258). * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275). * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742). * CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758). * CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702). * CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722). * CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). * CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387). The following non-security bugs were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI/processor_idle: Add FFH state handling (jsc#PED-13815). * ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815). * ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: LPSS: Remove AudioDSP related ID (git-fixes). * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git- fixes). * ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes). * ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes). * ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: battery: Add synchronization between interface updates (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes). * ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes). * ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable- fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: timer: fix ida_free call while not allocated (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes). * ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git- fixes). * ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes). * ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes). * ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes). * ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git- fixes). * ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes). * ASoC: amd: acp: Adjust pdm gain value (stable-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes). * ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes). * ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes). * ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git- fixes). * ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: qcom: use drvdata instead of component to keep id (stable-fixes). * ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes). * ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: ISO: free rx_skb if not consumed (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git- fixes). * Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable- fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git- fixes). * Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes). * Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git- fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Disable CET before shutdown by tboot (bsc#1247950). * Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes). * Documentation/x86: Document new attack vector controls (git-fixes). * Documentation: ACPI: Fix parent device references (git-fixes). * Documentation: KVM: Fix unexpected unindent warning (git-fixes). * Documentation: KVM: Fix unexpected unindent warnings (git-fixes). * Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes). * Drop ath12k patch that was reverted in the upstream (git-fixes) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone using CMA or investigating CMA issues, with a small and simple code base and no runtime overhead. * Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325) * Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256). * Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself. * Fix dma_unmap_sg() nents value (git-fixes) * HID: amd_sfh: Add sync across amd sfh work functions (git-fixes). * HID: apple: avoid setting up battery timer for devices without battery (git- fixes). * HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes). * HID: asus: add support for missing PX series fn keys (stable-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: core: do not bypass hid_hw_raw_request (stable-fixes). * HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: hidraw: tighten ioctl command parsing (git-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes). * HID: magicmouse: avoid setting up battery timer when not needed (git-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * Input: psxpad-spi - add a check for the return value of spi_setup() (git- fixes). * Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes). * KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * KVM: Allow CPU to reschedule while setting per-page memory attributes (git- fixes). * KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes). * KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes). * KVM: Conditionally reschedule when resetting the dirty ring (git-fixes). * KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes). * KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302). * KVM: TDX: Do not report base TDVMCALLs (git-fixes). * KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302). * KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302). * KVM: TDX: Handle TDG.VP.VMCALL<GetQuote> (jsc#PED-13302). * KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302). * KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302). * KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes). * KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes). * KVM: arm64: Fix error path in init_hyp_mode() (git-fixes). * KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move upstreamed SPI patch into sorted section * NFS: Fix a race when updating an existing write (git-fixes). * NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes). * NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes). * NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git- fixes). * NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes). * NFS: nfs_invalidate_folio() must observe the offset and size arguments (git- fixes). * NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes). * NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes). * NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git- fixes). * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes). * NFSv4.2: another fix for listxattr (git-fixes). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git- fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * Octeontx2-af: Skip overlap check for SPI field (git-fixes). * PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/AER: Fix missing uevent on recovery when a reset is requested (git- fixes). * PCI/ERR: Fix uevent on failure to recover (git-fixes). * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git- fixes). * PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI/pwrctrl: Fix device leak at registration (git-fixes). * PCI/sysfs: Ensure devices are powered for config reads (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes). * PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git- fixes). * PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes). * PCI: endpoint: Fix configfs group list head handling (git-fixes). * PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes). * PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes). * PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes). * PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes). * PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: j721e: Fix programming sequence of "strap" settings (git-fixes). * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes). * PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes). * PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes). * PCI: rcar-gen4: Fix PHY initialization (git-fixes). * PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git- fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: rcar-host: Drop PMSR spinlock (git-fixes). * PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes). * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes). * PCI: tegra194: Handle errors in BPMP response (git-fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation (git-fixes). * PCI: xilinx-nwl: Fix ECAM programming (git-fixes). * PM / devfreq: Check governor before using governor->name (git-fixes). * PM / devfreq: Fix a index typo in trans_stat (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes). * PM: EM: use kfree_rcu() to simplify the code (stable-fixes). * PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes). * PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112). * PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112). * PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112). * PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes) * RDMA/core: Rate limit GID cache warning messages (git-fixes) * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Drop GFP_NOWARN (git-fixes) * RDMA/hns: Fix -Wframe-larger-than issue (git-fixes) * RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes) * RDMA/hns: Fix accessing uninitialized resources (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/hns: Fix double destruction of rsv_qp (git-fixes) * RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes) * RDMA/hns: Get message length of ack_req from FW (git-fixes) * RDMA/mana_ib: Add device statistics support (bsc#1246651). * RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135). * RDMA/mana_ib: Extend modify QP (bsc#1251135). * RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes). * RDMA/mana_ib: add additional port counters (git-fixes). * RDMA/mana_ib: add support of multiple ports (git-fixes). * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes) * RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes) * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes) * RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes) * RDMA/rxe: Fix race in do_task() when draining (git-fixes) * RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes) * RDMA/siw: Always report immediate post SQ errors (git-fixes) * RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes) * RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git- fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * README.BRANCH: mfranc at suse.cz leaving SUSE * RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348). * Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815). * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "drm/nouveau: check ioctl command codes better" (git-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes). * Revert "mac80211: Dynamically set CoDel parameters per station" (stable- fixes). * Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes). * Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes). * Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git- fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes). * USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes). * USB: serial: option: add Foxconn T99W640 (stable-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add SIMCom 8230C compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable- fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps. * Update config files: revive pwc driver for Leap (bsc#1249060) * accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes). * accel/ivpu: Correct DCT interrupt handling (git-fixes). * accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes). * accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes). * accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes). * amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable- fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes) * arm64/mm: Close theoretical race where stale TLB entry remains valid (git- fixes) * arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes) * arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: config: Make tpm_tis_spi module build-in (bsc#1246896) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: add big-endian property back into watchdog node (git-fixes) * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes) * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git- fixes) * arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes) * arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes) * arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git- fixes) * arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes) * arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git- fixes) * arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git- fixes) * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git- fixes). * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git- fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git- fixes) * arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git- fixes) * arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git- fixes) * arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git- fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes) * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: dts: st: fix timer used for ticks (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: map [_text, _stext) virtual address range (git-fixes) * arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes) * arm64: poe: Handle spurious Overlay faults (git-fixes) * arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes) * arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes) * arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: ahci: Disable DIPM if host lacks support (stable-fixes). * ata: ahci: Disallow LPM policy control if not supported (stable-fixes). * ata: libata-sata: Add link_power_management_supported sysfs attribute (git- fixes). * ata: libata-sata: Disallow changing LPM state if not supported (stable- fixes). * ata: libata-scsi: Fix CDL control (git-fixes). * audit,module: restore audit logging in load failure case (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * benet: fix BUG when creating VFs (git-fixes). * block: Introduce bio_needs_zone_write_plugging() (git-fixes). * block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552). * block: ensure discard_granularity is zero when discard is not supported (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * block: sanitize chunk_sectors for atomic write limits (git-fixes). * bnxt_en: Add a helper function to configure MRU and RSS (git-fixes). * bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes). * bnxt_en: Fix DCB ETS validation (git-fixes). * bnxt_en: Fix memory corruption when FW resources change during ifdown (git- fixes). * bnxt_en: Fix stats context reservation logic (git-fixes). * bnxt_en: Flush FW trace before copying to the coredump (git-fixes). * bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git- fixes). * bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes). * bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git- fixes) * bpf, arm64: Fix fp initialization for exception boundary (git-fixes) * bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes). * bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git- fixes). * bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes). * bpf: Check link_create.flags parameter for multi_kprobe (git-fixes). * bpf: Check link_create.flags parameter for multi_uprobe (git-fixes). * bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes). * bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes). * bpf: Forget ranges when refining tnum after JSET (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes). * bpf: Reject %p% format string in bprintf-like helpers (git-fixes). * bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes). * bpf: Reject narrower access to pointer ctx fields (git-fixes). * bpf: Return prog btf_id without capable check (git-fixes). * bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes). * bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git- fixes). * bpf: fix possible endless loop in BPF map iteration (git-fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes). * btrfs: add debug build only WARN (bsc#1249038). * btrfs: add function comment for check_committed_ref() (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes). * btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes). * btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes). * btrfs: codify pattern for adding block_group to bg_list (git-fixes). * btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * btrfs: do not ignore inode missing when replaying log tree (git-fixes). * btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes). * btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949). * btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes). * btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes). * btrfs: enhance ASSERT() to take optional format string (bsc#1249038). * btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes). * btrfs: exit after state split error at set_extent_bit() (git-fixes). * btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068) * btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949). * btrfs: fix assertion when building free space tree (git-fixes). * btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix incorrect log message for nobarrier mount option (git-fixes). * btrfs: fix inode lookup error handling during log replay (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix invalid inode pointer after failure to create reloc inode (git- fixes). * btrfs: fix invalid inode pointer dereferences during log replay (git-fixes). * btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes). * btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes). * btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes). * btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes). * btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git- fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix squota compressed stats leak (git-fixes). * btrfs: fix ssd_spread overallocation (git-fixes). * btrfs: fix subvolume deletion lockup caused by inodes xarray race (git- fixes). * btrfs: fix the inode leak in btrfs_iget() (git-fixes). * btrfs: fix two misuses of folio_shift() (git-fixes). * btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git- fixes). * btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038). * btrfs: initialize inode::file_extent_tree after i_mode has been set (git- fixes). * btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068) * btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes). * btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes). * btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes). * btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes). * btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git- fixes). * btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes). * btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes). * btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949). * btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes). * btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes). * btrfs: props: switch prop_handler::extract to struct btrfs_inode (git- fixes). * btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes). * btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: qgroup: remove no longer used fs_info->qgroup_ulist (git-fixes). * btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes). * btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes). * btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git- fixes). * btrfs: remove no longer needed strict argument from can_nocow_extent() (git- fixes). * btrfs: remove redundant path release when replaying a log tree (git-fixes). * btrfs: remove the snapshot check from check_committed_ref() (git-fixes). * btrfs: restore mount option info messages during mount (git-fixes). * btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes). * btrfs: return a btrfs_inode from read_one_inode() (git-fixes). * btrfs: return any hit error from extent_writepage_io() (git-fixes). * btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes). * btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes). * btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949). * btrfs: simplify error detection flow during log replay (git-fixes). * btrfs: simplify return logic at check_committed_ref() (git-fixes). * btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes). * btrfs: tests: fix chunk map leak after failure to add it to the tree (git- fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: unfold transaction aborts when replaying log trees (git-fixes). * btrfs: unify ordering of btrfs_key initializations (git-fixes). * btrfs: update superblock's device bytes_used when dropping chunk (git- fixes). * btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949). * btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes). * btrfs: use filemap_get_folio() helper (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git- fixes). * btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes). * btrfs: use verbose ASSERT() in volumes.c (bsc#1249038). * build_bug.h: Add KABI assert (bsc#1249186). * bus: firewall: Fix missing static inline annotations for stubs (git-fixes). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes). * bus: mhi: ep: Fix chained transfer handling in read path (git-fixes). * bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git- fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: kvaser_pciefd: Store device channel index (git-fixes). * can: kvaser_usb: Assign netdev.dev_port based on device channel index (git- fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes). * can: peak_usb: fix USB FD devices potential malfunction (git-fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: rcar_canfd: Fix controller mode setting (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc-acm: fix race between initial clearing halt and open (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405). * cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * clk: at91: peripheral: fix return value (git-fixes). * clk: at91: sam9x7: update pll clk ranges (git-fixes). * clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes). * clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes). * clk: imx95-blk-ctl: Fix synchronous abort (git-fixes). * clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes). * clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git- fixes). * clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes). * clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git- fixes). * clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git- fixes). * clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git- fixes). * clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes). * clk: samsung: exynos850: fix a comment (git-fixes). * clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes). * clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git- fixes). * clk: sunxi-ng: v3s: Fix de clock definition (git-fixes). * clk: tegra: do not overallocate memory for bpmp clocks (git-fixes). * clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes). * clk: xilinx: vcu: unregister pll_post only if registered correctly (git- fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * config.sh: SLFO 1.2 branched in IBS * config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206) * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cpu: Define attack vectors (git-fixes). * cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git- fixes). * cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes). * cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes) * cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes) * cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes). * cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable- fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes). * cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes). * cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes). * cpufreq: armada-8k: make both cpu masks static (git-fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: mediatek: fix device leak on probe failure (git-fixes). * cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git- fixes). * cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable- fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: sun50i: prevent out-of-bounds access (git-fixes). * cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes). * crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes). * crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes). * crypto: ccp - Fix locking on alloc failure handling (git-fixes). * crypto: essiv - Check ssize for decryption and in-place encryption (git- fixes). * crypto: hisilicon - re-enable address prefetch after device resuming (git- fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes). * crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes). * crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes). * crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes). * crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes). * crypto: octeontx2 - Fix address alignment issue on ucode loading (stable- fixes). * crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes). * crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable- fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes). * crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes). * crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes). * crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes). * crypto: qat - fix state restore for banks with exceptions (git-fixes). * crypto: qat - flush misc workqueue during device shutdown (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * crypto: qat - use unmanaged allocation for dc_data (git-fixes). * crypto: rng - Ensure set_ent is always present (git-fixes). * crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes). * crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes). * devlink: Add support for u64 parameters (jsc#PED-13331). * devlink: avoid param type value translations (jsc#PED-13331). * devlink: define enum for attr types of dynamic attributes (jsc#PED-13331). * devlink: introduce devlink_nl_put_u64() (jsc#PED-13331). * devlink: let driver opt out of automatic phys_port_name generation (git- fixes). * dm-mpath: do not print the "loaded" message if registering fails (git- fixes). * dm-stripe: limit chunk_sectors to the stripe size (git-fixes). * dm-table: fix checking for rq stackable devices (git-fixes). * dm: Check for forbidden splitting of zone write operations (git-fixes). * dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes). * dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes). * dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git- fixes). * dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes). * dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * dpll: Add basic Microchip ZL3073x support (jsc#PED-13331). * dpll: Make ZL3073X invisible (jsc#PED-13331). * dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331). * dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331). * dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331). * dpll: zl3073x: Fix build failure (jsc#PED-13331). * dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331). * dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331). * dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331). * dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331). * dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331). * driver core/PM: Set power.no_callbacks along with power.no_pm (stable- fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers: base: handle module_kobject creation (git-fixes). * drm/amd : Update MES API header file for v11 & v12 (stable-fixes). * drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112). * drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable- fixes). * drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112). * drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Allow DCN301 to clear update flags (git-fixes). * drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git- fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes). * drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes). * drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable- fixes). * drm/amd/display: Disable scaling on DCE6 for now (git-fixes). * drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes). * drm/amd/display: Do not print errors for nonexistent connectors (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable- fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Fix mismatch type comparison (stable-fixes). * drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112). * drm/amd/display: Free memory allocation (stable-fixes). * drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes). * drm/amd/display: Initialize mode_select to 0 (stable-fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes). * drm/amd/display: Properly disable scaling on DCE6 (git-fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: fix a Null pointer dereference vulnerability (stable- fixes). * drm/amd/display: fix dmub access race condition (bsc#1243112). * drm/amd/display: fix initial backlight brightness calculation (git-fixes). * drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112). * drm/amd/display: remove output_tf_change flag (git-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/include : MES v11 and v12 API header update (stable-fixes). * drm/amd/include : Update MES v12 API for fence update (stable-fixes). * drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git- fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd/pm: fix null pointer access (stable-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Avoid evicting resources at S5 (bsc#1243112). * drm/amd: Check whether secure display TA loaded successfully (bsc#1243112). * drm/amd: Fix hybrid sleep (bsc#1243112). * drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112). * drm/amd: Restore cached manual clock settings during resume (bsc#1243112). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/discovery: fix fw based ip discovery (git-fixes). * drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes). * drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes). * drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112). * drm/amdgpu/mes: add missing locking in helper functions (stable-fixes). * drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes). * drm/amdgpu/mes: optimize compute loop handling (stable-fixes). * drm/amdgpu/swm14: Update power limit logic (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu/vcn: fix ref counting for ring based profile handling (git- fixes). * drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112). * drm/amdgpu: Add additional DCE6 SCL registers (git-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112). * drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes). * drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes). * drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112). * drm/amdgpu: Increase reset counter only on success (stable-fixes). * drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git- fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes). * drm/amdgpu: Report individual reset error (bsc#1243112). * drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes). * drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes). * drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable- fixes). * drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes). * drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes). * drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: fix vram reservation issue (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/amdkfd: Fix mmap write lock not release (bsc#1243112). * drm/ast: Use msleep instead of mdelay for edid read (git-fixes). * drm/bridge: fix OF node leak (git-fixes). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/cirrus-qemu: Fix pitch programming (git-fixes). * drm/connector: hdmi: Evaluate limited range after computing format (git- fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes). * drm/gem: Internally test import_attach for imported objects (git-fixes). * drm/gem: Test for imported GEM buffers with helper (stable-fixes). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes). * drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes). * drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes). * drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes). * drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git- fixes). * drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes). * drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes). * drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes). * drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes). * drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable- fixes). * drm/i915/icl+/tc: Cache the max lane count value (stable-fixes). * drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable- fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/imagination: Clear runtime PM errors while resetting the GPU (stable- fixes). * drm/mediatek: Add error handling for old state CRTC in atomic_disable (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dp: account for widebus and yuv420 during mode validation (git- fixes). * drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Add error handling for krealloc in metadata setup (stable-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: update the high bitfield of certain DSI registers (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/gsp: fix potential leak of memory used during acpi init (git- fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes). * drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git- fixes). * drm/panthor: Defer scheduler entitiy destruction to queue release (git- fixes). * drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes). * drm/panthor: validate group queue count (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes). * drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes). * drm/simpledrm: Do not upcast in release helpers (git-fixes). * drm/tests: Fix endian warning (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes). * drm/vmwgfx: Fix Use-after-free in validation (git-fixes). * drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes). * drm/vmwgfx: Fix copy-paste typo in validation (git-fixes). * drm/xe/bmg: Add new PCI IDs (stable-fixes). * drm/xe/bmg: Add one additional PCI ID (stable-fixes). * drm/xe/bmg: Update Wa_22019338487 (git-fixes). * drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes). * drm/xe/hw_engine_group: Fix double write lock release in error path (git- fixes). * drm/xe/mocs: Initialize MOCS index early (stable-fixes). * drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes). * drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes). * drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes). * drm/xe/tile: Release kobject for the failure path (git-fixes). * drm/xe/uapi: Correct sync type definition in comments (git-fixes). * drm/xe/uapi: loosen used tracking restriction (git-fixes). * drm/xe/vf: Disable CSC support on VF (git-fixes). * drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes). * drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes). * drm/xe/xe_sync: avoid race during ufence signaling (git-fixes). * drm/xe: Allow dropping kunit dependency as built-in (git-fixes). * drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes). * drm/xe: Carve out wopcm portion from the stolen memory (git-fixes). * drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes). * drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes). * drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git- fixes). * drm/xe: Fix build without debugfs (git-fixes). * drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes). * drm/xe: Move page fault init after topology init (git-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes). * dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331). * dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331). * e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes). * e1000e: ignore uninitialized checksum word on tgp (git-fixes). * efi: stmm: Fix incorrect buffer allocation method (git-fixes). * erofs: avoid reading more for fragment maps (git-fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * exfat: fdatasync flag should be same like generic_write_sync() (git-fixes). * ext4: fix checks for orphan inodes (bsc#1250119). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: Fix outdated registered_fb reference in comment (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix logic error in "offb" name match (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes). * fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes). * fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firewire: ohci: correct code comments about bus_reset tasklet (git-fixes). * firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes). * firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes). * firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes). * firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes). * firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes). * firmware: firmware: meson-sm: fix compile-test default (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * firmware: tegra: Fix IVC dependency problems (stable-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/proc/task_mmu: check p->vec_buf for NULL (git-fixes). * fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450 * ftrace: Fix function profiler's filtering functionality (git-fixes). * ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes). * gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220). * gfs2: Clean up delete work processing (bsc#1247220). * gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220). * gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220). * gfs2: Minor delete_work_func cleanup (bsc#1247220). * gfs2: Only defer deletes when we have an iopen glock (bsc#1247220). * gfs2: Prevent inode creation race (2) (bsc#1247220). * gfs2: Prevent inode creation race (bsc#1247220). * gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220). * gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (bsc#1247220). * gfs2: Rename dinode_demise to evict_behavior (bsc#1247220). * gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220). * gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220). * gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220). * gfs2: Update to the evict / remote delete documentation (bsc#1247220). * gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220). * gfs2: gfs2_evict_inode clarification (bsc#1247220). * gfs2: minor evict fix (bsc#1247220). * gfs2: skip if we cannot defer delete (bsc#1247220). * gpio: mlxbf2: use platform_get_irq_optional() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: virtio: Fix config space reading (git-fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes). * gpiolib: Extend software-node support to support secondary software-nodes (git-fixes). * gve: Fix stuck TX queue for DQ queue format (git-fixes). * gve: prevent ethtool ops after shutdown (git-fixes). * habanalabs: fix UAF in export_dmabuf() (git-fixes). * hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Link queues to NAPIs (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: designware: Add quirk for Intel Xe (stable-fixes). * i2c: designware: Fix clock issue when PM is disabled (git-fixes). * i2c: designware: Use temporary variable for struct device (stable-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git- fixes). * i2c: omap: Add support for setting mux (stable-fixes). * i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes). * i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes). * i2c: omap: fix deprecated of_property_read_bool() use (git-fixes). * i2c: qup: jump out of the loop in case of timeout (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Fix reset error handling with ACPI (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes). * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: add missing include to internal header (stable-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * i3c: master: svc: Use manual response for IBI events (git-fixes). * i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes). * i40e: report VF tx_dropped with tx_errors instead of tx_discards (git- fixes). * ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git- fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice/ptp: fix crosstimestamp reporting (git-fixes). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762). * ice: check correct pointer in fwlog debugfs (git-fixes). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: do not leave device non-functional if Tx scheduler config fails (git- fixes). * ice: enable_rdma devlink param (bsc#1247712). * ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728). * ice: fix incorrect counter for buffer allocation failures (git-fixes). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * ice: use fixed adapter index for E825C embedded devices (git-fixes). * idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762). * idpf: add cross timestamping (jsc#PED-13728). * idpf: add flow steering support (jsc#PED-13728). * idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762). * idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728). * idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762). * idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762). * idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728). * idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762). * idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762). * idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762). * idpf: improve when to set RE bit logic (jsc#PED-13728). * idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762). * idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762). * idpf: preserve coalescing settings across resets (jsc#PED-13728). * idpf: remove obsolete stashing code (jsc#PED-13728). * idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762). * idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728). * idpf: set mac type when adding and removing MAC filters (jsc#PED-13728). * idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728). * idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728). * idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762). * igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes). * igc: disable L1.2 PCI-E link substate to avoid performance issue (git- fixes). * igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes). * iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762). * iio/adc/pac1934: fix channel disable configuration (git-fixes). * iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git- fixes). * iio: accel: fxls8962af: Fix temperature calculation (git-fixes). * iio: adc: ad7173: fix setting ODR in probe (git-fixes). * iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes). * iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes). * iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes). * iio: adc: max1363: Reorder mode_list[] entries (stable-fixes). * iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes). * iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes). * iio: common: st_sensors: Fix use of uninitialize device structs (stable- fixes). * iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes). * iio: hid-sensor-prox: Restore lost scale assignments (git-fixes). * iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes). * iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes). * iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes). * iio: light: as73211: Ensure buffer holes are zeroed (git-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * intel_idle: Provide the default enter_dead() handler (jsc#PED-13815). * intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815). * interconnect: qcom: sc8180x: specify num_nodes (git-fixes). * interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git- fixes). * io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting. * io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542). * io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes). * iommu/amd: Enable PASID and ATS capabilities in the correct order (git- fixes). * iommu/amd: Fix alias device DTE setting (git-fixes). * iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes). * iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes). * iommu/arm-smmu-v3: Fix smmu_domain->nr_ats_masters decrement (git-fixes). * iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git- fixes). * iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes). * iommu/vt-d: Fix possible circular locking dependency (git-fixes). * iommu/vt-d: Fix system hang on reboot -f (git-fixes). * iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes). * iommu: Handle race with default domain setup (git-fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * ipv6: annotate data-races around rt->fib6_nsiblings (git-fixes). * ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes). * ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes). * ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes). * ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes). * ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410). * ixgbe: prevent from unwanted interface name changes (git-fixes). * ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git- fixes). * kABI fix after Add TDX support for vSphere (jsc#PED-13302). * kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * kABI fix after vhost: Reintroduce kthread API and add mode selection (git- fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for amd_sfh (git-fixes). * kABI workaround for drm_gem.h (git-fixes). * kABI workaround for struct mtk_base_afe changes (git-fixes). * kABI: Fix the module::name type in audit_context (git-fixes). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: fix for struct devlink_port_attrs: move new member to the end (git- fixes). * kABI: netfilter: supress warnings for nft_set_ops (git-fixes). * kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git- fixes). * kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally * kabi/severities: ignore two unused/dropped symbols from MEI * kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kbuild: rust: add rustc-min-version support function (git-fixes) * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kernel: globalize lookup_or_create_module_kobject() (stable-fixes). * kernel: param: rename locate_module_kobject (stable-fixes). * leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes). * leds: flash: leds-qcom-flash: Update torch current clamp setting (git- fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * leds: leds-lp55xx: Use correct address for memory programming (git-fixes). * lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897). * libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes). * libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762). * livepatch: Add stack_order sysfs attribute (poo#187320). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * lpfc: do not use file->f_path.dentry for comparisons (bsc#1250519). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes). * mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git- fixes). * mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes). * mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable- fixes). * mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes). * mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes). * mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git- fixes). * mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git- fixes). * mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * maple_tree: fix status setup on restore to active (git-fixes). * maple_tree: fix testing for 32 bit builds (git-fixes). * mctp: no longer rely on net->dev_index_head (git-fixes). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: cec: extron-da-hd-4k-plus: drop external-module make commands (git- fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: gspca: Add bounds checking to firmware parser (git-fixes). * media: hi556: Fix reset GPIO timings (stable-fixes). * media: hi556: correct the test pattern configuration (git-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes). * media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes). * media: ipu-bridge: Add _HID for OV5670 (stable-fixes). * media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes). * media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes). * media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git- fixes). * media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: pci: mg4b: fix uninitialized iio scan data (git-fixes). * media: pisp_be: Fix pm_runtime underrun in probe (git-fixes). * media: qcom: camss: cleanup media device allocated resource on error path (git-fixes). * media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git- fixes). * media: rc: fix races with imon_disconnect() (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: s5p-mfc: remove an unused/uninitialized variable (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes). * media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes). * media: ti: j721e-csi2rx: fix list_del corruption (git-fixes). * media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: usbtv: Lock resolution while streaming (git-fixes). * media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes). * media: uvcvideo: Do not mark valid metadata as invalid (git-fixes). * media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git- fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: uvcvideo: Rollback non processed entities on error (git-fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes). * media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes). * media: venus: Add a check for packet size after reading from shared memory (git-fixes). * media: venus: Fix MSM8998 frequency table (git-fixes). * media: venus: Fix OOB read due to missing payload bound check (git-fixes). * media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes). * media: venus: hfi: explicitly release IRQ during teardown (git-fixes). * media: venus: protect against spurious interrupts during probe (git-fixes). * media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: verisilicon: Fix AV1 decoder clock frequency (git-fixes). * media: vivid: fix wrong pixel_array control size (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * mei: vsc: Destroy mutex after freeing the IRQ (git-fixes). * mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes). * mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable- fixes). * mei: vsc: Event notifier fixes (git-fixes). * mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes). * mei: vsc: Run event callback from a workqueue (git-fixes). * mei: vsc: Unset the event callback on remove and probe errors (git-fixes). * memory: mtk-smi: Add ostd setting for mt8186 (git-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes). * mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes). * mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * microchip: lan865x: Fix LAN8651 autoloading (git-fixes). * microchip: lan865x: Fix module autoloading (git-fixes). * microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git- fixes). * microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes). * misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes). * misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes). * misc: fastrpc: Skip reference for DMA handles (git-fixes). * misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git- fixes). * misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable- fixes). * misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes). * mm/damon/core: avoid destroyed target reference from DAMOS quota (git- fixes). * mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes). * mm/damon/core: set quota->charged_from to jiffies at first charge window (git-fixes). * mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes). * mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes). * mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes). * mm/damon/sysfs: fix use-after-free in state_show() (git-fixes). * mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes). * mm: close theoretical race where stale TLB entries could linger (git-fixes). * mm: fault in complete folios instead of individual pages for tmpfs (git- fixes). * mm: fix the inaccurate memory statistics issue for users (bsc#1244723). * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git- fixes). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes). * mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable- fixes). * mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes). * mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes). * mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes). * module: Fix memory deallocation on error path in move_module() (git-fixes). * module: Prevent silent truncation of module name in delete_module(2) (git- fixes). * module: Remove unnecessary +1 from last_unloaded_module::name size (git- fixes). * module: Restore the moduleparam prefix length check (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fix spurious wake-up on under memory pressure (git-fixes). * mtd: fix possible integer overflow in erase_xfer() (git-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes). * mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes). * mtd: rawnand: atmel: set pmecc data setup time (git-fixes). * mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes). * mtd: rawnand: renesas: Add missing check after DMA map (git-fixes). * mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes). * mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER (git- fixes). * mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes). * mwl8k: Add missing check after DMA map (git-fixes). * neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes). * net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes). * net/mlx5: CT: Use the correct counter offset (git-fixes). * net/mlx5: Check device memory pointer before usage (git-fixes). * net/mlx5: Correctly set gso_segs when LRO is used (git-fixes). * net/mlx5: Correctly set gso_size when LRO is used (git-fixes). * net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes). * net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes). * net/mlx5: Fix memory leak in cmd_exec() (git-fixes). * net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes). * net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes). * net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes). * net/mlx5: Nack sync reset when SFs are present (git-fixes). * net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes). * net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes). * net/mlx5e: Add new prio for promiscuous mode (git-fixes). * net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git- fixes). * net/mlx5e: Preserve shared buffer capacity during headroom updates (git- fixes). * net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes). * net/mlx5e: Set local Xoff after FW update (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes). * net/packet: fix a race in packet_set_ring() and packet_notifier() (git- fixes). * net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes). * net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git- fixes). * net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes). * net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes). * net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes). * net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes). * net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN- untagged traffic (git-fixes). * net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes). * net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes). * net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: ieee8021q: fix insufficient table-size assertion (stable-fixes). * net: llc: reset skb->transport_header (git-fixes). * net: mana: Add handler for hardware servicing events (bsc#1245730). * net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726). * net: mana: Add support for net_shaper_ops (bsc#1245726). * net: mana: Allocate MSI-X vectors dynamically (bsc#1245457). * net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457). * net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729). * net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes). * net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726). * net: mana: Handle Reset Request from MANA NIC (bsc#1245728). * net: mana: Handle unsupported HWC commands (bsc#1245726). * net: mana: Set tx_packets to post gso processing packet count (bsc#1245731). * net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754). * net: mana: explain irq_setup() algorithm (bsc#1245457). * net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes). * net: mctp: handle skb cleanup on sock_queue failures (git-fixes). * net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes). * net: phy: bcm54811: PHY initialization (stable-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable- fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes). * net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes). * net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes). * net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes). * netfilter: ctnetlink: fix refcount leak on table dump (git-fixes). * netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes). * netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes). * netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git- fixes). * netfilter: nf_reject: do not leak dst refcount for loopback packets (git- fixes). * netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes). * netfilter: nf_tables: adjust lockdep assertions handling (git-fixes). * netfilter: nf_tables: fix set size with rbtree backend (git-fixes). * netfilter: nf_tables: imbalance in flowtable binding (git-fixes). * netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes). * netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes). * netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237). * netfilter: nft_set_hash: skip duplicated elements pending gc run (git- fixes). * netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git- fixes). * netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes). * netfilter: nft_tunnel: fix geneve_opt dump (git-fixes). * netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes). * netlink: fix policy dump for int with validation callback (jsc#PED-13331). * netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331). * netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes). * nfs/localio: add direct IO enablement with sync and async IO support (git- fixes). * nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes). * nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes). * nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes). * nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-auth: update bi_directional flag (git-fixes). * nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500). * nvme-pci: try function level reset on init failure (git-fixes). * nvme-tcp: log TLS handshake failures at error level (git-fixes). * nvme-tcp: send only permitted commands for secure concat (git-fixes). * nvme: fix PI insert on write (git-fixes). * nvme: fix endianness of command word prints in nvme_log_err_passthru() (git- fixes). * nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes). * nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes). * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500). * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500). * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500). * nvmet-tcp: fix callback lock for TLS handshake (git-fixes). * nvmet: exit debugfs after discovery subsystem exits (git-fixes). * nvmet: initialize discovery subsys after debugfs is initialized (git-fixes). * nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes). * objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes). * objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes). * objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes). * of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes). * of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git- fixes). * of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes). * of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes). * of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes). * of: unittest: Unlock on error in unittest_data_add() (git-fixes). * pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * percpu: fix race on alloc failed warning limit (git-fixes). * perf bpf-event: Fix use-after-free in synthesis (git-fixes). * perf bpf-utils: Constify bpil_array_desc (git-fixes). * perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes). * perf dso: Add missed dso__put to dso__load_kcore (git-fixes). * perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes). * perf parse-events: Set default GH modifier properly (git-fixes). * perf record: Cache build-ID of hit DSOs only (git-fixes). * perf sched: Fix memory leaks for evsel->priv in timehist (git-fixes). * perf sched: Fix memory leaks in 'perf sched latency' (git-fixes). * perf sched: Fix memory leaks in 'perf sched map' (git-fixes). * perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes). * perf sched: Free thread->priv using priv_destructor (git-fixes). * perf sched: Make sure it frees the usage string (git-fixes). * perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes). * perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git- fixes). * perf test: Fix a build error in x86 topdown test (git-fixes). * perf tests bp_account: Fix leaked file descriptor (git-fixes). * perf tools: Remove libtraceevent in .gitignore (git-fixes). * perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes). * perf trace: Remove --map-dump documentation (git-fixes). * phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: mscc: Fix timestamping for vsc8584 (git-fixes). * phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git- fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes). * phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy->rate in case of errors (git-fixes). * phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * phy: ti: omap-usb2: fix device leak at unbind (git-fixes). * pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113). * pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git- fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes). * pinmux: fix race causing mux_owner NULL with active mux_usecount (git- fixes). * platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git- fixes). * platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git- fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes). * platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes). * platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes). * platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes). * platform/x86: Fix initialization order for firmware_attributes_class (git- fixes). * platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes). * platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes). * platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git- fixes). * platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git- fixes). * platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git- fixes). * platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes). * platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git- fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git- fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git- fixes). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199). * powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199). * powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * powerpc: floppy: Add missing checks after DMA map (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * printk: nbcon: Allow reacquire during panic (bsc#1246688). * psample: adjust size if rate_as_probability is set (git-fixes). * ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: rockchip: Round period/duty down on apply, up on get (git-fixes). * pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git- fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * r8169: add support for RTL8125D (stable-fixes). * r8169: disable RTL8126 ZRX-DC timeout (stable-fixes). * r8169: do not scan PHY addresses > 0 (stable-fixes). * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * reset: eyeq: fix OF node leak (git-fixes). * resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762). * resource: fix false warning in __request_region() (git-fixes). * ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes). * ring-buffer: Make reading page consistent with the code logic (git-fixes). * rpm/config.sh: SLFO 1.2 is now synced to OBS as well * rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes). * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes). * rtc: optee: fix memory leak on driver removal (git-fixes). * rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes). * rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes). * rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes). * s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837). * s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477). * s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes). * s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372). * s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838). * s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066). * s390/mm: Remove possible false-positive warning in pte_free_defer() (git- fixes bsc#1247366). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478). * s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249065). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064). * samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes). * samples: mei: Fix building on musl libc (git-fixes). * sched/deadline: Always stop dl-server before changing parameters (bsc#1247936). * sched/deadline: Do not count nr_running for dl_server proxy tasks (git- fixes, bsc#1247936). * sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936). * sched/deadline: Fix dl_server_stopped() (bsc#1247936). * sched/deadline: Initialize dl_servers after SMP (git-fixes) * sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519). * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519). * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519). * scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519). * scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519). * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519). * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519). * scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519). * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519). * scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519). * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519). * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519). * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519). * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519). * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519). * scsi: lpfc: Use int type to store negative error codes (bsc#1250519). * scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519). * scsi: lpfc: use min() to improve code (bsc#1250519). * scsi: mpi3mr: Event processing debug improvement (bsc#1251186). * scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186). * scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186). * scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186). * scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes). * scsi: qla2xxx: Remove firmware URL (git-fixes). * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git- fixes). * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * scsi: smartpqi: Enhance WWID logging logic (bsc#1246631). * scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631). * scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631). * scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes). * scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git- fixes). * scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes). * scsi: ufs: core: Add missing post notify for power mode change (git-fixes). * scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes). * scsi: ufs: core: Always initialize the UIC done completion (git-fixes). * scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git- fixes). * scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes). * scsi: ufs: core: Fix error return with query response (git-fixes). * scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes). * scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes). * scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes). * scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes). * scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes). * scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes). * scsi: ufs: core: Remove redundant query_complete trace (git-fixes). * scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes). * scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes). * scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes). * scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes). * scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes). * scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git- fixes). * scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes). * scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes). * scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes). * scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes). * scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes). * scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes). * scsi: ufs: exynos: Remove empty drv_init method (git-fixes). * scsi: ufs: exynos: Remove superfluous function parameter (git-fixes). * scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes). * scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git- fixes). * scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git- fixes). * scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes). * scsi: ufs: qcom: Fix crypto key eviction (git-fixes). * scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git- fixes). * scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes). * scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671). * selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320). * selftests/livepatch: Replace hardcoded module name with variable in test- callbacks.sh (poo#187320). * selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320). * selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: ALSA: fix memory leak in utimer test (git-fixes). * selftests: livepatch: add new ftrace helpers functions (poo#187320). * selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320). * selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320). * selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320). * selftests: livepatch: save and restore kprobe state (poo#187320). * selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320). * selftests: livepatch: test livepatching a kprobed function (poo#187320). * selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443). * selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes). * selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable- fixes). * serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206). * smb: client: fix netns refcount leak after net_passive changes (git-fixes). * soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git- fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git- fixes). * soc: qcom: QMI encoding/decoding for big endian (git-fixes). * soc: qcom: fix endianness for QMI header (git-fixes). * soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes). * soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes). * soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git- fixes). * soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git- fixes). * soc: qcom: pmic_glink: fix OF node leak (git-fixes). * soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes). * soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes). * soundwire: amd: fix for handling slave alerts after link is down (git- fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * soundwire: stream: restore params when prepare ports fail (git-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable- fixes). * spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979). * spi: fix return code when spi device has too many chipselects (git-fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes). * spi: spi-fsl-lpspi: Clear status register after disabling the module (git- fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes). * sprintf.h requires stdarg.h (git-fixes). * sprintf.h: mask additional include (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes). * staging: axis-fifo: fix maximum TX packet length check (git-fixes). * staging: axis-fifo: flush RX FIFO on read errors (git-fixes). * staging: axis-fifo: remove sysfs interface (git-fixes). * staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git- fixes). * staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes). * staging: nvec: Fix incorrect null termination of battery manufacturer (git- fixes). * staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes). * struct cdc_ncm_ctx: move new member to end (git-fixes). * sunrpc: fix client side handling of tls alerts (git-fixes). * sunrpc: fix handling of server side tls alerts (git-fixes). * sunrpc: fix null pointer dereference on zero-length checksum (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: Mark ZL3073X modules supported * supported.conf: mark hyperv_drm as external * tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes). * tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650). * thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes). * thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes). * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * thunderbolt: Fix copy+paste error in match_service_id() (git-fixes). * tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes). * tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes). * tools/power turbostat: Fix build with musl (stable-fixes). * tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes). * tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes). * tools/resolve_btfids: Fix build when cross compiling kernel with clang (git- fixes). * tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes). * trace/fgraph: Fix error handling (git-fixes). * trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes). * tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631). * tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes). * tracing/kprobes: Fix to free objects when failed to copy a symbol (git- fixes). * tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes). * tracing: Fix filter string testing (git-fixes). * tracing: Fix using ret variable in tracing_set_tracer() (git-fixes). * tracing: Remove unneeded goto out logic (bsc#1249286). * tracing: Switch trace.c code over to use guard() (git-fixes). * tracing: Switch trace_events_hist.c code over to use guard() (git-fixes). * tracing: fprobe events: Fix possible UAF on modules (git-fixes). * tracing: tprobe-events: Fix leakage of module refcount (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * tty: serial: fix print format specifiers (stable-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * ucount: fix atomic_long_inc_below() argument type (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes). * usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git- fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes). * usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes). * usb: gadget: midi2: Fix missing UMP group attributes initialization (git- fixes). * usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes). * usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: musb: omap2430: fix device leak at unbind (git-fixes). * usb: phy: twl6030: Fix incorrect type for ret (git-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes). * usb: typec: tcpm: allow switching to mode accessory to mux properly (stable- fixes). * usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes). * usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git- fixes). * usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git- fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: Update power_supply on power role change (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes). * vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes). * vhost: Reintroduce kthread API and add mode selection (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * virtchnl2: add flow steering support (jsc#PED-13728). * virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728). * virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762). * virtio_net: Enforce minimum TX ring size for reliability (git-fixes). * virtio_ring: Fix error reporting in virtqueue_resize (git-fixes). * vmci: Prevent the dispatching of uninitialized payloads (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: Validate length in packet header before skb_put() (git-fixes). * vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes). * vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git- fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes). * wifi: ath11k: fix source ring-buffer corruption (git-fixes). * wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes). * wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath12k: fix endianness handling while accessing wmi service bit (git- fixes). * wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes). * wifi: ath12k: fix source ring-buffer corruption (git-fixes). * wifi: ath12k: fix the fetching of combined rssi (git-fixes). * wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath12k: fix wrong logging ID used for CE (git-fixes). * wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084). * wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes). * wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes). * wifi: iwlwifi: Remove redundant header files (git-fixes). * wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes). * wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes). * wifi: mac80211: Do not schedule stopped TXQs (git-fixes). * wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes). * wifi: mac80211: avoid weird state in error path (stable-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: reject TDLS operations when station is not associated (git- fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix linked list corruption (git-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes). * wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes). * wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes). * wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes). * wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes). * wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes). * wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: nl80211: Set num_sub_specs before looping through sub_specs (git- fixes). * wifi: plfxlc: Fix error handling in usb driver probe (git-fixes). * wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes). * wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtw88: Fix macid assigned to TDLS station (git-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes). * wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704). * x86/Kconfig: Add arch attack vector support (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/boot: Sanitize boot params before parsing command line (git-fixes). * x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes). * x86/bugs: Add attack vector controls for BHI (git-fixes). * x86/bugs: Add attack vector controls for GDS (git-fixes). * x86/bugs: Add attack vector controls for ITS (git-fixes). * x86/bugs: Add attack vector controls for L1TF (git-fixes). * x86/bugs: Add attack vector controls for MDS (git-fixes). * x86/bugs: Add attack vector controls for MMIO (git-fixes). * x86/bugs: Add attack vector controls for RFDS (git-fixes). * x86/bugs: Add attack vector controls for SRBDS (git-fixes). * x86/bugs: Add attack vector controls for SRSO (git-fixes). * x86/bugs: Add attack vector controls for SSB (git-fixes). * x86/bugs: Add attack vector controls for TAA (git-fixes). * x86/bugs: Add attack vector controls for TSA (git-fixes). * x86/bugs: Add attack vector controls for retbleed (git-fixes). * x86/bugs: Add attack vector controls for spectre_v1 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes). * x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes). * x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git- fixes). * x86/bugs: Avoid warning when overriding return thunk (git-fixes). * x86/bugs: Clean up SRSO microcode handling (git-fixes). * x86/bugs: Define attack vectors relevant for each bug (git-fixes). * x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes). * x86/bugs: Introduce cdt_possible() (git-fixes). * x86/bugs: Print enabled attack vectors (git-fixes). * x86/bugs: Remove its=stuff dependency on retbleed (git-fixes). * x86/bugs: Select best SRSO mitigation (git-fixes). * x86/bugs: Simplify the retbleed=stuff checks (git-fixes). * x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes). * x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes). * x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git- fixes). * x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git- fixes). * x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes). * x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes). * x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git- fixes). * x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes). * x86/headers: Replace **ASSEMBLY** with **ASSEMBLER** in UAPI headers (git- fixes). * x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes). * x86/mce/amd: Add default names for MCA banks and blocks (git-fixes). * x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes). * x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes). * x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git- fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/microcode: Consolidate the loader enablement checking (git-fixes). * x86/microcode: Update the Intel processor flag scan check (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/mm/pat: do not collapse pages without PSE set (git-fixes). * x86/nmi: Add an emergency handler in nmi_desc & use it in nmi_shootdown_cpus() (git-fixes). * x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC < 14.2 (git-fixes). * x86/pkeys: Simplify PKRU update in signal frame (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/pti: Add attack vector controls for PTI (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815). * x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815). * x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815). * x86/smpboot: Fix INIT delay assignment for extended Intel Families (git- fixes). * x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815). * x86/traps: Initialize DR6 by writing its architectural reset value (git- fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: fix UAF in dmabuf_exp_from_pages() (git-fixes). * xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO (git-fixes). * xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes). * xfs: do not propagate ENODATA disk errors into xattr code (git-fixes). * xfs: fix scrub trace with null pointer in quotacheck (git-fixes). * xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes). * xfs: remove unused event xfs_alloc_near_error (git-fixes). * xfs: remove unused event xfs_alloc_near_nominleft (git-fixes). * xfs: remove unused event xfs_attr_node_removename (git-fixes). * xfs: remove unused event xfs_ioctl_clone (git-fixes). * xfs: remove unused event xfs_pagecache_inval (git-fixes). * xfs: remove unused event xlog_iclog_want_sync (git-fixes). * xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes). * xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes). * xfs: remove unused trace event xfs_discard_rtrelax (git-fixes). * xfs: remove unused trace event xfs_log_cil_return (git-fixes). * xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes). * xfs: remove unused xfs_attr events (git-fixes). * xfs: remove unused xfs_reflink_compare_extents events (git-fixes). * xfs: remove usused xfs_end_io_direct events (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: dbc: decouple endpoint allocation from initialization (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). * zram: permit only one post-processing operation at a time (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-11=1 * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-16.0-11=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-11=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * kernel-docs-html-6.12.0-160000.6.1 * kernel-devel-6.12.0-160000.6.1 * kernel-source-6.12.0-160000.6.1 * kernel-macros-6.12.0-160000.6.1 * kernel-source-vanilla-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64) * kernel-64kb-debuginfo-6.12.0-160000.6.1 * kernel-64kb-debugsource-6.12.0-160000.6.1 * kernel-64kb-devel-6.12.0-160000.6.1 * kernel-64kb-extra-debuginfo-6.12.0-160000.6.1 * kernel-64kb-extra-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-6.12.0-160000.6.1 * kernel-default-extra-debuginfo-6.12.0-160000.6.1 * kernel-default-extra-6.12.0-160000.6.1 * kernel-syms-6.12.0-160000.6.1 * kernel-obs-qa-6.12.0-160000.6.1 * kernel-default-debuginfo-6.12.0-160000.6.1 * kernel-default-debugsource-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-6.12.0-160000.6.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-debugsource-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * kernel-default-vdso-6.12.0-160000.6.1 * kernel-default-vdso-debuginfo-6.12.0-160000.6.1 * kernel-default-devel-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-vdso-6.12.0-160000.6.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (nosrc s390x) * kernel-zfcpdump-6.12.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (s390x) * kernel-zfcpdump-debugsource-6.12.0-160000.6.1 * kernel-zfcpdump-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * dlm-kmp-default-6.12.0-160000.6.1 * gfs2-kmp-default-6.12.0-160000.6.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.6.1 * kernel-default-debuginfo-6.12.0-160000.6.1 * cluster-md-kmp-default-6.12.0-160000.6.1 * kernel-default-debugsource-6.12.0-160000.6.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.6.1 * dlm-kmp-default-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc) * kernel-default-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * kernel-docs-html-6.12.0-160000.6.1 * kernel-devel-6.12.0-160000.6.1 * kernel-source-6.12.0-160000.6.1 * kernel-macros-6.12.0-160000.6.1 * kernel-source-vanilla-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * dlm-kmp-default-6.12.0-160000.6.1 * gfs2-kmp-default-6.12.0-160000.6.1 * kernel-default-devel-6.12.0-160000.6.1 * kernel-default-extra-debuginfo-6.12.0-160000.6.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.6.1 * kernel-default-extra-6.12.0-160000.6.1 * kernel-syms-6.12.0-160000.6.1 * kernel-kvmsmall-devel-6.12.0-160000.6.1 * kernel-obs-qa-6.12.0-160000.6.1 * kernel-kvmsmall-debugsource-6.12.0-160000.6.1 * kernel-default-debuginfo-6.12.0-160000.6.1 * kernel-default-livepatch-6.12.0-160000.6.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.6.1 * cluster-md-kmp-default-6.12.0-160000.6.1 * kernel-default-debugsource-6.12.0-160000.6.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.6.1 * dlm-kmp-default-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.6.1 * kernel-default-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * kernel-default-vdso-6.12.0-160000.6.1 * kernel-default-vdso-debuginfo-6.12.0-160000.6.1 * kernel-default-devel-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.6.1 * kernel-kvmsmall-vdso-6.12.0-160000.6.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-57891.html * https://www.suse.com/security/cve/CVE-2024-57951.html * https://www.suse.com/security/cve/CVE-2024-57952.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2025-22034.html * https://www.suse.com/security/cve/CVE-2025-22077.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37821.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37856.html * https://www.suse.com/security/cve/CVE-2025-37861.html * https://www.suse.com/security/cve/CVE-2025-37864.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38008.html * https://www.suse.com/security/cve/CVE-2025-38019.html * https://www.suse.com/security/cve/CVE-2025-38034.html * https://www.suse.com/security/cve/CVE-2025-38038.html * https://www.suse.com/security/cve/CVE-2025-38052.html * https://www.suse.com/security/cve/CVE-2025-38058.html * https://www.suse.com/security/cve/CVE-2025-38062.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38087.html * https://www.suse.com/security/cve/CVE-2025-38088.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38090.html * https://www.suse.com/security/cve/CVE-2025-38091.html * https://www.suse.com/security/cve/CVE-2025-38095.html * https://www.suse.com/security/cve/CVE-2025-38096.html * https://www.suse.com/security/cve/CVE-2025-38098.html * https://www.suse.com/security/cve/CVE-2025-38099.html * https://www.suse.com/security/cve/CVE-2025-38101.html * https://www.suse.com/security/cve/CVE-2025-38102.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38106.html * https://www.suse.com/security/cve/CVE-2025-38107.html * https://www.suse.com/security/cve/CVE-2025-38108.html * https://www.suse.com/security/cve/CVE-2025-38109.html * https://www.suse.com/security/cve/CVE-2025-38110.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38112.html * https://www.suse.com/security/cve/CVE-2025-38113.html * https://www.suse.com/security/cve/CVE-2025-38114.html * https://www.suse.com/security/cve/CVE-2025-38117.html * https://www.suse.com/security/cve/CVE-2025-38118.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38120.html * https://www.suse.com/security/cve/CVE-2025-38122.html * https://www.suse.com/security/cve/CVE-2025-38123.html * https://www.suse.com/security/cve/CVE-2025-38124.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38127.html * https://www.suse.com/security/cve/CVE-2025-38128.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://www.suse.com/security/cve/CVE-2025-38134.html * https://www.suse.com/security/cve/CVE-2025-38135.html * https://www.suse.com/security/cve/CVE-2025-38136.html * https://www.suse.com/security/cve/CVE-2025-38137.html * https://www.suse.com/security/cve/CVE-2025-38138.html * https://www.suse.com/security/cve/CVE-2025-38140.html * https://www.suse.com/security/cve/CVE-2025-38141.html * https://www.suse.com/security/cve/CVE-2025-38142.html * https://www.suse.com/security/cve/CVE-2025-38143.html * https://www.suse.com/security/cve/CVE-2025-38145.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38148.html * https://www.suse.com/security/cve/CVE-2025-38149.html * https://www.suse.com/security/cve/CVE-2025-38151.html * https://www.suse.com/security/cve/CVE-2025-38153.html * https://www.suse.com/security/cve/CVE-2025-38154.html * https://www.suse.com/security/cve/CVE-2025-38155.html * https://www.suse.com/security/cve/CVE-2025-38156.html * https://www.suse.com/security/cve/CVE-2025-38157.html * https://www.suse.com/security/cve/CVE-2025-38159.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38161.html * https://www.suse.com/security/cve/CVE-2025-38165.html * https://www.suse.com/security/cve/CVE-2025-38168.html * https://www.suse.com/security/cve/CVE-2025-38169.html * https://www.suse.com/security/cve/CVE-2025-38170.html * https://www.suse.com/security/cve/CVE-2025-38172.html * https://www.suse.com/security/cve/CVE-2025-38173.html * https://www.suse.com/security/cve/CVE-2025-38174.html * https://www.suse.com/security/cve/CVE-2025-38177.html * https://www.suse.com/security/cve/CVE-2025-38180.html * https://www.suse.com/security/cve/CVE-2025-38181.html * https://www.suse.com/security/cve/CVE-2025-38182.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38186.html * https://www.suse.com/security/cve/CVE-2025-38188.html * https://www.suse.com/security/cve/CVE-2025-38189.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38193.html * https://www.suse.com/security/cve/CVE-2025-38197.html * https://www.suse.com/security/cve/CVE-2025-38198.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38209.html * https://www.suse.com/security/cve/CVE-2025-38211.html * https://www.suse.com/security/cve/CVE-2025-38213.html * https://www.suse.com/security/cve/CVE-2025-38214.html * https://www.suse.com/security/cve/CVE-2025-38215.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38217.html * https://www.suse.com/security/cve/CVE-2025-38220.html * https://www.suse.com/security/cve/CVE-2025-38222.html * https://www.suse.com/security/cve/CVE-2025-38224.html * https://www.suse.com/security/cve/CVE-2025-38225.html * https://www.suse.com/security/cve/CVE-2025-38226.html * https://www.suse.com/security/cve/CVE-2025-38227.html * https://www.suse.com/security/cve/CVE-2025-38228.html * https://www.suse.com/security/cve/CVE-2025-38229.html * https://www.suse.com/security/cve/CVE-2025-38231.html * https://www.suse.com/security/cve/CVE-2025-38232.html * https://www.suse.com/security/cve/CVE-2025-38233.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38242.html * https://www.suse.com/security/cve/CVE-2025-38244.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38246.html * https://www.suse.com/security/cve/CVE-2025-38249.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38253.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38256.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://www.suse.com/security/cve/CVE-2025-38258.html * https://www.suse.com/security/cve/CVE-2025-38259.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38265.html * https://www.suse.com/security/cve/CVE-2025-38267.html * https://www.suse.com/security/cve/CVE-2025-38268.html * https://www.suse.com/security/cve/CVE-2025-38270.html * https://www.suse.com/security/cve/CVE-2025-38272.html * https://www.suse.com/security/cve/CVE-2025-38273.html * https://www.suse.com/security/cve/CVE-2025-38274.html * https://www.suse.com/security/cve/CVE-2025-38275.html * https://www.suse.com/security/cve/CVE-2025-38277.html * https://www.suse.com/security/cve/CVE-2025-38278.html * https://www.suse.com/security/cve/CVE-2025-38286.html * https://www.suse.com/security/cve/CVE-2025-38287.html * https://www.suse.com/security/cve/CVE-2025-38288.html * https://www.suse.com/security/cve/CVE-2025-38289.html * https://www.suse.com/security/cve/CVE-2025-38290.html * https://www.suse.com/security/cve/CVE-2025-38291.html * https://www.suse.com/security/cve/CVE-2025-38292.html * https://www.suse.com/security/cve/CVE-2025-38293.html * https://www.suse.com/security/cve/CVE-2025-38299.html * https://www.suse.com/security/cve/CVE-2025-38300.html * https://www.suse.com/security/cve/CVE-2025-38301.html * https://www.suse.com/security/cve/CVE-2025-38302.html * https://www.suse.com/security/cve/CVE-2025-38303.html * https://www.suse.com/security/cve/CVE-2025-38304.html * https://www.suse.com/security/cve/CVE-2025-38305.html * https://www.suse.com/security/cve/CVE-2025-38306.html * https://www.suse.com/security/cve/CVE-2025-38307.html * https://www.suse.com/security/cve/CVE-2025-38311.html * https://www.suse.com/security/cve/CVE-2025-38312.html * https://www.suse.com/security/cve/CVE-2025-38313.html * https://www.suse.com/security/cve/CVE-2025-38315.html * https://www.suse.com/security/cve/CVE-2025-38317.html * https://www.suse.com/security/cve/CVE-2025-38318.html * https://www.suse.com/security/cve/CVE-2025-38319.html * https://www.suse.com/security/cve/CVE-2025-38322.html * https://www.suse.com/security/cve/CVE-2025-38323.html * https://www.suse.com/security/cve/CVE-2025-38326.html * https://www.suse.com/security/cve/CVE-2025-38332.html * https://www.suse.com/security/cve/CVE-2025-38335.html * https://www.suse.com/security/cve/CVE-2025-38336.html * https://www.suse.com/security/cve/CVE-2025-38337.html * https://www.suse.com/security/cve/CVE-2025-38338.html * https://www.suse.com/security/cve/CVE-2025-38339.html * https://www.suse.com/security/cve/CVE-2025-38341.html * https://www.suse.com/security/cve/CVE-2025-38342.html * https://www.suse.com/security/cve/CVE-2025-38343.html * https://www.suse.com/security/cve/CVE-2025-38344.html * https://www.suse.com/security/cve/CVE-2025-38345.html * https://www.suse.com/security/cve/CVE-2025-38348.html * https://www.suse.com/security/cve/CVE-2025-38349.html * https://www.suse.com/security/cve/CVE-2025-38350.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38353.html * https://www.suse.com/security/cve/CVE-2025-38354.html * https://www.suse.com/security/cve/CVE-2025-38355.html * https://www.suse.com/security/cve/CVE-2025-38356.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-38362.html * https://www.suse.com/security/cve/CVE-2025-38363.html * https://www.suse.com/security/cve/CVE-2025-38364.html * https://www.suse.com/security/cve/CVE-2025-38365.html * https://www.suse.com/security/cve/CVE-2025-38368.html * https://www.suse.com/security/cve/CVE-2025-38369.html * https://www.suse.com/security/cve/CVE-2025-38371.html * https://www.suse.com/security/cve/CVE-2025-38372.html * https://www.suse.com/security/cve/CVE-2025-38373.html * https://www.suse.com/security/cve/CVE-2025-38374.html * https://www.suse.com/security/cve/CVE-2025-38375.html * https://www.suse.com/security/cve/CVE-2025-38376.html * https://www.suse.com/security/cve/CVE-2025-38377.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38381.html * https://www.suse.com/security/cve/CVE-2025-38382.html * https://www.suse.com/security/cve/CVE-2025-38383.html * https://www.suse.com/security/cve/CVE-2025-38384.html * https://www.suse.com/security/cve/CVE-2025-38385.html * https://www.suse.com/security/cve/CVE-2025-38386.html * https://www.suse.com/security/cve/CVE-2025-38387.html * https://www.suse.com/security/cve/CVE-2025-38389.html * https://www.suse.com/security/cve/CVE-2025-38390.html * https://www.suse.com/security/cve/CVE-2025-38391.html * https://www.suse.com/security/cve/CVE-2025-38392.html * https://www.suse.com/security/cve/CVE-2025-38393.html * https://www.suse.com/security/cve/CVE-2025-38395.html * https://www.suse.com/security/cve/CVE-2025-38396.html * https://www.suse.com/security/cve/CVE-2025-38397.html * https://www.suse.com/security/cve/CVE-2025-38399.html * https://www.suse.com/security/cve/CVE-2025-38400.html * https://www.suse.com/security/cve/CVE-2025-38401.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38403.html * https://www.suse.com/security/cve/CVE-2025-38404.html * https://www.suse.com/security/cve/CVE-2025-38405.html * https://www.suse.com/security/cve/CVE-2025-38406.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38409.html * https://www.suse.com/security/cve/CVE-2025-38410.html * https://www.suse.com/security/cve/CVE-2025-38412.html * https://www.suse.com/security/cve/CVE-2025-38413.html * https://www.suse.com/security/cve/CVE-2025-38414.html * https://www.suse.com/security/cve/CVE-2025-38415.html * https://www.suse.com/security/cve/CVE-2025-38416.html * https://www.suse.com/security/cve/CVE-2025-38417.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38420.html * https://www.suse.com/security/cve/CVE-2025-38421.html * https://www.suse.com/security/cve/CVE-2025-38424.html * https://www.suse.com/security/cve/CVE-2025-38425.html * https://www.suse.com/security/cve/CVE-2025-38426.html * https://www.suse.com/security/cve/CVE-2025-38427.html * https://www.suse.com/security/cve/CVE-2025-38428.html * https://www.suse.com/security/cve/CVE-2025-38429.html * https://www.suse.com/security/cve/CVE-2025-38430.html * https://www.suse.com/security/cve/CVE-2025-38436.html * https://www.suse.com/security/cve/CVE-2025-38438.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38440.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38443.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38446.html * https://www.suse.com/security/cve/CVE-2025-38448.html * https://www.suse.com/security/cve/CVE-2025-38449.html * https://www.suse.com/security/cve/CVE-2025-38450.html * https://www.suse.com/security/cve/CVE-2025-38451.html * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38454.html * https://www.suse.com/security/cve/CVE-2025-38455.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38457.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38460.html * https://www.suse.com/security/cve/CVE-2025-38461.html * https://www.suse.com/security/cve/CVE-2025-38462.html * https://www.suse.com/security/cve/CVE-2025-38463.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38467.html * https://www.suse.com/security/cve/CVE-2025-38468.html * https://www.suse.com/security/cve/CVE-2025-38470.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38473.html * https://www.suse.com/security/cve/CVE-2025-38474.html * https://www.suse.com/security/cve/CVE-2025-38475.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://www.suse.com/security/cve/CVE-2025-38478.html * https://www.suse.com/security/cve/CVE-2025-38480.html * https://www.suse.com/security/cve/CVE-2025-38481.html * https://www.suse.com/security/cve/CVE-2025-38482.html * https://www.suse.com/security/cve/CVE-2025-38483.html * https://www.suse.com/security/cve/CVE-2025-38484.html * https://www.suse.com/security/cve/CVE-2025-38485.html * https://www.suse.com/security/cve/CVE-2025-38487.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38489.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38493.html * https://www.suse.com/security/cve/CVE-2025-38494.html * https://www.suse.com/security/cve/CVE-2025-38495.html * https://www.suse.com/security/cve/CVE-2025-38496.html * https://www.suse.com/security/cve/CVE-2025-38497.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38508.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38545.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38549.html * https://www.suse.com/security/cve/CVE-2025-38552.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38554.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38557.html * https://www.suse.com/security/cve/CVE-2025-38559.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38564.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38573.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38586.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38619.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38631.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38648.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38658.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38662.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38686.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38700.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38717.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38733.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39673.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39683.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39687.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39697.html * https://www.suse.com/security/cve/CVE-2025-39698.html * https://www.suse.com/security/cve/CVE-2025-39700.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39712.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39722.html * https://www.suse.com/security/cve/CVE-2025-39723.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39727.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39748.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39765.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39775.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39791.html * https://www.suse.com/security/cve/CVE-2025-39792.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39836.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39841.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39851.html * https://www.suse.com/security/cve/CVE-2025-39852.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39875.html * https://www.suse.com/security/cve/CVE-2025-39877.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39884.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39896.html * https://www.suse.com/security/cve/CVE-2025-39898.html * https://www.suse.com/security/cve/CVE-2025-39899.html * https://www.suse.com/security/cve/CVE-2025-39900.html * https://www.suse.com/security/cve/CVE-2025-39902.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39909.html * https://www.suse.com/security/cve/CVE-2025-39916.html * https://www.suse.com/security/cve/CVE-2025-39918.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-39926.html * https://www.suse.com/security/cve/CVE-2025-39931.html * https://www.suse.com/security/cve/CVE-2025-39934.html * https://www.suse.com/security/cve/CVE-2025-39937.html * https://www.suse.com/security/cve/CVE-2025-39938.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39946.html * https://www.suse.com/security/cve/CVE-2025-39952.html * https://www.suse.com/security/cve/CVE-2025-39957.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://www.suse.com/security/cve/CVE-2026-38264.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1234634 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1235953 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237108 * https://bugzilla.suse.com/show_bug.cgi?id=1237131 * https://bugzilla.suse.com/show_bug.cgi?id=1237542 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240998 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241403 * https://bugzilla.suse.com/show_bug.cgi?id=1241435 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242864 * https://bugzilla.suse.com/show_bug.cgi?id=1242965 * https://bugzilla.suse.com/show_bug.cgi?id=1242995 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243055 * https://bugzilla.suse.com/show_bug.cgi?id=1243068 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1243774 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244723 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244749 * https://bugzilla.suse.com/show_bug.cgi?id=1244792 * https://bugzilla.suse.com/show_bug.cgi?id=1244812 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1244939 * https://bugzilla.suse.com/show_bug.cgi?id=1245000 * https://bugzilla.suse.com/show_bug.cgi?id=1245151 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245206 * https://bugzilla.suse.com/show_bug.cgi?id=1245216 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245410 * https://bugzilla.suse.com/show_bug.cgi?id=1245457 * https://bugzilla.suse.com/show_bug.cgi?id=1245504 * https://bugzilla.suse.com/show_bug.cgi?id=1245506 * https://bugzilla.suse.com/show_bug.cgi?id=1245508 * https://bugzilla.suse.com/show_bug.cgi?id=1245510 * https://bugzilla.suse.com/show_bug.cgi?id=1245596 * https://bugzilla.suse.com/show_bug.cgi?id=1245621 * https://bugzilla.suse.com/show_bug.cgi?id=1245630 * https://bugzilla.suse.com/show_bug.cgi?id=1245654 * https://bugzilla.suse.com/show_bug.cgi?id=1245657 * https://bugzilla.suse.com/show_bug.cgi?id=1245658 * https://bugzilla.suse.com/show_bug.cgi?id=1245659 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245664 * https://bugzilla.suse.com/show_bug.cgi?id=1245665 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1245668 * https://bugzilla.suse.com/show_bug.cgi?id=1245669 * https://bugzilla.suse.com/show_bug.cgi?id=1245670 * https://bugzilla.suse.com/show_bug.cgi?id=1245671 * https://bugzilla.suse.com/show_bug.cgi?id=1245675 * https://bugzilla.suse.com/show_bug.cgi?id=1245676 * https://bugzilla.suse.com/show_bug.cgi?id=1245678 * https://bugzilla.suse.com/show_bug.cgi?id=1245683 * https://bugzilla.suse.com/show_bug.cgi?id=1245684 * https://bugzilla.suse.com/show_bug.cgi?id=1245686 * https://bugzilla.suse.com/show_bug.cgi?id=1245688 * https://bugzilla.suse.com/show_bug.cgi?id=1245690 * https://bugzilla.suse.com/show_bug.cgi?id=1245691 * https://bugzilla.suse.com/show_bug.cgi?id=1245695 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245703 * https://bugzilla.suse.com/show_bug.cgi?id=1245705 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245711 * https://bugzilla.suse.com/show_bug.cgi?id=1245713 * https://bugzilla.suse.com/show_bug.cgi?id=1245714 * https://bugzilla.suse.com/show_bug.cgi?id=1245715 * https://bugzilla.suse.com/show_bug.cgi?id=1245717 * https://bugzilla.suse.com/show_bug.cgi?id=1245719 * https://bugzilla.suse.com/show_bug.cgi?id=1245721 * https://bugzilla.suse.com/show_bug.cgi?id=1245723 * https://bugzilla.suse.com/show_bug.cgi?id=1245726 * https://bugzilla.suse.com/show_bug.cgi?id=1245728 * https://bugzilla.suse.com/show_bug.cgi?id=1245729 * https://bugzilla.suse.com/show_bug.cgi?id=1245730 * https://bugzilla.suse.com/show_bug.cgi?id=1245731 * https://bugzilla.suse.com/show_bug.cgi?id=1245735 * https://bugzilla.suse.com/show_bug.cgi?id=1245737 * https://bugzilla.suse.com/show_bug.cgi?id=1245744 * https://bugzilla.suse.com/show_bug.cgi?id=1245745 * https://bugzilla.suse.com/show_bug.cgi?id=1245746 * https://bugzilla.suse.com/show_bug.cgi?id=1245747 * https://bugzilla.suse.com/show_bug.cgi?id=1245748 * https://bugzilla.suse.com/show_bug.cgi?id=1245749 * https://bugzilla.suse.com/show_bug.cgi?id=1245751 * https://bugzilla.suse.com/show_bug.cgi?id=1245757 * https://bugzilla.suse.com/show_bug.cgi?id=1245763 * https://bugzilla.suse.com/show_bug.cgi?id=1245765 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245769 * https://bugzilla.suse.com/show_bug.cgi?id=1245777 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245781 * https://bugzilla.suse.com/show_bug.cgi?id=1245784 * https://bugzilla.suse.com/show_bug.cgi?id=1245785 * https://bugzilla.suse.com/show_bug.cgi?id=1245787 * https://bugzilla.suse.com/show_bug.cgi?id=1245812 * https://bugzilla.suse.com/show_bug.cgi?id=1245814 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245937 * https://bugzilla.suse.com/show_bug.cgi?id=1245945 * https://bugzilla.suse.com/show_bug.cgi?id=1245952 * https://bugzilla.suse.com/show_bug.cgi?id=1245955 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1245966 * https://bugzilla.suse.com/show_bug.cgi?id=1245970 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245976 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1245986 * https://bugzilla.suse.com/show_bug.cgi?id=1246000 * https://bugzilla.suse.com/show_bug.cgi?id=1246002 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246008 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246022 * https://bugzilla.suse.com/show_bug.cgi?id=1246023 * https://bugzilla.suse.com/show_bug.cgi?id=1246031 * https://bugzilla.suse.com/show_bug.cgi?id=1246034 * https://bugzilla.suse.com/show_bug.cgi?id=1246037 * https://bugzilla.suse.com/show_bug.cgi?id=1246041 * https://bugzilla.suse.com/show_bug.cgi?id=1246042 * https://bugzilla.suse.com/show_bug.cgi?id=1246047 * https://bugzilla.suse.com/show_bug.cgi?id=1246049 * https://bugzilla.suse.com/show_bug.cgi?id=1246050 * https://bugzilla.suse.com/show_bug.cgi?id=1246053 * https://bugzilla.suse.com/show_bug.cgi?id=1246054 * https://bugzilla.suse.com/show_bug.cgi?id=1246055 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246098 * https://bugzilla.suse.com/show_bug.cgi?id=1246109 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246166 * https://bugzilla.suse.com/show_bug.cgi?id=1246171 * https://bugzilla.suse.com/show_bug.cgi?id=1246176 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246183 * https://bugzilla.suse.com/show_bug.cgi?id=1246185 * https://bugzilla.suse.com/show_bug.cgi?id=1246186 * https://bugzilla.suse.com/show_bug.cgi?id=1246188 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246192 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246195 * https://bugzilla.suse.com/show_bug.cgi?id=1246220 * https://bugzilla.suse.com/show_bug.cgi?id=1246234 * https://bugzilla.suse.com/show_bug.cgi?id=1246236 * https://bugzilla.suse.com/show_bug.cgi?id=1246240 * https://bugzilla.suse.com/show_bug.cgi?id=1246243 * https://bugzilla.suse.com/show_bug.cgi?id=1246244 * https://bugzilla.suse.com/show_bug.cgi?id=1246245 * https://bugzilla.suse.com/show_bug.cgi?id=1246246 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246250 * https://bugzilla.suse.com/show_bug.cgi?id=1246252 * https://bugzilla.suse.com/show_bug.cgi?id=1246253 * https://bugzilla.suse.com/show_bug.cgi?id=1246255 * https://bugzilla.suse.com/show_bug.cgi?id=1246258 * https://bugzilla.suse.com/show_bug.cgi?id=1246259 * https://bugzilla.suse.com/show_bug.cgi?id=1246260 * https://bugzilla.suse.com/show_bug.cgi?id=1246262 * https://bugzilla.suse.com/show_bug.cgi?id=1246266 * https://bugzilla.suse.com/show_bug.cgi?id=1246268 * https://bugzilla.suse.com/show_bug.cgi?id=1246283 * https://bugzilla.suse.com/show_bug.cgi?id=1246285 * https://bugzilla.suse.com/show_bug.cgi?id=1246286 * https://bugzilla.suse.com/show_bug.cgi?id=1246287 * https://bugzilla.suse.com/show_bug.cgi?id=1246290 * https://bugzilla.suse.com/show_bug.cgi?id=1246292 * https://bugzilla.suse.com/show_bug.cgi?id=1246293 * https://bugzilla.suse.com/show_bug.cgi?id=1246295 * https://bugzilla.suse.com/show_bug.cgi?id=1246297 * https://bugzilla.suse.com/show_bug.cgi?id=1246333 * https://bugzilla.suse.com/show_bug.cgi?id=1246334 * https://bugzilla.suse.com/show_bug.cgi?id=1246337 * https://bugzilla.suse.com/show_bug.cgi?id=1246342 * https://bugzilla.suse.com/show_bug.cgi?id=1246349 * https://bugzilla.suse.com/show_bug.cgi?id=1246351 * https://bugzilla.suse.com/show_bug.cgi?id=1246353 * https://bugzilla.suse.com/show_bug.cgi?id=1246354 * https://bugzilla.suse.com/show_bug.cgi?id=1246358 * https://bugzilla.suse.com/show_bug.cgi?id=1246364 * https://bugzilla.suse.com/show_bug.cgi?id=1246366 * https://bugzilla.suse.com/show_bug.cgi?id=1246370 * https://bugzilla.suse.com/show_bug.cgi?id=1246375 * https://bugzilla.suse.com/show_bug.cgi?id=1246376 * https://bugzilla.suse.com/show_bug.cgi?id=1246385 * https://bugzilla.suse.com/show_bug.cgi?id=1246386 * https://bugzilla.suse.com/show_bug.cgi?id=1246387 * https://bugzilla.suse.com/show_bug.cgi?id=1246438 * https://bugzilla.suse.com/show_bug.cgi?id=1246443 * https://bugzilla.suse.com/show_bug.cgi?id=1246444 * https://bugzilla.suse.com/show_bug.cgi?id=1246447 * https://bugzilla.suse.com/show_bug.cgi?id=1246450 * https://bugzilla.suse.com/show_bug.cgi?id=1246453 * https://bugzilla.suse.com/show_bug.cgi?id=1246473 * https://bugzilla.suse.com/show_bug.cgi?id=1246490 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246547 * https://bugzilla.suse.com/show_bug.cgi?id=1246631 * https://bugzilla.suse.com/show_bug.cgi?id=1246651 * https://bugzilla.suse.com/show_bug.cgi?id=1246688 * https://bugzilla.suse.com/show_bug.cgi?id=1246777 * https://bugzilla.suse.com/show_bug.cgi?id=1246781 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1246868 * https://bugzilla.suse.com/show_bug.cgi?id=1246896 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1246979 * https://bugzilla.suse.com/show_bug.cgi?id=1247018 * https://bugzilla.suse.com/show_bug.cgi?id=1247020 * https://bugzilla.suse.com/show_bug.cgi?id=1247022 * https://bugzilla.suse.com/show_bug.cgi?id=1247023 * https://bugzilla.suse.com/show_bug.cgi?id=1247024 * https://bugzilla.suse.com/show_bug.cgi?id=1247027 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247031 * https://bugzilla.suse.com/show_bug.cgi?id=1247033 * https://bugzilla.suse.com/show_bug.cgi?id=1247035 * https://bugzilla.suse.com/show_bug.cgi?id=1247061 * https://bugzilla.suse.com/show_bug.cgi?id=1247062 * https://bugzilla.suse.com/show_bug.cgi?id=1247064 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247088 * https://bugzilla.suse.com/show_bug.cgi?id=1247089 * https://bugzilla.suse.com/show_bug.cgi?id=1247091 * https://bugzilla.suse.com/show_bug.cgi?id=1247097 * https://bugzilla.suse.com/show_bug.cgi?id=1247098 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247101 * https://bugzilla.suse.com/show_bug.cgi?id=1247102 * https://bugzilla.suse.com/show_bug.cgi?id=1247103 * https://bugzilla.suse.com/show_bug.cgi?id=1247104 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247113 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247123 * https://bugzilla.suse.com/show_bug.cgi?id=1247125 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247128 * https://bugzilla.suse.com/show_bug.cgi?id=1247130 * https://bugzilla.suse.com/show_bug.cgi?id=1247131 * https://bugzilla.suse.com/show_bug.cgi?id=1247132 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247138 * https://bugzilla.suse.com/show_bug.cgi?id=1247141 * https://bugzilla.suse.com/show_bug.cgi?id=1247143 * https://bugzilla.suse.com/show_bug.cgi?id=1247145 * https://bugzilla.suse.com/show_bug.cgi?id=1247146 * https://bugzilla.suse.com/show_bug.cgi?id=1247147 * https://bugzilla.suse.com/show_bug.cgi?id=1247149 * https://bugzilla.suse.com/show_bug.cgi?id=1247150 * https://bugzilla.suse.com/show_bug.cgi?id=1247151 * https://bugzilla.suse.com/show_bug.cgi?id=1247152 * https://bugzilla.suse.com/show_bug.cgi?id=1247153 * https://bugzilla.suse.com/show_bug.cgi?id=1247154 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247156 * https://bugzilla.suse.com/show_bug.cgi?id=1247157 * https://bugzilla.suse.com/show_bug.cgi?id=1247160 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247163 * https://bugzilla.suse.com/show_bug.cgi?id=1247164 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247169 * https://bugzilla.suse.com/show_bug.cgi?id=1247170 * https://bugzilla.suse.com/show_bug.cgi?id=1247171 * https://bugzilla.suse.com/show_bug.cgi?id=1247174 * https://bugzilla.suse.com/show_bug.cgi?id=1247176 * https://bugzilla.suse.com/show_bug.cgi?id=1247177 * https://bugzilla.suse.com/show_bug.cgi?id=1247178 * https://bugzilla.suse.com/show_bug.cgi?id=1247181 * https://bugzilla.suse.com/show_bug.cgi?id=1247209 * https://bugzilla.suse.com/show_bug.cgi?id=1247210 * https://bugzilla.suse.com/show_bug.cgi?id=1247220 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247227 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247231 * https://bugzilla.suse.com/show_bug.cgi?id=1247233 * https://bugzilla.suse.com/show_bug.cgi?id=1247234 * https://bugzilla.suse.com/show_bug.cgi?id=1247235 * https://bugzilla.suse.com/show_bug.cgi?id=1247236 * https://bugzilla.suse.com/show_bug.cgi?id=1247238 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247241 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247250 * https://bugzilla.suse.com/show_bug.cgi?id=1247251 * https://bugzilla.suse.com/show_bug.cgi?id=1247252 * https://bugzilla.suse.com/show_bug.cgi?id=1247253 * https://bugzilla.suse.com/show_bug.cgi?id=1247255 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247265 * https://bugzilla.suse.com/show_bug.cgi?id=1247270 * https://bugzilla.suse.com/show_bug.cgi?id=1247271 * https://bugzilla.suse.com/show_bug.cgi?id=1247273 * https://bugzilla.suse.com/show_bug.cgi?id=1247274 * https://bugzilla.suse.com/show_bug.cgi?id=1247276 * https://bugzilla.suse.com/show_bug.cgi?id=1247277 * https://bugzilla.suse.com/show_bug.cgi?id=1247278 * https://bugzilla.suse.com/show_bug.cgi?id=1247279 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247282 * https://bugzilla.suse.com/show_bug.cgi?id=1247283 * https://bugzilla.suse.com/show_bug.cgi?id=1247284 * https://bugzilla.suse.com/show_bug.cgi?id=1247285 * https://bugzilla.suse.com/show_bug.cgi?id=1247288 * https://bugzilla.suse.com/show_bug.cgi?id=1247289 * https://bugzilla.suse.com/show_bug.cgi?id=1247290 * https://bugzilla.suse.com/show_bug.cgi?id=1247293 * https://bugzilla.suse.com/show_bug.cgi?id=1247308 * https://bugzilla.suse.com/show_bug.cgi?id=1247311 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247314 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1247325 * https://bugzilla.suse.com/show_bug.cgi?id=1247347 * https://bugzilla.suse.com/show_bug.cgi?id=1247348 * https://bugzilla.suse.com/show_bug.cgi?id=1247349 * https://bugzilla.suse.com/show_bug.cgi?id=1247366 * https://bugzilla.suse.com/show_bug.cgi?id=1247372 * https://bugzilla.suse.com/show_bug.cgi?id=1247376 * https://bugzilla.suse.com/show_bug.cgi?id=1247426 * https://bugzilla.suse.com/show_bug.cgi?id=1247437 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247837 * https://bugzilla.suse.com/show_bug.cgi?id=1247838 * https://bugzilla.suse.com/show_bug.cgi?id=1247935 * https://bugzilla.suse.com/show_bug.cgi?id=1247936 * https://bugzilla.suse.com/show_bug.cgi?id=1247949 * https://bugzilla.suse.com/show_bug.cgi?id=1247950 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248190 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248224 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248230 * https://bugzilla.suse.com/show_bug.cgi?id=1248235 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248299 * https://bugzilla.suse.com/show_bug.cgi?id=1248302 * https://bugzilla.suse.com/show_bug.cgi?id=1248304 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248359 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248367 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248396 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248624 * https://bugzilla.suse.com/show_bug.cgi?id=1248627 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248635 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248662 * https://bugzilla.suse.com/show_bug.cgi?id=1248664 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248727 * https://bugzilla.suse.com/show_bug.cgi?id=1248728 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249038 * https://bugzilla.suse.com/show_bug.cgi?id=1249060 * https://bugzilla.suse.com/show_bug.cgi?id=1249061 * https://bugzilla.suse.com/show_bug.cgi?id=1249062 * https://bugzilla.suse.com/show_bug.cgi?id=1249064 * https://bugzilla.suse.com/show_bug.cgi?id=1249065 * https://bugzilla.suse.com/show_bug.cgi?id=1249066 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249160 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249167 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249182 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249269 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249286 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249297 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249301 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249309 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249313 * https://bugzilla.suse.com/show_bug.cgi?id=1249314 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249316 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249319 * https://bugzilla.suse.com/show_bug.cgi?id=1249320 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249322 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249477 * https://bugzilla.suse.com/show_bug.cgi?id=1249478 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249500 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249509 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249550 * https://bugzilla.suse.com/show_bug.cgi?id=1249552 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249562 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249587 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249618 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249904 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250087 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250119 * https://bugzilla.suse.com/show_bug.cgi?id=1250123 * https://bugzilla.suse.com/show_bug.cgi?id=1250124 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250258 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250296 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250386 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250398 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250408 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250650 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250671 * https://bugzilla.suse.com/show_bug.cgi?id=1250702 * https://bugzilla.suse.com/show_bug.cgi?id=1250711 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250716 * https://bugzilla.suse.com/show_bug.cgi?id=1250719 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250729 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250737 * https://bugzilla.suse.com/show_bug.cgi?id=1250739 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250758 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1251100 * https://bugzilla.suse.com/show_bug.cgi?id=1251114 * https://bugzilla.suse.com/show_bug.cgi?id=1251134 * https://bugzilla.suse.com/show_bug.cgi?id=1251135 * https://bugzilla.suse.com/show_bug.cgi?id=1251143 * https://bugzilla.suse.com/show_bug.cgi?id=1251146 * https://bugzilla.suse.com/show_bug.cgi?id=1251186 * https://bugzilla.suse.com/show_bug.cgi?id=1251216 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251810 * https://bugzilla.suse.com/show_bug.cgi?id=1252084 * https://jira.suse.com/browse/PED-10909 * https://jira.suse.com/browse/PED-12405 * https://jira.suse.com/browse/PED-12745 * https://jira.suse.com/browse/PED-12882 * https://jira.suse.com/browse/PED-13113 * https://jira.suse.com/browse/PED-13256 * https://jira.suse.com/browse/PED-13302 * https://jira.suse.com/browse/PED-13331 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 * https://jira.suse.com/browse/PED-13631 * https://jira.suse.com/browse/PED-13704 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-13762 * https://jira.suse.com/browse/PED-13815 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7249 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 13 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 13 Nov 2025 16:30:09 -0000 Subject: SUSE-SU-2025:4090-1: critical: Security update for lasso Message-ID: <176305140987.20318.15322596517180141527@smelt2.prg2.suse.org> # Security update for lasso Announcement ID: SUSE-SU-2025:4090-1 Release Date: 2025-11-13T13:03:07Z Rating: critical References: * bsc#1253092 * bsc#1253093 * bsc#1253094 * bsc#1253095 Cross-References: * CVE-2025-46404 * CVE-2025-46705 * CVE-2025-46784 * CVE-2025-47151 CVSS scores: * CVE-2025-46404 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46404 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46404 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46705 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46784 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46784 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46784 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47151 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-47151 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47151 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves four vulnerabilities can now be installed. ## Description: This update for lasso fixes the following issues: * CVE-2025-46784: Fixed memory exhaustion in Entr'ouvert Lasso (bsc#1253094) * CVE-2025-46404: Fixed denial of service in Entr'ouvert Lasso (bsc#1253092) * CVE-2025-46705: Fixed denial of service in Entr'ouvert Lasso (bsc#1253093) * CVE-2025-47151: Fixed type confusion vulnerability in the lasso_node_impl_init_from_xml functionality (bsc#1253095) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4090=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4090=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4090=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4090=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4090=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4090=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4090=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4090=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4090=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4090=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * liblasso3-2.6.1-150200.24.1 * lasso-debugsource-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * lasso-debugsource-2.6.1-150200.24.1 * python3-lasso-2.6.1-150200.24.1 * liblasso3-2.6.1-150200.24.1 * lasso-debuginfo-2.6.1-150200.24.1 * liblasso-devel-2.6.1-150200.24.1 * python3-lasso-debuginfo-2.6.1-150200.24.1 * liblasso3-debuginfo-2.6.1-150200.24.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46404.html * https://www.suse.com/security/cve/CVE-2025-46705.html * https://www.suse.com/security/cve/CVE-2025-46784.html * https://www.suse.com/security/cve/CVE-2025-47151.html * https://bugzilla.suse.com/show_bug.cgi?id=1253092 * https://bugzilla.suse.com/show_bug.cgi?id=1253093 * https://bugzilla.suse.com/show_bug.cgi?id=1253094 * https://bugzilla.suse.com/show_bug.cgi?id=1253095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Nov 13 20:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 13 Nov 2025 20:30:15 -0000 Subject: SUSE-SU-2025:4091-1: low: Security update for cargo-packaging, rust-bindgen Message-ID: <176306581553.20159.18148835800430138090@smelt2.prg2.suse.org> # Security update for cargo-packaging, rust-bindgen Announcement ID: SUSE-SU-2025:4091-1 Release Date: 2025-11-13T16:30:43Z Rating: low References: * bsc#1222175 * bsc#1249012 Cross-References: * CVE-2025-58160 CVSS scores: * CVE-2025-58160 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-58160 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-58160 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for cargo-packaging and rust-bindgen fixes the following issues: cargo-packaging was updated to version 1.3.0+0: * CVE-2025-58160: Fixed tracing log pollution in tracing-subscriber (bsc#1249012) Other fixes: * Prevent stripping debug info (bsc#1222175) rust-bindgen was updated to 0.72.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4091=1 openSUSE-SLE-15.6-2025-4091=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * cargo-packaging-1.3.0+0-150600.3.3.1 * rust-bindgen-debuginfo-0.72.0-150600.13.3.1 * rust-bindgen-debugsource-0.72.0-150600.13.3.1 * rust-bindgen-0.72.0-150600.13.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58160.html * https://bugzilla.suse.com/show_bug.cgi?id=1222175 * https://bugzilla.suse.com/show_bug.cgi?id=1249012 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 08:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 08:30:12 -0000 Subject: SUSE-SU-2025:4094-1: critical: Security update for lasso Message-ID: <176310901283.20308.5606622075513276317@smelt2.prg2.suse.org> # Security update for lasso Announcement ID: SUSE-SU-2025:4094-1 Release Date: 2025-11-13T23:34:51Z Rating: critical References: * bsc#1253092 * bsc#1253093 * bsc#1253094 * bsc#1253095 Cross-References: * CVE-2025-46404 * CVE-2025-46705 * CVE-2025-46784 * CVE-2025-47151 CVSS scores: * CVE-2025-46404 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46404 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46404 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46705 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46705 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46784 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46784 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-46784 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47151 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-47151 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-47151 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for lasso fixes the following issues: * CVE-2025-46784: Fixed memory exhaustion in Entr'ouvert Lasso (bsc#1253094) * CVE-2025-46404: Fixed denial of service in Entr'ouvert Lasso (bsc#1253092) * CVE-2025-46705: Fixed denial of service in Entr'ouvert Lasso (bsc#1253093) * CVE-2025-47151: Fixed type confusion vulnerability in the lasso_node_impl_init_from_xml functionality (bsc#1253095) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4094=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4094=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * liblasso-devel-2.6.1-8.12.1 * liblasso3-2.6.1-8.12.1 * python3-lasso-2.6.1-8.12.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * liblasso-devel-2.6.1-8.12.1 * liblasso3-2.6.1-8.12.1 * python3-lasso-2.6.1-8.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46404.html * https://www.suse.com/security/cve/CVE-2025-46705.html * https://www.suse.com/security/cve/CVE-2025-46784.html * https://www.suse.com/security/cve/CVE-2025-47151.html * https://bugzilla.suse.com/show_bug.cgi?id=1253092 * https://bugzilla.suse.com/show_bug.cgi?id=1253093 * https://bugzilla.suse.com/show_bug.cgi?id=1253094 * https://bugzilla.suse.com/show_bug.cgi?id=1253095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:30:24 -0000 Subject: SUSE-SU-2025:4104-1: moderate: Security update for libxml2 Message-ID: <176312342420.20318.8508582007379182715@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:4104-1 Release Date: 2025-11-14T10:04:07Z Rating: moderate References: * bsc#1247850 * bsc#1249076 Cross-References: * CVE-2025-8732 * CVE-2025-9714 CVSS scores: * CVE-2025-8732 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8732 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8732 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-9714 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-9714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9714 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2025-9714: Fixed infinite recursion at exsltDynMapFunction function in libexslt/dynamic.c (bsc#1249076) * CVE-2025-8732: Fixed infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247850) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4104=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libxml2-2-debuginfo-2.9.4-46.93.1 * libxml2-debugsource-2.9.4-46.93.1 * libxml2-tools-debuginfo-2.9.4-46.93.1 * libxml2-2-32bit-2.9.4-46.93.1 * libxml2-devel-2.9.4-46.93.1 * python-libxml2-2.9.4-46.93.1 * python-libxml2-debuginfo-2.9.4-46.93.1 * libxml2-2-debuginfo-32bit-2.9.4-46.93.1 * libxml2-2-2.9.4-46.93.1 * python-libxml2-debugsource-2.9.4-46.93.1 * libxml2-tools-2.9.4-46.93.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libxml2-doc-2.9.4-46.93.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8732.html * https://www.suse.com/security/cve/CVE-2025-9714.html * https://bugzilla.suse.com/show_bug.cgi?id=1247850 * https://bugzilla.suse.com/show_bug.cgi?id=1249076 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:30:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:30:29 -0000 Subject: SUSE-SU-2025:4103-1: important: Security update for tomcat10 Message-ID: <176312342903.20318.13337605350774504035@smelt2.prg2.suse.org> # Security update for tomcat10 Announcement ID: SUSE-SU-2025:4103-1 Release Date: 2025-11-14T09:57:07Z Rating: important References: * bsc#1252753 * bsc#1252756 * bsc#1252905 Cross-References: * CVE-2025-55752 * CVE-2025-55754 * CVE-2025-61795 CVSS scores: * CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55752 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55754 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61795 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61795 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP6 * Web and Scripting Module 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for tomcat10 fixes the following issues: Update to Tomcat 10.1.48 * CVE-2025-55752: Fixed directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753) * CVE-2025-55754: Fixed improper neutralization of escape, meta, or control sequences vulnerability (bsc#1252905) * CVE-2025-61795: Fixed denial of service due to temporary copies during the processing of multipart upload (bsc#1252756) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4103=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-4103=1 * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-4103=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4103=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4103=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4103=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4103=1 ## Package List: * openSUSE Leap 15.6 (noarch) * tomcat10-embed-10.1.48-150200.5.54.1 * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-docs-webapp-10.1.48-150200.5.54.1 * tomcat10-doc-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 * tomcat10-jsvc-10.1.48-150200.5.54.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 * Web and Scripting Module 15-SP7 (noarch) * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * tomcat10-el-5_0-api-10.1.48-150200.5.54.1 * tomcat10-servlet-6_0-api-10.1.48-150200.5.54.1 * tomcat10-10.1.48-150200.5.54.1 * tomcat10-webapps-10.1.48-150200.5.54.1 * tomcat10-lib-10.1.48-150200.5.54.1 * tomcat10-admin-webapps-10.1.48-150200.5.54.1 * tomcat10-jsp-3_1-api-10.1.48-150200.5.54.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55752.html * https://www.suse.com/security/cve/CVE-2025-55754.html * https://www.suse.com/security/cve/CVE-2025-61795.html * https://bugzilla.suse.com/show_bug.cgi?id=1252753 * https://bugzilla.suse.com/show_bug.cgi?id=1252756 * https://bugzilla.suse.com/show_bug.cgi?id=1252905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:30:37 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:30:37 -0000 Subject: SUSE-SU-2025:4100-1: important: Security update for python-Django Message-ID: <176312343795.20318.11385053550726564666@smelt2.prg2.suse.org> # Security update for python-Django Announcement ID: SUSE-SU-2025:4100-1 Release Date: 2025-11-14T09:03:45Z Rating: important References: * bsc#1252926 Cross-References: * CVE-2025-62769 * CVE-2025-64459 CVSS scores: * CVE-2025-62769 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-64459 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Django fixes the following issues: * CVE-2025-64459: Fixed a potential SQL injection via the '_connector' keyword (bsc#1252926) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4100=1 openSUSE-SLE-15.6-2025-4100=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4100=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4100=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-Django-4.2.11-150600.3.41.1 * SUSE Package Hub 15 15-SP6 (noarch) * python311-Django-4.2.11-150600.3.41.1 * SUSE Package Hub 15 15-SP7 (noarch) * python311-Django-4.2.11-150600.3.41.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62769.html * https://www.suse.com/security/cve/CVE-2025-64459.html * https://bugzilla.suse.com/show_bug.cgi?id=1252926 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:30:41 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:30:41 -0000 Subject: SUSE-SU-2025:4099-1: important: Security update for squid Message-ID: <176312344136.20318.4440548239328588192@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:4099-1 Release Date: 2025-11-14T08:23:14Z Rating: important References: * bsc#1252281 Cross-References: * CVE-2025-62168 CVSS scores: * CVE-2025-62168 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-62168 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-62168 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-62168 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-62168: Fixed failure to redact HTTP authentication credentials in error handling leading to information disclosure (bsc#1252281) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4099=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4099=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * squid-debuginfo-4.17-4.59.1 * squid-4.17-4.59.1 * squid-debugsource-4.17-4.59.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * squid-debuginfo-4.17-4.59.1 * squid-4.17-4.59.1 * squid-debugsource-4.17-4.59.1 ## References: * https://www.suse.com/security/cve/CVE-2025-62168.html * https://bugzilla.suse.com/show_bug.cgi?id=1252281 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:30:45 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:30:45 -0000 Subject: SUSE-SU-2025:4098-1: moderate: Security update for openssh8.4 Message-ID: <176312344500.20318.5834398733614061280@smelt2.prg2.suse.org> # Security update for openssh8.4 Announcement ID: SUSE-SU-2025:4098-1 Release Date: 2025-11-14T08:22:54Z Rating: moderate References: * bsc#1251198 * bsc#1251199 Cross-References: * CVE-2025-61984 * CVE-2025-61985 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61985 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61985 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61985 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for openssh8.4 fixes the following issues: * CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198) * CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4098=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4098=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openssh8.4-server-debuginfo-8.4p1-8.19.1 * openssh8.4-helpers-debuginfo-8.4p1-8.19.1 * openssh8.4-fips-8.4p1-8.19.1 * openssh8.4-common-8.4p1-8.19.1 * openssh8.4-helpers-8.4p1-8.19.1 * openssh8.4-clients-8.4p1-8.19.1 * openssh8.4-server-8.4p1-8.19.1 * openssh8.4-8.4p1-8.19.1 * openssh8.4-debugsource-8.4p1-8.19.1 * openssh8.4-common-debuginfo-8.4p1-8.19.1 * openssh8.4-clients-debuginfo-8.4p1-8.19.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * openssh8.4-server-debuginfo-8.4p1-8.19.1 * openssh8.4-helpers-debuginfo-8.4p1-8.19.1 * openssh8.4-fips-8.4p1-8.19.1 * openssh8.4-common-8.4p1-8.19.1 * openssh8.4-helpers-8.4p1-8.19.1 * openssh8.4-clients-8.4p1-8.19.1 * openssh8.4-server-8.4p1-8.19.1 * openssh8.4-8.4p1-8.19.1 * openssh8.4-debugsource-8.4p1-8.19.1 * openssh8.4-common-debuginfo-8.4p1-8.19.1 * openssh8.4-clients-debuginfo-8.4p1-8.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://www.suse.com/security/cve/CVE-2025-61985.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 * https://bugzilla.suse.com/show_bug.cgi?id=1251199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:30:50 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:30:50 -0000 Subject: SUSE-SU-2025:4097-1: moderate: Security update for openssh Message-ID: <176312345081.20318.11173463199528175558@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:4097-1 Release Date: 2025-11-14T08:22:41Z Rating: moderate References: * bsc#1251198 Cross-References: * CVE-2025-61984 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4097=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4097=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openssh-fips-7.2p2-81.34.1 * openssh-debuginfo-7.2p2-81.34.1 * openssh-helpers-debuginfo-7.2p2-81.34.1 * openssh-askpass-gnome-7.2p2-81.34.1 * openssh-helpers-7.2p2-81.34.1 * openssh-askpass-gnome-debuginfo-7.2p2-81.34.1 * openssh-debugsource-7.2p2-81.34.1 * openssh-7.2p2-81.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * openssh-fips-7.2p2-81.34.1 * openssh-debuginfo-7.2p2-81.34.1 * openssh-helpers-debuginfo-7.2p2-81.34.1 * openssh-askpass-gnome-7.2p2-81.34.1 * openssh-helpers-7.2p2-81.34.1 * openssh-askpass-gnome-debuginfo-7.2p2-81.34.1 * openssh-debugsource-7.2p2-81.34.1 * openssh-7.2p2-81.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 12:31:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 12:31:19 -0000 Subject: SUSE-SU-2025:4096-1: important: Security update for binutils Message-ID: <176312347935.20318.15752628589039777035@smelt2.prg2.suse.org> # Security update for binutils Announcement ID: SUSE-SU-2025:4096-1 Release Date: 2025-11-14T08:09:02Z Rating: important References: * bsc#1040589 * bsc#1236632 * bsc#1236976 * bsc#1236977 * bsc#1236978 * bsc#1236999 * bsc#1237000 * bsc#1237001 * bsc#1237003 * bsc#1237005 * bsc#1237018 * bsc#1237019 * bsc#1237020 * bsc#1237021 * bsc#1237042 * bsc#1240870 * bsc#1241916 * bsc#1243756 * bsc#1243760 * bsc#1246481 * bsc#1246486 * bsc#1247105 * bsc#1247114 * bsc#1247117 * bsc#1250632 * bsc#1251275 * bsc#1251276 * bsc#1251277 * bsc#1251794 * bsc#1251795 Cross-References: * CVE-2025-0840 * CVE-2025-11083 * CVE-2025-11412 * CVE-2025-11413 * CVE-2025-11414 * CVE-2025-1147 * CVE-2025-1148 * CVE-2025-1149 * CVE-2025-11494 * CVE-2025-11495 * CVE-2025-1150 * CVE-2025-1151 * CVE-2025-1152 * CVE-2025-1153 * CVE-2025-1176 * CVE-2025-1178 * CVE-2025-1179 * CVE-2025-1180 * CVE-2025-1181 * CVE-2025-1182 * CVE-2025-3198 * CVE-2025-5244 * CVE-2025-5245 * CVE-2025-7545 * CVE-2025-7546 * CVE-2025-8224 * CVE-2025-8225 CVSS scores: * CVE-2025-0840 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-0840 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-0840 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-0840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-11083 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11083 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11083 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-11412 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11412 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11412 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11412 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11413 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11413 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11414 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-11414 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11414 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-1147 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1147 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-1147 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1147 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1147 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-1148 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1148 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1148 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1148 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1149 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1149 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1149 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1149 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11494 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11494 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11494 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11494 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( SUSE ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-11495 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11495 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1150 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-1150 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1150 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1151 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1151 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1151 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1151 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1152 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1152 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1152 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1152 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1153 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1153 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1153 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1153 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-1176 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1176 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1176 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1178 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1178 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1178 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1178 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-1179 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1179 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1179 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1179 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1179 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-1180 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1180 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1180 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1180 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-1181 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-1181 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-1181 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1181 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-1182 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-1182 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-1182 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-3198 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3198 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3198 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5244 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5244 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-5245 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-5245 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5245 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-5245 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-5245 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-7545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-7545 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7545 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7545 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-7546 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-7546 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-7546 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-7546 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7546 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-8224 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8224 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8224 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8225 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8225 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8225 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8225 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves 27 vulnerabilities and has three security fixes can now be installed. ## Description: This update for binutils fixes the following issues: * Do not enable '-z gcs=implicit' on aarch64 for old codestreams. Update to version 2.45: * New versioned release of libsframe.so.2 * s390: tools now support SFrame format 2; recognize "z17" as CPU name [bsc#1247105, jsc#IBM-1485] * sframe sections are now of ELF section type SHT_GNU_SFRAME. * sframe secions generated by the assembler have SFRAME_F_FDE_FUNC_START_PCREL set. * riscv: Support more extensions: standard: Zicfiss v1.0, Zicfilp v1.0, Zcmp v1.0, Zcmt v1.0, Smrnmi v1.0, S[sm]dbltrp v1.0, S[sm]ctr v1.0, ssqosid v1.0, ssnpm v1.0, smnpm v1.0, smmpm v1.0, sspm v1.0, supm v1.0, sha v1.0, zce v1.0, smcdeleg v1.0, ssccfg v1.0, svvptc v1.0, zilsd v1.0, zclsd v1.0, smrnmi v1.0; vendor: CORE-V, xcvbitmanip v1.0 and xcvsimd v1.0; SiFive, xsfvqmaccdod v1.0, xsfvqmaccqoqv1.0 and xsfvfnrclipxfqf v1.0; T-Head: xtheadvdot v1.0; MIPS: xmipscbop v1.0, xmipscmov v1.0, xmipsexectl v1.0, xmipslsp v1.0. * Support RISC-V privileged version 1.13, profiles 20/22/23, and .bfloat16 directive. * x86: Add support for these ISAs: Intel Diamond Rapids AMX, MOVRS, AVX10.2 (including SM4), MSR_IMM; Zhaoxin PadLock PHE2, RNG2, GMI, XMODX. Drop support for AVX10.2 256 bit rounding. * arm: Add support for most of Armv9.6, enabled by -march=armv9.6-a and extensions '+cmpbr', '+f8f16mm', '+f8f32mm', '+fprcvt', '+lsfe', '+lsui', '+occmo', '+pops', '+sme2p2', '+ssve-aes', '+sve-aes', '+sve-aes2', '+sve- bfscale', '+sve-f16f32mm' and '+sve2p2'. * Predefined symbols "GAS(version)" and, on non-release builds, "GAS(date)" are now being made available. * Add .errif and .warnif directives. * linker: * Add --image-base= option to the ELF linker to behave the same as -Ttext-segment for compatibility with LLD. * Add support for mixed LTO and non-LTO codes in relocatable output. * s390: linker generates .eh_frame and/or .sframe for linker generated .plt sections by default (can be disabled by --no-ld-generated-unwind-info). * riscv: add new PLT formats, and GNU property merge rules for zicfiss and zicfilp extensions. * gold is no longer included * Contains fixes for these non-CVEs (not security bugs per upstreams SECURITY.md): * bsc#1236632 aka CVE-2025-0840 aka PR32650 * bsc#1236977 aka CVE-2025-1149 aka PR32576 * bsc#1236978 aka CVE-2025-1148 aka PR32576 * bsc#1236999 aka CVE-2025-1176 aka PR32636 * bsc#1237000 aka CVE-2025-1153 aka PR32603 * bsc#1237001 aka CVE-2025-1152 aka PR32576 * bsc#1237003 aka CVE-2025-1151 aka PR32576 * bsc#1237005 aka CVE-2025-1150 aka PR32576 * bsc#1237018 aka CVE-2025-1178 aka PR32638 * bsc#1237019 aka CVE-2025-1181 aka PR32643 * bsc#1237020 aka CVE-2025-1180 aka PR32642 * bsc#1237021 aka CVE-2025-1179 aka PR32640 * bsc#1237042 aka CVE-2025-1182 aka PR32644 * bsc#1240870 aka CVE-2025-3198 aka PR32716 * bsc#1243756 aka CVE-2025-5244 aka PR32858 * bsc#1243760 aka CVE-2025-5245 aka PR32829 * bsc#1246481 aka CVE-2025-7545 aka PR33049 * bsc#1246486 aka CVE-2025-7546 aka PR33050 * bsc#1247114 aka CVE-2025-8224 aka PR32109 * bsc#1247117 aka CVE-2025-8225 no PR * Add these backport patches: * bsc#1236976 aka CVE-2025-1147 aka PR32556 * bsc#1250632 aka CVE-2025-11083 aka PR33457 * bsc#1251275 aka CVE-2025-11412 aka PR33452 * bsc#1251276 aka CVE-2025-11413 aka PR33456 * bsc#1251277 aka CVE-2025-11414 aka PR33450 * bsc#1251794 aka CVE-2025-11494 aka PR33499 * bsc#1251795 aka CVE-2025-11495 aka PR33502 * Skip PGO with %want_reproducible_builds (bsc#1040589) * Fix crash in assembler with -gdwarf-5 * aarch64-common-pagesize.patch, aarch64 no longer uses 64K page size * Add -std=gnu17 to move gcc15 forward, as temporary measure until the binutils version can be updated [bsc#1241916]. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4096=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4096=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4096=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4096=1 openSUSE-SLE-15.6-2025-4096=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4096=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4096=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4096=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4096=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4096=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4096=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4096=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4096=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4096=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4096=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4096=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4096=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4096=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4096=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4096=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4096=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4096=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4096=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * perf-debugsource-5.3.18-150300.38.7.1 * perf-5.3.18-150300.38.7.1 * perf-debuginfo-5.3.18-150300.38.7.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * libucm0-1.9.0-150300.4.2.5 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libucs0-1.9.0-150300.4.2.5 * libucm0-debuginfo-1.9.0-150300.4.2.5 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * openucx-debugsource-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * openSUSE Leap 15.3 (aarch64_ilp32) * libucm0-64bit-1.9.0-150300.4.2.5 * libuct0-64bit-debuginfo-1.9.0-150300.4.2.5 * libuct0-64bit-1.9.0-150300.4.2.5 * libucs0-64bit-debuginfo-1.9.0-150300.4.2.5 * libucp0-64bit-debuginfo-1.9.0-150300.4.2.5 * libucp0-64bit-1.9.0-150300.4.2.5 * libucm0-64bit-debuginfo-1.9.0-150300.4.2.5 * libucs0-64bit-1.9.0-150300.4.2.5 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * perf-debugsource-5.14.21-150400.44.20.1 * perf-debuginfo-5.14.21-150400.44.20.1 * perf-devel-5.14.21-150400.44.20.1 * perf-5.14.21-150400.44.20.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * libucm0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-1.11.1-150400.4.2.1 * libucp0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libucm0-64bit-debuginfo-1.11.1-150400.4.2.1 * libucm0-64bit-1.11.1-150400.4.2.1 * libucs0-64bit-1.11.1-150400.4.2.1 * libucp0-64bit-1.11.1-150400.4.2.1 * libucs0-64bit-debuginfo-1.11.1-150400.4.2.1 * libucp0-64bit-debuginfo-1.11.1-150400.4.2.1 * libuct0-64bit-debuginfo-1.11.1-150400.4.2.1 * libuct0-64bit-1.11.1-150400.4.2.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * perf-debuginfo-5.14.21-150500.52.5.1 * perf-debugsource-5.14.21-150500.52.5.1 * perf-devel-5.14.21-150500.52.5.1 * perf-5.14.21-150500.52.5.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * libucs0-debuginfo-1.13.1-150500.4.2.5 * openucx-debugsource-1.13.1-150500.4.2.5 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * libuct0-debuginfo-1.13.1-150500.4.2.5 * openucx-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * perf-gtk-debuginfo-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-gtk-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-bash-completion-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-debuginfo-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-debugsource-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-devel-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cross-avr-binutils-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.15.0-150600.3.5.2 * cross-ppc64-binutils-debuginfo-2.45-150100.7.57.1 * cross-hppa-binutils-debugsource-2.45-150100.7.57.1 * cross-mips-binutils-2.45-150100.7.57.1 * cross-sparc-binutils-debugsource-2.45-150100.7.57.1 * cross-avr-binutils-debugsource-2.45-150100.7.57.1 * cross-s390-binutils-2.45-150100.7.57.1 * cross-xtensa-binutils-2.45-150100.7.57.1 * cross-xtensa-binutils-debugsource-2.45-150100.7.57.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * cross-i386-binutils-debugsource-2.45-150100.7.57.1 * cross-bpf-binutils-2.45-150100.7.57.1 * cross-rx-binutils-2.45-150100.7.57.1 * cross-epiphany-binutils-debuginfo-2.45-150100.7.57.1 * cross-ppc64-binutils-debugsource-2.45-150100.7.57.1 * libucp0-1.15.0-150600.3.5.2 * cross-i386-binutils-2.45-150100.7.57.1 * cross-xtensa-binutils-debuginfo-2.45-150100.7.57.1 * cross-pru-binutils-debuginfo-2.45-150100.7.57.1 * cross-hppa64-binutils-debugsource-2.45-150100.7.57.1 * binutils-debuginfo-2.45-150100.7.57.1 * cross-sparc-binutils-2.45-150100.7.57.1 * libucs0-1.15.0-150600.3.5.2 * libucs-devel-1.15.0-150600.3.5.2 * libuct0-1.15.0-150600.3.5.2 * cross-i386-binutils-debuginfo-2.45-150100.7.57.1 * cross-mips-binutils-debugsource-2.45-150100.7.57.1 * cross-ppc-binutils-debugsource-2.45-150100.7.57.1 * cross-s390-binutils-debugsource-2.45-150100.7.57.1 * cross-m68k-binutils-debuginfo-2.45-150100.7.57.1 * cross-hppa64-binutils-2.45-150100.7.57.1 * libucm0-debuginfo-1.15.0-150600.3.5.2 * binutils-debugsource-2.45-150100.7.57.1 * cross-s390-binutils-debuginfo-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * cross-riscv64-binutils-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * cross-ppc-binutils-debuginfo-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * cross-hppa-binutils-2.45-150100.7.57.1 * cross-m68k-binutils-debugsource-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libuct0-debuginfo-1.15.0-150600.3.5.2 * cross-sparc64-binutils-2.45-150100.7.57.1 * cross-ppc-binutils-2.45-150100.7.57.1 * cross-spu-binutils-debugsource-2.45-150100.7.57.1 * cross-ia64-binutils-2.45-150100.7.57.1 * libucs0-debuginfo-1.15.0-150600.3.5.2 * cross-rx-binutils-debugsource-2.45-150100.7.57.1 * libucp0-debuginfo-1.15.0-150600.3.5.2 * cross-hppa-binutils-debuginfo-2.45-150100.7.57.1 * cross-spu-binutils-2.45-150100.7.57.1 * cross-epiphany-binutils-2.45-150100.7.57.1 * cross-rx-binutils-debuginfo-2.45-150100.7.57.1 * cross-epiphany-binutils-debugsource-2.45-150100.7.57.1 * cross-pru-binutils-2.45-150100.7.57.1 * cross-arm-binutils-debuginfo-2.45-150100.7.57.1 * cross-arm-binutils-2.45-150100.7.57.1 * cross-bpf-binutils-debuginfo-2.45-150100.7.57.1 * cross-pru-binutils-debugsource-2.45-150100.7.57.1 * cross-sparc64-binutils-debugsource-2.45-150100.7.57.1 * cross-riscv64-binutils-debuginfo-2.45-150100.7.57.1 * cross-m68k-binutils-2.45-150100.7.57.1 * openucx-debugsource-1.15.0-150600.3.5.2 * libucm0-1.15.0-150600.3.5.2 * libucp-devel-1.15.0-150600.3.5.2 * cross-mips-binutils-debuginfo-2.45-150100.7.57.1 * cross-ppc64-binutils-2.45-150100.7.57.1 * cross-riscv64-binutils-debugsource-2.45-150100.7.57.1 * cross-hppa64-binutils-debuginfo-2.45-150100.7.57.1 * cross-sparc-binutils-debuginfo-2.45-150100.7.57.1 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.15.0-150600.3.5.2 * cross-bpf-binutils-debugsource-2.45-150100.7.57.1 * cross-spu-binutils-debuginfo-2.45-150100.7.57.1 * cross-arm-binutils-debugsource-2.45-150100.7.57.1 * cross-ia64-binutils-debuginfo-2.45-150100.7.57.1 * cross-ia64-binutils-debugsource-2.45-150100.7.57.1 * libuct-devel-1.15.0-150600.3.5.2 * cross-avr-binutils-debuginfo-2.45-150100.7.57.1 * cross-sparc64-binutils-debuginfo-2.45-150100.7.57.1 * openucx-tools-1.15.0-150600.3.5.2 * libucm-devel-1.15.0-150600.3.5.2 * openSUSE Leap 15.6 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * cross-aarch64-binutils-debuginfo-2.45-150100.7.57.1 * cross-aarch64-binutils-2.45-150100.7.57.1 * cross-aarch64-binutils-debugsource-2.45-150100.7.57.1 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * cross-ppc64le-binutils-debugsource-2.45-150100.7.57.1 * cross-ppc64le-binutils-2.45-150100.7.57.1 * cross-ppc64le-binutils-debuginfo-2.45-150100.7.57.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * cross-s390x-binutils-debuginfo-2.45-150100.7.57.1 * cross-s390x-binutils-2.45-150100.7.57.1 * cross-s390x-binutils-debugsource-2.45-150100.7.57.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x) * cross-x86_64-binutils-debuginfo-2.45-150100.7.57.1 * cross-x86_64-binutils-2.45-150100.7.57.1 * cross-x86_64-binutils-debugsource-2.45-150100.7.57.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * openucx-tools-debuginfo-1.15.0-150600.3.5.2 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.15.0-150600.3.5.2 * binutils-debuginfo-2.45-150100.7.57.1 * libucs0-1.15.0-150600.3.5.2 * libucs-devel-1.15.0-150600.3.5.2 * libuct0-1.15.0-150600.3.5.2 * libucm0-debuginfo-1.15.0-150600.3.5.2 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libuct0-debuginfo-1.15.0-150600.3.5.2 * libucs0-debuginfo-1.15.0-150600.3.5.2 * libucp0-debuginfo-1.15.0-150600.3.5.2 * libctf0-debuginfo-2.45-150100.7.57.1 * libucm0-1.15.0-150600.3.5.2 * libucp-devel-1.15.0-150600.3.5.2 * openucx-debugsource-1.15.0-150600.3.5.2 * openucx-debuginfo-1.15.0-150600.3.5.2 * libuct-devel-1.15.0-150600.3.5.2 * openucx-tools-1.15.0-150600.3.5.2 * libucm-devel-1.15.0-150600.3.5.2 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libucm-devel-1.17.0-150700.4.2.7 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.17.0-150700.4.2.7 * libuct0-1.17.0-150700.4.2.7 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.17.0-150700.4.2.7 * openucx-tools-debuginfo-1.17.0-150700.4.2.7 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-1.17.0-150700.4.2.7 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libuct-devel-1.17.0-150700.4.2.7 * libucp0-1.17.0-150700.4.2.7 * libucs0-1.17.0-150700.4.2.7 * openucx-debugsource-1.17.0-150700.4.2.7 * libucs-devel-1.17.0-150700.4.2.7 * openucx-debuginfo-1.17.0-150700.4.2.7 * libucp-devel-1.17.0-150700.4.2.7 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.17.0-150700.4.2.7 * openucx-tools-1.17.0-150700.4.2.7 * libucs0-debuginfo-1.17.0-150700.4.2.7 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perf-debuginfo-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-debugsource-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * perf-devel-6.4.0.git33229.a3afe13a7f-150600.3.17.1 * Development Tools Module 15-SP6 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perf-6.4.0.git54263.0aad576b1c-150700.3.2.2 * perf-debuginfo-6.4.0.git54263.0aad576b1c-150700.3.2.2 * perf-debugsource-6.4.0.git54263.0aad576b1c-150700.3.2.2 * perf-devel-6.4.0.git54263.0aad576b1c-150700.3.2.2 * Development Tools Module 15-SP7 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * binutils-debuginfo-2.45-150100.7.57.1 * binutils-debugsource-2.45-150100.7.57.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * binutils-debuginfo-2.45-150100.7.57.1 * binutils-debugsource-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * perf-devel-5.14.21-150400.44.20.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * perf-5.14.21-150400.44.20.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * perf-debugsource-5.14.21-150400.44.20.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * perf-debuginfo-5.14.21-150400.44.20.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openucx-debugsource-1.13.1-150500.4.2.5 * perf-devel-5.14.21-150500.52.5.1 * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-debuginfo-1.13.1-150500.4.2.5 * openucx-tools-1.13.1-150500.4.2.5 * libucs0-1.13.1-150500.4.2.5 * libucm0-1.13.1-150500.4.2.5 * libucm-devel-1.13.1-150500.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debuginfo-1.13.1-150500.4.2.5 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * perf-5.14.21-150500.52.5.1 * binutils-2.45-150100.7.57.1 * libuct0-debuginfo-1.13.1-150500.4.2.5 * binutils-devel-2.45-150100.7.57.1 * perf-debuginfo-5.14.21-150500.52.5.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.13.1-150500.4.2.5 * libucp-devel-1.13.1-150500.4.2.5 * libucs0-debuginfo-1.13.1-150500.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct-devel-1.13.1-150500.4.2.5 * libucp0-1.13.1-150500.4.2.5 * libucs-devel-1.13.1-150500.4.2.5 * libuct0-1.13.1-150500.4.2.5 * libucm0-debuginfo-1.13.1-150500.4.2.5 * perf-debugsource-5.14.21-150500.52.5.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libucp0-1.11.1-150400.4.2.1 * libucm-devel-1.11.1-150400.4.2.1 * libucs0-1.11.1-150400.4.2.1 * binutils-debuginfo-2.45-150100.7.57.1 * libucm0-debuginfo-1.11.1-150400.4.2.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * openucx-debugsource-1.11.1-150400.4.2.1 * libucs0-debuginfo-1.11.1-150400.4.2.1 * libuct-devel-1.11.1-150400.4.2.1 * libuct0-debuginfo-1.11.1-150400.4.2.1 * libucp-devel-1.11.1-150400.4.2.1 * libctf0-debuginfo-2.45-150100.7.57.1 * libuct0-1.11.1-150400.4.2.1 * openucx-tools-debuginfo-1.11.1-150400.4.2.1 * libucs-devel-1.11.1-150400.4.2.1 * libucp0-debuginfo-1.11.1-150400.4.2.1 * libucm0-1.11.1-150400.4.2.1 * openucx-tools-1.11.1-150400.4.2.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libctf-nobfd0-debuginfo-2.45-150100.7.57.1 * libuct0-debuginfo-1.9.0-150300.4.2.5 * libucm-devel-1.9.0-150300.4.2.5 * binutils-debuginfo-2.45-150100.7.57.1 * openucx-debugsource-1.9.0-150300.4.2.5 * libucp0-1.9.0-150300.4.2.5 * libucm0-1.9.0-150300.4.2.5 * libucp0-debuginfo-1.9.0-150300.4.2.5 * perf-5.3.18-150300.38.7.1 * binutils-debugsource-2.45-150100.7.57.1 * libctf0-2.45-150100.7.57.1 * libucm0-debuginfo-1.9.0-150300.4.2.5 * binutils-2.45-150100.7.57.1 * binutils-devel-2.45-150100.7.57.1 * libctf-nobfd0-2.45-150100.7.57.1 * libucs-devel-1.9.0-150300.4.2.5 * openucx-tools-1.9.0-150300.4.2.5 * libuct0-1.9.0-150300.4.2.5 * libctf0-debuginfo-2.45-150100.7.57.1 * openucx-tools-debuginfo-1.9.0-150300.4.2.5 * perf-debugsource-5.3.18-150300.38.7.1 * libucs0-1.9.0-150300.4.2.5 * libucp-devel-1.9.0-150300.4.2.5 * libucs0-debuginfo-1.9.0-150300.4.2.5 * libuct-devel-1.9.0-150300.4.2.5 * perf-debuginfo-5.3.18-150300.38.7.1 * SUSE Enterprise Storage 7.1 (x86_64) * binutils-devel-32bit-2.45-150100.7.57.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0840.html * https://www.suse.com/security/cve/CVE-2025-11083.html * https://www.suse.com/security/cve/CVE-2025-11412.html * https://www.suse.com/security/cve/CVE-2025-11413.html * https://www.suse.com/security/cve/CVE-2025-11414.html * https://www.suse.com/security/cve/CVE-2025-1147.html * https://www.suse.com/security/cve/CVE-2025-1148.html * https://www.suse.com/security/cve/CVE-2025-1149.html * https://www.suse.com/security/cve/CVE-2025-11494.html * https://www.suse.com/security/cve/CVE-2025-11495.html * https://www.suse.com/security/cve/CVE-2025-1150.html * https://www.suse.com/security/cve/CVE-2025-1151.html * https://www.suse.com/security/cve/CVE-2025-1152.html * https://www.suse.com/security/cve/CVE-2025-1153.html * https://www.suse.com/security/cve/CVE-2025-1176.html * https://www.suse.com/security/cve/CVE-2025-1178.html * https://www.suse.com/security/cve/CVE-2025-1179.html * https://www.suse.com/security/cve/CVE-2025-1180.html * https://www.suse.com/security/cve/CVE-2025-1181.html * https://www.suse.com/security/cve/CVE-2025-1182.html * https://www.suse.com/security/cve/CVE-2025-3198.html * https://www.suse.com/security/cve/CVE-2025-5244.html * https://www.suse.com/security/cve/CVE-2025-5245.html * https://www.suse.com/security/cve/CVE-2025-7545.html * https://www.suse.com/security/cve/CVE-2025-7546.html * https://www.suse.com/security/cve/CVE-2025-8224.html * https://www.suse.com/security/cve/CVE-2025-8225.html * https://bugzilla.suse.com/show_bug.cgi?id=1040589 * https://bugzilla.suse.com/show_bug.cgi?id=1236632 * https://bugzilla.suse.com/show_bug.cgi?id=1236976 * https://bugzilla.suse.com/show_bug.cgi?id=1236977 * https://bugzilla.suse.com/show_bug.cgi?id=1236978 * https://bugzilla.suse.com/show_bug.cgi?id=1236999 * https://bugzilla.suse.com/show_bug.cgi?id=1237000 * https://bugzilla.suse.com/show_bug.cgi?id=1237001 * https://bugzilla.suse.com/show_bug.cgi?id=1237003 * https://bugzilla.suse.com/show_bug.cgi?id=1237005 * https://bugzilla.suse.com/show_bug.cgi?id=1237018 * https://bugzilla.suse.com/show_bug.cgi?id=1237019 * https://bugzilla.suse.com/show_bug.cgi?id=1237020 * https://bugzilla.suse.com/show_bug.cgi?id=1237021 * https://bugzilla.suse.com/show_bug.cgi?id=1237042 * https://bugzilla.suse.com/show_bug.cgi?id=1240870 * https://bugzilla.suse.com/show_bug.cgi?id=1241916 * https://bugzilla.suse.com/show_bug.cgi?id=1243756 * https://bugzilla.suse.com/show_bug.cgi?id=1243760 * https://bugzilla.suse.com/show_bug.cgi?id=1246481 * https://bugzilla.suse.com/show_bug.cgi?id=1246486 * https://bugzilla.suse.com/show_bug.cgi?id=1247105 * https://bugzilla.suse.com/show_bug.cgi?id=1247114 * https://bugzilla.suse.com/show_bug.cgi?id=1247117 * https://bugzilla.suse.com/show_bug.cgi?id=1250632 * https://bugzilla.suse.com/show_bug.cgi?id=1251275 * https://bugzilla.suse.com/show_bug.cgi?id=1251276 * https://bugzilla.suse.com/show_bug.cgi?id=1251277 * https://bugzilla.suse.com/show_bug.cgi?id=1251794 * https://bugzilla.suse.com/show_bug.cgi?id=1251795 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 16:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 16:30:08 -0000 Subject: SUSE-SU-2025:4110-1: important: Security update for bind Message-ID: <176313780880.20308.4170195157349728502@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:4110-1 Release Date: 2025-11-14T15:56:28Z Rating: important References: * bsc#1252378 * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 * CVE-2025-8677 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-8677 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-8677 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8677 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-8677: DNSSEC validation fails if matching but invalid DNSKEY is found (bsc#1252378). * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). * CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-4110=1 openSUSE-SLE-15.6-2025-4110=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4110=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4110=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * bind-debugsource-9.18.33-150600.3.18.1 * bind-utils-9.18.33-150600.3.18.1 * bind-debuginfo-9.18.33-150600.3.18.1 * bind-9.18.33-150600.3.18.1 * bind-utils-debuginfo-9.18.33-150600.3.18.1 * openSUSE Leap 15.6 (noarch) * bind-doc-9.18.33-150600.3.18.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bind-utils-9.18.33-150600.3.18.1 * bind-utils-debuginfo-9.18.33-150600.3.18.1 * bind-debugsource-9.18.33-150600.3.18.1 * bind-debuginfo-9.18.33-150600.3.18.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * bind-debugsource-9.18.33-150600.3.18.1 * bind-debuginfo-9.18.33-150600.3.18.1 * bind-9.18.33-150600.3.18.1 * Server Applications Module 15-SP6 (noarch) * bind-doc-9.18.33-150600.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://www.suse.com/security/cve/CVE-2025-8677.html * https://bugzilla.suse.com/show_bug.cgi?id=1252378 * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 16:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 16:30:12 -0000 Subject: SUSE-SU-2025:4109-1: important: Security update for bind Message-ID: <176313781260.20308.10334701003402390231@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:4109-1 Release Date: 2025-11-14T15:56:08Z Rating: important References: * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). * CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4109=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4109=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4109=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4109=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4109=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4109=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4109=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * bind-utils-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * libns1604-9.16.6-150300.22.53.1 * libns1604-debuginfo-9.16.6-150300.22.53.1 * libbind9-1600-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * bind-9.16.6-150300.22.53.1 * bind-chrootenv-9.16.6-150300.22.53.1 * bind-devel-9.16.6-150300.22.53.1 * libisccc1600-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libbind9-1600-9.16.6-150300.22.53.1 * bind-utils-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libisccc1600-debuginfo-9.16.6-150300.22.53.1 * openSUSE Leap 15.3 (noarch) * python3-bind-9.16.6-150300.22.53.1 * bind-doc-9.16.6-150300.22.53.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * bind-utils-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * libns1604-9.16.6-150300.22.53.1 * libns1604-debuginfo-9.16.6-150300.22.53.1 * libbind9-1600-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * bind-9.16.6-150300.22.53.1 * bind-chrootenv-9.16.6-150300.22.53.1 * bind-devel-9.16.6-150300.22.53.1 * libisccc1600-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libbind9-1600-9.16.6-150300.22.53.1 * bind-utils-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libisccc1600-debuginfo-9.16.6-150300.22.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * python3-bind-9.16.6-150300.22.53.1 * bind-doc-9.16.6-150300.22.53.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * bind-utils-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * libns1604-9.16.6-150300.22.53.1 * libns1604-debuginfo-9.16.6-150300.22.53.1 * libbind9-1600-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * bind-9.16.6-150300.22.53.1 * bind-chrootenv-9.16.6-150300.22.53.1 * bind-devel-9.16.6-150300.22.53.1 * libisccc1600-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libbind9-1600-9.16.6-150300.22.53.1 * bind-utils-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libisccc1600-debuginfo-9.16.6-150300.22.53.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * python3-bind-9.16.6-150300.22.53.1 * bind-doc-9.16.6-150300.22.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * bind-utils-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * libns1604-9.16.6-150300.22.53.1 * libns1604-debuginfo-9.16.6-150300.22.53.1 * libbind9-1600-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * bind-9.16.6-150300.22.53.1 * bind-chrootenv-9.16.6-150300.22.53.1 * bind-devel-9.16.6-150300.22.53.1 * libisccc1600-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libbind9-1600-9.16.6-150300.22.53.1 * bind-utils-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libisccc1600-debuginfo-9.16.6-150300.22.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * python3-bind-9.16.6-150300.22.53.1 * bind-doc-9.16.6-150300.22.53.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * libirs1601-debuginfo-9.16.6-150300.22.53.1 * libisc1606-debuginfo-9.16.6-150300.22.53.1 * bind-utils-debuginfo-9.16.6-150300.22.53.1 * libisccfg1600-9.16.6-150300.22.53.1 * libns1604-9.16.6-150300.22.53.1 * libns1604-debuginfo-9.16.6-150300.22.53.1 * libbind9-1600-debuginfo-9.16.6-150300.22.53.1 * libdns1605-9.16.6-150300.22.53.1 * bind-debuginfo-9.16.6-150300.22.53.1 * libdns1605-debuginfo-9.16.6-150300.22.53.1 * libirs-devel-9.16.6-150300.22.53.1 * libisccfg1600-debuginfo-9.16.6-150300.22.53.1 * bind-9.16.6-150300.22.53.1 * bind-chrootenv-9.16.6-150300.22.53.1 * bind-devel-9.16.6-150300.22.53.1 * libisccc1600-9.16.6-150300.22.53.1 * libisc1606-9.16.6-150300.22.53.1 * bind-debugsource-9.16.6-150300.22.53.1 * libbind9-1600-9.16.6-150300.22.53.1 * bind-utils-9.16.6-150300.22.53.1 * libirs1601-9.16.6-150300.22.53.1 * libisccc1600-debuginfo-9.16.6-150300.22.53.1 * SUSE Enterprise Storage 7.1 (noarch) * python3-bind-9.16.6-150300.22.53.1 * bind-doc-9.16.6-150300.22.53.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 16:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 16:30:16 -0000 Subject: SUSE-SU-2025:4108-1: important: Security update for bind Message-ID: <176313781646.20308.3369063054418204204@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:4108-1 Release Date: 2025-11-14T15:55:14Z Rating: important References: * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). * CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-4108=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4108=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4108=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4108=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4108=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4108=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * bind-utils-9.16.50-150500.8.32.1 * bind-debugsource-9.16.50-150500.8.32.1 * bind-9.16.50-150500.8.32.1 * bind-utils-debuginfo-9.16.50-150500.8.32.1 * bind-debuginfo-9.16.50-150500.8.32.1 * openSUSE Leap 15.5 (noarch) * bind-doc-9.16.50-150500.8.32.1 * python3-bind-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * bind-utils-debuginfo-9.16.50-150500.8.32.1 * bind-utils-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * python3-bind-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * bind-debuginfo-9.16.50-150500.8.32.1 * bind-debugsource-9.16.50-150500.8.32.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * bind-utils-9.16.50-150500.8.32.1 * bind-debugsource-9.16.50-150500.8.32.1 * bind-9.16.50-150500.8.32.1 * bind-utils-debuginfo-9.16.50-150500.8.32.1 * bind-debuginfo-9.16.50-150500.8.32.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * bind-doc-9.16.50-150500.8.32.1 * python3-bind-9.16.50-150500.8.32.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * bind-utils-9.16.50-150500.8.32.1 * bind-debugsource-9.16.50-150500.8.32.1 * bind-9.16.50-150500.8.32.1 * bind-utils-debuginfo-9.16.50-150500.8.32.1 * bind-debuginfo-9.16.50-150500.8.32.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * bind-doc-9.16.50-150500.8.32.1 * python3-bind-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * bind-utils-9.16.50-150500.8.32.1 * bind-debugsource-9.16.50-150500.8.32.1 * bind-9.16.50-150500.8.32.1 * bind-utils-debuginfo-9.16.50-150500.8.32.1 * bind-debuginfo-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * bind-doc-9.16.50-150500.8.32.1 * python3-bind-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * bind-utils-9.16.50-150500.8.32.1 * bind-debugsource-9.16.50-150500.8.32.1 * bind-9.16.50-150500.8.32.1 * bind-utils-debuginfo-9.16.50-150500.8.32.1 * bind-debuginfo-9.16.50-150500.8.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * bind-doc-9.16.50-150500.8.32.1 * python3-bind-9.16.50-150500.8.32.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Nov 14 16:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 14 Nov 2025 16:30:20 -0000 Subject: SUSE-SU-2025:4107-1: important: Security update for bind Message-ID: <176313782081.20308.2861147293459871961@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2025:4107-1 Release Date: 2025-11-14T15:54:31Z Rating: important References: * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for bind fixes the following issues: * CVE-2025-40778: Address various spoofing attacks (bsc#1252379). * CVE-2025-40780: Cache-poisoning due to weak pseudo-random number generator (bsc#1252380). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4107=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4107=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4107=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4107=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4107=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4107=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4107=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4107=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * openSUSE Leap 15.4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Manager Proxy 4.3 LTS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * bind-9.16.50-150400.5.56.1 * bind-debuginfo-9.16.50-150400.5.56.1 * bind-utils-debuginfo-9.16.50-150400.5.56.1 * bind-utils-9.16.50-150400.5.56.1 * bind-debugsource-9.16.50-150400.5.56.1 * SUSE Manager Server 4.3 LTS (noarch) * python3-bind-9.16.50-150400.5.56.1 * bind-doc-9.16.50-150400.5.56.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 08:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 17 Nov 2025 08:30:09 -0000 Subject: SUSE-SU-2025:4116-1: moderate: Security update for libxml2 Message-ID: <176336820947.8181.17588817276777458040@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:4116-1 Release Date: 2025-11-17T07:26:18Z Rating: moderate References: * bsc#1247850 * bsc#1249076 Cross-References: * CVE-2025-8732 * CVE-2025-9714 CVSS scores: * CVE-2025-8732 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8732 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8732 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-9714 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-9714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9714 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves two vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2025-9714: Fixed inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c (bsc#1249076) * CVE-2025-8732: Fixed infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247850) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4116=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4116=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4116=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4116=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4116=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-libxml2-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-2.9.14-150400.5.50.1 * python311-libxml2-2.9.14-150400.5.50.1 * python311-libxml2-debuginfo-2.9.14-150400.5.50.1 * libxml2-debugsource-2.9.14-150400.5.50.1 * libxml2-python-debugsource-2.9.14-150400.5.50.1 * libxml2-devel-2.9.14-150400.5.50.1 * libxml2-2-2.9.14-150400.5.50.1 * libxml2-2-debuginfo-2.9.14-150400.5.50.1 * python3-libxml2-2.9.14-150400.5.50.1 * openSUSE Leap 15.4 (x86_64) * libxml2-2-32bit-2.9.14-150400.5.50.1 * libxml2-2-32bit-debuginfo-2.9.14-150400.5.50.1 * libxml2-devel-32bit-2.9.14-150400.5.50.1 * openSUSE Leap 15.4 (noarch) * libxml2-doc-2.9.14-150400.5.50.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libxml2-2-64bit-2.9.14-150400.5.50.1 * libxml2-devel-64bit-2.9.14-150400.5.50.1 * libxml2-2-64bit-debuginfo-2.9.14-150400.5.50.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-2.9.14-150400.5.50.1 * libxml2-debugsource-2.9.14-150400.5.50.1 * libxml2-python-debugsource-2.9.14-150400.5.50.1 * libxml2-2-2.9.14-150400.5.50.1 * libxml2-2-debuginfo-2.9.14-150400.5.50.1 * python3-libxml2-2.9.14-150400.5.50.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-2.9.14-150400.5.50.1 * libxml2-debugsource-2.9.14-150400.5.50.1 * libxml2-python-debugsource-2.9.14-150400.5.50.1 * libxml2-2-2.9.14-150400.5.50.1 * libxml2-2-debuginfo-2.9.14-150400.5.50.1 * python3-libxml2-2.9.14-150400.5.50.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-2.9.14-150400.5.50.1 * libxml2-debugsource-2.9.14-150400.5.50.1 * libxml2-python-debugsource-2.9.14-150400.5.50.1 * libxml2-2-2.9.14-150400.5.50.1 * libxml2-2-debuginfo-2.9.14-150400.5.50.1 * python3-libxml2-2.9.14-150400.5.50.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-libxml2-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-debuginfo-2.9.14-150400.5.50.1 * libxml2-tools-2.9.14-150400.5.50.1 * libxml2-debugsource-2.9.14-150400.5.50.1 * libxml2-python-debugsource-2.9.14-150400.5.50.1 * libxml2-2-2.9.14-150400.5.50.1 * libxml2-2-debuginfo-2.9.14-150400.5.50.1 * python3-libxml2-2.9.14-150400.5.50.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8732.html * https://www.suse.com/security/cve/CVE-2025-9714.html * https://bugzilla.suse.com/show_bug.cgi?id=1247850 * https://bugzilla.suse.com/show_bug.cgi?id=1249076 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 08:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 17 Nov 2025 08:30:14 -0000 Subject: SUSE-SU-2025:4115-1: moderate: Security update for libxml2 Message-ID: <176336821486.8181.14838246748764899601@smelt2.prg2.suse.org> # Security update for libxml2 Announcement ID: SUSE-SU-2025:4115-1 Release Date: 2025-11-17T07:26:06Z Rating: moderate References: * bsc#1247850 * bsc#1249076 Cross-References: * CVE-2025-8732 * CVE-2025-9714 CVSS scores: * CVE-2025-8732 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8732 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8732 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8732 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-9714 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-9714 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9714 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2025-9714: Fixed inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c (bsc#1249076) * CVE-2025-8732: Fixed infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247850) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-4115=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4115=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4115=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-libxml2-python-2.9.7-150000.3.88.1 * python-libxml2-python-debugsource-2.9.7-150000.3.88.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.88.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libxml2-tools-debuginfo-2.9.7-150000.3.88.1 * libxml2-debugsource-2.9.7-150000.3.88.1 * libxml2-2-debuginfo-2.9.7-150000.3.88.1 * python-libxml2-python-debugsource-2.9.7-150000.3.88.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.88.1 * python3-libxml2-python-2.9.7-150000.3.88.1 * libxml2-2-2.9.7-150000.3.88.1 * libxml2-tools-2.9.7-150000.3.88.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libxml2-tools-debuginfo-2.9.7-150000.3.88.1 * libxml2-debugsource-2.9.7-150000.3.88.1 * libxml2-2-debuginfo-2.9.7-150000.3.88.1 * python-libxml2-python-debugsource-2.9.7-150000.3.88.1 * python3-libxml2-python-debuginfo-2.9.7-150000.3.88.1 * python3-libxml2-python-2.9.7-150000.3.88.1 * libxml2-2-2.9.7-150000.3.88.1 * libxml2-tools-2.9.7-150000.3.88.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8732.html * https://www.suse.com/security/cve/CVE-2025-9714.html * https://bugzilla.suse.com/show_bug.cgi?id=1247850 * https://bugzilla.suse.com/show_bug.cgi?id=1249076 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 08:30:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 17 Nov 2025 08:30:22 -0000 Subject: SUSE-SU-2025:4112-1: moderate: Security update for openssh Message-ID: <176336822262.8181.17973263922360451009@smelt2.prg2.suse.org> # Security update for openssh Announcement ID: SUSE-SU-2025:4112-1 Release Date: 2025-11-15T22:39:02Z Rating: moderate References: * bsc#1251198 * bsc#1251199 Cross-References: * CVE-2025-61984 * CVE-2025-61985 CVSS scores: * CVE-2025-61984 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61984 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61984 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-61985 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-61985 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-61985 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for openssh fixes the following issues: * CVE-2025-61984: Fixed code execution via control characters in usernames when a ProxyCommand is used (bsc#1251198) * CVE-2025-61985: Fixed code execution via '\0' character in ssh:// URI when a ProxyCommand is used (bsc#1251199) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4112=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4112=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-4112=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4112=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4112=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-4112=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4112=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4112=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4112=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4112=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-4112=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4112=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4112=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4112=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4112=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4112=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4112=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4112=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4112=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4112=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-cavs-debuginfo-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-cavs-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openssh-askpass-gnome-8.4p1-150300.3.57.1 * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debugsource-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-askpass-gnome-debuginfo-8.4p1-150300.3.57.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * openssh-debugsource-8.4p1-150300.3.57.1 * openssh-helpers-debuginfo-8.4p1-150300.3.57.1 * openssh-debuginfo-8.4p1-150300.3.57.1 * openssh-server-debuginfo-8.4p1-150300.3.57.1 * openssh-common-debuginfo-8.4p1-150300.3.57.1 * openssh-clients-debuginfo-8.4p1-150300.3.57.1 * openssh-fips-8.4p1-150300.3.57.1 * openssh-server-8.4p1-150300.3.57.1 * openssh-clients-8.4p1-150300.3.57.1 * openssh-helpers-8.4p1-150300.3.57.1 * openssh-common-8.4p1-150300.3.57.1 * openssh-8.4p1-150300.3.57.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61984.html * https://www.suse.com/security/cve/CVE-2025-61985.html * https://bugzilla.suse.com/show_bug.cgi?id=1251198 * https://bugzilla.suse.com/show_bug.cgi?id=1251199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 08:33:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 17 Nov 2025 08:33:08 -0000 Subject: SUSE-SU-2025:4111-1: important: Security update for the Linux Kernel Message-ID: <176336838868.8181.6164914896761529147@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:4111-1 Release Date: 2025-11-15T18:39:08Z Rating: important References: * bsc#1065729 * bsc#1205128 * bsc#1206893 * bsc#1207612 * bsc#1207619 * bsc#1210763 * bsc#1211162 * bsc#1211692 * bsc#1213098 * bsc#1213114 * bsc#1213747 * bsc#1214954 * bsc#1214992 * bsc#1215148 * bsc#1217366 * bsc#1236104 * bsc#1249479 * bsc#1249608 * bsc#1249857 * bsc#1249859 * bsc#1249988 * bsc#1250742 * bsc#1250816 * bsc#1250946 * bsc#1251027 * bsc#1251032 * bsc#1251034 * bsc#1251035 * bsc#1251040 * bsc#1251043 * bsc#1251045 * bsc#1251047 * bsc#1251052 * bsc#1251057 * bsc#1251059 * bsc#1251061 * bsc#1251063 * bsc#1251064 * bsc#1251065 * bsc#1251066 * bsc#1251068 * bsc#1251072 * bsc#1251080 * bsc#1251082 * bsc#1251086 * bsc#1251087 * bsc#1251088 * bsc#1251091 * bsc#1251092 * bsc#1251093 * bsc#1251097 * bsc#1251099 * bsc#1251101 * bsc#1251104 * bsc#1251110 * bsc#1251113 * bsc#1251115 * bsc#1251123 * bsc#1251128 * bsc#1251129 * bsc#1251133 * bsc#1251136 * bsc#1251147 * bsc#1251149 * bsc#1251154 * bsc#1251159 * bsc#1251164 * bsc#1251166 * bsc#1251169 * bsc#1251170 * bsc#1251173 * bsc#1251178 * bsc#1251180 * bsc#1251182 * bsc#1251197 * bsc#1251200 * bsc#1251201 * bsc#1251202 * bsc#1251208 * bsc#1251210 * bsc#1251215 * bsc#1251218 * bsc#1251222 * bsc#1251223 * bsc#1251230 * bsc#1251247 * bsc#1251268 * bsc#1251281 * bsc#1251282 * bsc#1251283 * bsc#1251285 * bsc#1251286 * bsc#1251292 * bsc#1251294 * bsc#1251295 * bsc#1251296 * bsc#1251298 * bsc#1251299 * bsc#1251300 * bsc#1251302 * bsc#1251303 * bsc#1251306 * bsc#1251310 * bsc#1251312 * bsc#1251322 * bsc#1251324 * bsc#1251325 * bsc#1251326 * bsc#1251327 * bsc#1251329 * bsc#1251330 * bsc#1251331 * bsc#1251519 * bsc#1251521 * bsc#1251522 * bsc#1251527 * bsc#1251529 * bsc#1251550 * bsc#1251723 * bsc#1251725 * bsc#1251728 * bsc#1251730 * bsc#1251736 * bsc#1251737 * bsc#1251741 * bsc#1251743 * bsc#1251750 * bsc#1251753 * bsc#1251759 * bsc#1251761 * bsc#1251762 * bsc#1251763 * bsc#1251764 * bsc#1251767 * bsc#1251769 * bsc#1251772 * bsc#1251775 * bsc#1251777 * bsc#1251785 * bsc#1251823 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252047 * bsc#1252069 * bsc#1252265 * bsc#1252474 * bsc#1252475 * bsc#1252476 * bsc#1252480 * bsc#1252484 * bsc#1252486 * bsc#1252489 * bsc#1252490 * bsc#1252492 * bsc#1252495 * bsc#1252497 * bsc#1252499 * bsc#1252501 * bsc#1252508 * bsc#1252509 * bsc#1252513 * bsc#1252515 * bsc#1252516 * bsc#1252519 * bsc#1252521 * bsc#1252522 * bsc#1252523 * bsc#1252526 * bsc#1252528 * bsc#1252529 * bsc#1252532 * bsc#1252535 * bsc#1252536 * bsc#1252537 * bsc#1252538 * bsc#1252539 * bsc#1252542 * bsc#1252545 * bsc#1252549 * bsc#1252554 * bsc#1252560 * bsc#1252564 * bsc#1252565 * bsc#1252568 * bsc#1252634 * bsc#1252688 * bsc#1252785 * bsc#1252893 * bsc#1252904 * bsc#1252919 * jsc#PED-4593 * jsc#PED-568 Cross-References: * CVE-2022-43945 * CVE-2022-50327 * CVE-2022-50334 * CVE-2022-50470 * CVE-2022-50471 * CVE-2022-50472 * CVE-2022-50475 * CVE-2022-50478 * CVE-2022-50480 * CVE-2022-50482 * CVE-2022-50484 * CVE-2022-50485 * CVE-2022-50487 * CVE-2022-50488 * CVE-2022-50489 * CVE-2022-50490 * CVE-2022-50492 * CVE-2022-50493 * CVE-2022-50494 * CVE-2022-50496 * CVE-2022-50497 * CVE-2022-50498 * CVE-2022-50499 * CVE-2022-50501 * CVE-2022-50503 * CVE-2022-50504 * CVE-2022-50505 * CVE-2022-50509 * CVE-2022-50511 * CVE-2022-50512 * CVE-2022-50513 * CVE-2022-50514 * CVE-2022-50516 * CVE-2022-50519 * CVE-2022-50520 * CVE-2022-50521 * CVE-2022-50523 * CVE-2022-50525 * CVE-2022-50528 * CVE-2022-50529 * CVE-2022-50530 * CVE-2022-50532 * CVE-2022-50534 * CVE-2022-50535 * CVE-2022-50537 * CVE-2022-50541 * CVE-2022-50542 * CVE-2022-50544 * CVE-2022-50545 * CVE-2022-50546 * CVE-2022-50549 * CVE-2022-50551 * CVE-2022-50553 * CVE-2022-50556 * CVE-2022-50559 * CVE-2022-50560 * CVE-2022-50561 * CVE-2022-50562 * CVE-2022-50563 * CVE-2022-50564 * CVE-2022-50566 * CVE-2022-50567 * CVE-2022-50568 * CVE-2022-50570 * CVE-2022-50572 * CVE-2022-50574 * CVE-2022-50575 * CVE-2022-50576 * CVE-2022-50578 * CVE-2022-50579 * CVE-2022-50580 * CVE-2022-50581 * CVE-2022-50582 * CVE-2023-52923 * CVE-2023-53365 * CVE-2023-53500 * CVE-2023-53533 * CVE-2023-53534 * CVE-2023-53541 * CVE-2023-53542 * CVE-2023-53548 * CVE-2023-53551 * CVE-2023-53552 * CVE-2023-53553 * CVE-2023-53554 * CVE-2023-53556 * CVE-2023-53559 * CVE-2023-53560 * CVE-2023-53564 * CVE-2023-53566 * CVE-2023-53567 * CVE-2023-53568 * CVE-2023-53571 * CVE-2023-53572 * CVE-2023-53574 * CVE-2023-53576 * CVE-2023-53579 * CVE-2023-53582 * CVE-2023-53587 * CVE-2023-53589 * CVE-2023-53592 * CVE-2023-53594 * CVE-2023-53597 * CVE-2023-53603 * CVE-2023-53604 * CVE-2023-53605 * CVE-2023-53607 * CVE-2023-53608 * CVE-2023-53611 * CVE-2023-53612 * CVE-2023-53615 * CVE-2023-53616 * CVE-2023-53617 * CVE-2023-53619 * CVE-2023-53622 * CVE-2023-53625 * CVE-2023-53626 * CVE-2023-53631 * CVE-2023-53637 * CVE-2023-53639 * CVE-2023-53640 * CVE-2023-53641 * CVE-2023-53644 * CVE-2023-53648 * CVE-2023-53650 * CVE-2023-53651 * CVE-2023-53658 * CVE-2023-53659 * CVE-2023-53662 * CVE-2023-53667 * CVE-2023-53668 * CVE-2023-53670 * CVE-2023-53673 * CVE-2023-53674 * CVE-2023-53675 * CVE-2023-53679 * CVE-2023-53680 * CVE-2023-53681 * CVE-2023-53683 * CVE-2023-53687 * CVE-2023-53692 * CVE-2023-53693 * CVE-2023-53695 * CVE-2023-53696 * CVE-2023-53700 * CVE-2023-53704 * CVE-2023-53705 * CVE-2023-53708 * CVE-2023-53709 * CVE-2023-53711 * CVE-2023-53715 * CVE-2023-53717 * CVE-2023-53718 * CVE-2023-53719 * CVE-2023-53722 * CVE-2023-53723 * CVE-2023-53724 * CVE-2023-53725 * CVE-2023-53726 * CVE-2023-53730 * CVE-2023-7324 * CVE-2025-39742 * CVE-2025-39797 * CVE-2025-39945 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-40018 * CVE-2025-40044 * CVE-2025-40088 * CVE-2025-40102 CVSS scores: * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50334 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50334 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50470 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50470 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50471 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50475 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50478 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50480 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50482 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50482 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50485 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50485 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50487 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50487 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50488 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50489 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50492 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50492 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50493 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50493 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50494 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50496 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50496 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50497 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50498 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50498 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50499 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50499 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50512 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50513 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50513 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50519 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50519 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-50520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50528 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50541 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-50541 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-50542 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50542 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50556 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50560 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50561 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50561 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50563 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50563 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50564 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50566 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50566 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50567 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50567 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50570 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50570 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-50572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50575 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-50575 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-50576 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50576 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50578 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50579 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50579 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50580 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50580 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50581 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50582 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50582 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53541 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53564 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53571 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53576 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53576 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53587 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53587 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53589 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L * CVE-2023-53592 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53592 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53604 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53604 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53605 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53605 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53608 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53608 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53612 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53612 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53616 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53616 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53619 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53622 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53622 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53625 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53626 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53626 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53637 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53639 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53639 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53640 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53640 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53641 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53644 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53650 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53651 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53651 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53659 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53662 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53667 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53667 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53668 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53670 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53670 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53673 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53674 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53674 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53680 ( SUSE ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53680 ( SUSE ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53681 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53681 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53683 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53683 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53687 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53687 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53695 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53695 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-53696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53704 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53704 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53705 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53705 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2023-53708 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53711 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53711 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53715 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53718 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53718 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53719 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53719 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53722 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53723 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53723 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53724 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53724 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53725 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53725 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53730 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7324 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-7324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40088 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40088 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves 173 vulnerabilities, contains two features and has 19 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859). * CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164). * CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741). * CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988). * CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816). * CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052). * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222). * CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743). * CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763). * CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554). * CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033). * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). * CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069). * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). * CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785). * CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). The following non security issues were fixed: * fbcon: Fix OOB access in font allocation (bsc#1252033) * mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823). * net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-4111=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-4111=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-4111=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-4111=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4111=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4111=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4111=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4111=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4111=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-4111=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4111=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4111=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (noarch) * kernel-docs-html-5.14.21-150400.24.184.1 * kernel-source-vanilla-5.14.21-150400.24.184.1 * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.184.1 * kernel-kvmsmall-devel-5.14.21-150400.24.184.1 * kernel-default-base-rebuild-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-kvmsmall-debugsource-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.184.1 * cluster-md-kmp-default-5.14.21-150400.24.184.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-livepatch-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * ocfs2-kmp-default-5.14.21-150400.24.184.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-extra-5.14.21-150400.24.184.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-optional-5.14.21-150400.24.184.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-qa-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kselftests-kmp-default-5.14.21-150400.24.184.1 * gfs2-kmp-default-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1 * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1 * kernel-default-livepatch-devel-5.14.21-150400.24.184.1 * kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64) * dtb-freescale-5.14.21-150400.24.184.1 * kernel-64kb-extra-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * dtb-lg-5.14.21-150400.24.184.1 * dtb-socionext-5.14.21-150400.24.184.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.184.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * ocfs2-kmp-64kb-5.14.21-150400.24.184.1 * dtb-exynos-5.14.21-150400.24.184.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-64kb-5.14.21-150400.24.184.1 * dtb-broadcom-5.14.21-150400.24.184.1 * dtb-arm-5.14.21-150400.24.184.1 * dtb-rockchip-5.14.21-150400.24.184.1 * dtb-mediatek-5.14.21-150400.24.184.1 * dtb-hisilicon-5.14.21-150400.24.184.1 * dtb-amazon-5.14.21-150400.24.184.1 * dtb-xilinx-5.14.21-150400.24.184.1 * dtb-marvell-5.14.21-150400.24.184.1 * cluster-md-kmp-64kb-5.14.21-150400.24.184.1 * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-optional-5.14.21-150400.24.184.1 * dtb-apple-5.14.21-150400.24.184.1 * dtb-cavium-5.14.21-150400.24.184.1 * kselftests-kmp-64kb-5.14.21-150400.24.184.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.184.1 * dlm-kmp-64kb-5.14.21-150400.24.184.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * dtb-sprd-5.14.21-150400.24.184.1 * dtb-allwinner-5.14.21-150400.24.184.1 * reiserfs-kmp-64kb-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * dtb-altera-5.14.21-150400.24.184.1 * dtb-amlogic-5.14.21-150400.24.184.1 * dtb-qcom-5.14.21-150400.24.184.1 * dtb-renesas-5.14.21-150400.24.184.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.184.1 * dtb-nvidia-5.14.21-150400.24.184.1 * dtb-amd-5.14.21-150400.24.184.1 * dtb-apm-5.14.21-150400.24.184.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-5.14.21-150400.24.184.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * cluster-md-kmp-default-5.14.21-150400.24.184.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-default-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.184.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.184.1 * ocfs2-kmp-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.184.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-debuginfo-5.14.21-150400.24.184.1 * kernel-64kb-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.184.1 * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * reiserfs-kmp-default-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-obs-build-debugsource-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-obs-build-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.184.1 * SUSE Manager Proxy 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Manager Proxy 4.3 LTS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Manager Retail Branch Server 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.184.1.150400.24.94.2 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.184.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.184.1 * kernel-default-devel-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (noarch) * kernel-devel-5.14.21-150400.24.184.1 * kernel-macros-5.14.21-150400.24.184.1 * kernel-source-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.184.1 * SUSE Manager Server 4.3 LTS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.184.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.184.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-1-150400.9.5.1 * kernel-livepatch-SLE15-SP4_Update_46-debugsource-1-150400.9.5.1 * kernel-default-debugsource-5.14.21-150400.24.184.1 * kernel-default-debuginfo-5.14.21-150400.24.184.1 * kernel-livepatch-5_14_21-150400_24_184-default-1-150400.9.5.1 * kernel-default-livepatch-5.14.21-150400.24.184.1 * kernel-default-livepatch-devel-5.14.21-150400.24.184.1 ## References: * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50334.html * https://www.suse.com/security/cve/CVE-2022-50470.html * https://www.suse.com/security/cve/CVE-2022-50471.html * https://www.suse.com/security/cve/CVE-2022-50472.html * https://www.suse.com/security/cve/CVE-2022-50475.html * https://www.suse.com/security/cve/CVE-2022-50478.html * https://www.suse.com/security/cve/CVE-2022-50480.html * https://www.suse.com/security/cve/CVE-2022-50482.html * https://www.suse.com/security/cve/CVE-2022-50484.html * https://www.suse.com/security/cve/CVE-2022-50485.html * https://www.suse.com/security/cve/CVE-2022-50487.html * https://www.suse.com/security/cve/CVE-2022-50488.html * https://www.suse.com/security/cve/CVE-2022-50489.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2022-50492.html * https://www.suse.com/security/cve/CVE-2022-50493.html * https://www.suse.com/security/cve/CVE-2022-50494.html * https://www.suse.com/security/cve/CVE-2022-50496.html * https://www.suse.com/security/cve/CVE-2022-50497.html * https://www.suse.com/security/cve/CVE-2022-50498.html * https://www.suse.com/security/cve/CVE-2022-50499.html * https://www.suse.com/security/cve/CVE-2022-50501.html * https://www.suse.com/security/cve/CVE-2022-50503.html * https://www.suse.com/security/cve/CVE-2022-50504.html * https://www.suse.com/security/cve/CVE-2022-50505.html * https://www.suse.com/security/cve/CVE-2022-50509.html * https://www.suse.com/security/cve/CVE-2022-50511.html * https://www.suse.com/security/cve/CVE-2022-50512.html * https://www.suse.com/security/cve/CVE-2022-50513.html * https://www.suse.com/security/cve/CVE-2022-50514.html * https://www.suse.com/security/cve/CVE-2022-50516.html * https://www.suse.com/security/cve/CVE-2022-50519.html * https://www.suse.com/security/cve/CVE-2022-50520.html * https://www.suse.com/security/cve/CVE-2022-50521.html * https://www.suse.com/security/cve/CVE-2022-50523.html * https://www.suse.com/security/cve/CVE-2022-50525.html * https://www.suse.com/security/cve/CVE-2022-50528.html * https://www.suse.com/security/cve/CVE-2022-50529.html * https://www.suse.com/security/cve/CVE-2022-50530.html * https://www.suse.com/security/cve/CVE-2022-50532.html * https://www.suse.com/security/cve/CVE-2022-50534.html * https://www.suse.com/security/cve/CVE-2022-50535.html * https://www.suse.com/security/cve/CVE-2022-50537.html * https://www.suse.com/security/cve/CVE-2022-50541.html * https://www.suse.com/security/cve/CVE-2022-50542.html * https://www.suse.com/security/cve/CVE-2022-50544.html * https://www.suse.com/security/cve/CVE-2022-50545.html * https://www.suse.com/security/cve/CVE-2022-50546.html * https://www.suse.com/security/cve/CVE-2022-50549.html * https://www.suse.com/security/cve/CVE-2022-50551.html * https://www.suse.com/security/cve/CVE-2022-50553.html * https://www.suse.com/security/cve/CVE-2022-50556.html * https://www.suse.com/security/cve/CVE-2022-50559.html * https://www.suse.com/security/cve/CVE-2022-50560.html * https://www.suse.com/security/cve/CVE-2022-50561.html * https://www.suse.com/security/cve/CVE-2022-50562.html * https://www.suse.com/security/cve/CVE-2022-50563.html * https://www.suse.com/security/cve/CVE-2022-50564.html * https://www.suse.com/security/cve/CVE-2022-50566.html * https://www.suse.com/security/cve/CVE-2022-50567.html * https://www.suse.com/security/cve/CVE-2022-50568.html * https://www.suse.com/security/cve/CVE-2022-50570.html * https://www.suse.com/security/cve/CVE-2022-50572.html * https://www.suse.com/security/cve/CVE-2022-50574.html * https://www.suse.com/security/cve/CVE-2022-50575.html * https://www.suse.com/security/cve/CVE-2022-50576.html * https://www.suse.com/security/cve/CVE-2022-50578.html * https://www.suse.com/security/cve/CVE-2022-50579.html * https://www.suse.com/security/cve/CVE-2022-50580.html * https://www.suse.com/security/cve/CVE-2022-50581.html * https://www.suse.com/security/cve/CVE-2022-50582.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53500.html * https://www.suse.com/security/cve/CVE-2023-53533.html * https://www.suse.com/security/cve/CVE-2023-53534.html * https://www.suse.com/security/cve/CVE-2023-53541.html * https://www.suse.com/security/cve/CVE-2023-53542.html * https://www.suse.com/security/cve/CVE-2023-53548.html * https://www.suse.com/security/cve/CVE-2023-53551.html * https://www.suse.com/security/cve/CVE-2023-53552.html * https://www.suse.com/security/cve/CVE-2023-53553.html * https://www.suse.com/security/cve/CVE-2023-53554.html * https://www.suse.com/security/cve/CVE-2023-53556.html * https://www.suse.com/security/cve/CVE-2023-53559.html * https://www.suse.com/security/cve/CVE-2023-53560.html * https://www.suse.com/security/cve/CVE-2023-53564.html * https://www.suse.com/security/cve/CVE-2023-53566.html * https://www.suse.com/security/cve/CVE-2023-53567.html * https://www.suse.com/security/cve/CVE-2023-53568.html * https://www.suse.com/security/cve/CVE-2023-53571.html * https://www.suse.com/security/cve/CVE-2023-53572.html * https://www.suse.com/security/cve/CVE-2023-53574.html * https://www.suse.com/security/cve/CVE-2023-53576.html * https://www.suse.com/security/cve/CVE-2023-53579.html * https://www.suse.com/security/cve/CVE-2023-53582.html * https://www.suse.com/security/cve/CVE-2023-53587.html * https://www.suse.com/security/cve/CVE-2023-53589.html * https://www.suse.com/security/cve/CVE-2023-53592.html * https://www.suse.com/security/cve/CVE-2023-53594.html * https://www.suse.com/security/cve/CVE-2023-53597.html * https://www.suse.com/security/cve/CVE-2023-53603.html * https://www.suse.com/security/cve/CVE-2023-53604.html * https://www.suse.com/security/cve/CVE-2023-53605.html * https://www.suse.com/security/cve/CVE-2023-53607.html * https://www.suse.com/security/cve/CVE-2023-53608.html * https://www.suse.com/security/cve/CVE-2023-53611.html * https://www.suse.com/security/cve/CVE-2023-53612.html * https://www.suse.com/security/cve/CVE-2023-53615.html * https://www.suse.com/security/cve/CVE-2023-53616.html * https://www.suse.com/security/cve/CVE-2023-53617.html * https://www.suse.com/security/cve/CVE-2023-53619.html * https://www.suse.com/security/cve/CVE-2023-53622.html * https://www.suse.com/security/cve/CVE-2023-53625.html * https://www.suse.com/security/cve/CVE-2023-53626.html * https://www.suse.com/security/cve/CVE-2023-53631.html * https://www.suse.com/security/cve/CVE-2023-53637.html * https://www.suse.com/security/cve/CVE-2023-53639.html * https://www.suse.com/security/cve/CVE-2023-53640.html * https://www.suse.com/security/cve/CVE-2023-53641.html * https://www.suse.com/security/cve/CVE-2023-53644.html * https://www.suse.com/security/cve/CVE-2023-53648.html * https://www.suse.com/security/cve/CVE-2023-53650.html * https://www.suse.com/security/cve/CVE-2023-53651.html * https://www.suse.com/security/cve/CVE-2023-53658.html * https://www.suse.com/security/cve/CVE-2023-53659.html * https://www.suse.com/security/cve/CVE-2023-53662.html * https://www.suse.com/security/cve/CVE-2023-53667.html * https://www.suse.com/security/cve/CVE-2023-53668.html * https://www.suse.com/security/cve/CVE-2023-53670.html * https://www.suse.com/security/cve/CVE-2023-53673.html * https://www.suse.com/security/cve/CVE-2023-53674.html * https://www.suse.com/security/cve/CVE-2023-53675.html * https://www.suse.com/security/cve/CVE-2023-53679.html * https://www.suse.com/security/cve/CVE-2023-53680.html * https://www.suse.com/security/cve/CVE-2023-53681.html * https://www.suse.com/security/cve/CVE-2023-53683.html * https://www.suse.com/security/cve/CVE-2023-53687.html * https://www.suse.com/security/cve/CVE-2023-53692.html * https://www.suse.com/security/cve/CVE-2023-53693.html * https://www.suse.com/security/cve/CVE-2023-53695.html * https://www.suse.com/security/cve/CVE-2023-53696.html * https://www.suse.com/security/cve/CVE-2023-53700.html * https://www.suse.com/security/cve/CVE-2023-53704.html * https://www.suse.com/security/cve/CVE-2023-53705.html * https://www.suse.com/security/cve/CVE-2023-53708.html * https://www.suse.com/security/cve/CVE-2023-53709.html * https://www.suse.com/security/cve/CVE-2023-53711.html * https://www.suse.com/security/cve/CVE-2023-53715.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2023-53718.html * https://www.suse.com/security/cve/CVE-2023-53719.html * https://www.suse.com/security/cve/CVE-2023-53722.html * https://www.suse.com/security/cve/CVE-2023-53723.html * https://www.suse.com/security/cve/CVE-2023-53724.html * https://www.suse.com/security/cve/CVE-2023-53725.html * https://www.suse.com/security/cve/CVE-2023-53726.html * https://www.suse.com/security/cve/CVE-2023-53730.html * https://www.suse.com/security/cve/CVE-2023-7324.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://www.suse.com/security/cve/CVE-2025-40088.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206893 * https://bugzilla.suse.com/show_bug.cgi?id=1207612 * https://bugzilla.suse.com/show_bug.cgi?id=1207619 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1211162 * https://bugzilla.suse.com/show_bug.cgi?id=1211692 * https://bugzilla.suse.com/show_bug.cgi?id=1213098 * https://bugzilla.suse.com/show_bug.cgi?id=1213114 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1214954 * https://bugzilla.suse.com/show_bug.cgi?id=1214992 * https://bugzilla.suse.com/show_bug.cgi?id=1215148 * https://bugzilla.suse.com/show_bug.cgi?id=1217366 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249857 * https://bugzilla.suse.com/show_bug.cgi?id=1249859 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250816 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1251027 * https://bugzilla.suse.com/show_bug.cgi?id=1251032 * https://bugzilla.suse.com/show_bug.cgi?id=1251034 * https://bugzilla.suse.com/show_bug.cgi?id=1251035 * https://bugzilla.suse.com/show_bug.cgi?id=1251040 * https://bugzilla.suse.com/show_bug.cgi?id=1251043 * https://bugzilla.suse.com/show_bug.cgi?id=1251045 * https://bugzilla.suse.com/show_bug.cgi?id=1251047 * https://bugzilla.suse.com/show_bug.cgi?id=1251052 * https://bugzilla.suse.com/show_bug.cgi?id=1251057 * https://bugzilla.suse.com/show_bug.cgi?id=1251059 * https://bugzilla.suse.com/show_bug.cgi?id=1251061 * https://bugzilla.suse.com/show_bug.cgi?id=1251063 * https://bugzilla.suse.com/show_bug.cgi?id=1251064 * https://bugzilla.suse.com/show_bug.cgi?id=1251065 * https://bugzilla.suse.com/show_bug.cgi?id=1251066 * https://bugzilla.suse.com/show_bug.cgi?id=1251068 * https://bugzilla.suse.com/show_bug.cgi?id=1251072 * https://bugzilla.suse.com/show_bug.cgi?id=1251080 * https://bugzilla.suse.com/show_bug.cgi?id=1251082 * https://bugzilla.suse.com/show_bug.cgi?id=1251086 * https://bugzilla.suse.com/show_bug.cgi?id=1251087 * https://bugzilla.suse.com/show_bug.cgi?id=1251088 * https://bugzilla.suse.com/show_bug.cgi?id=1251091 * https://bugzilla.suse.com/show_bug.cgi?id=1251092 * https://bugzilla.suse.com/show_bug.cgi?id=1251093 * https://bugzilla.suse.com/show_bug.cgi?id=1251097 * https://bugzilla.suse.com/show_bug.cgi?id=1251099 * https://bugzilla.suse.com/show_bug.cgi?id=1251101 * https://bugzilla.suse.com/show_bug.cgi?id=1251104 * https://bugzilla.suse.com/show_bug.cgi?id=1251110 * https://bugzilla.suse.com/show_bug.cgi?id=1251113 * https://bugzilla.suse.com/show_bug.cgi?id=1251115 * https://bugzilla.suse.com/show_bug.cgi?id=1251123 * https://bugzilla.suse.com/show_bug.cgi?id=1251128 * https://bugzilla.suse.com/show_bug.cgi?id=1251129 * https://bugzilla.suse.com/show_bug.cgi?id=1251133 * https://bugzilla.suse.com/show_bug.cgi?id=1251136 * https://bugzilla.suse.com/show_bug.cgi?id=1251147 * https://bugzilla.suse.com/show_bug.cgi?id=1251149 * https://bugzilla.suse.com/show_bug.cgi?id=1251154 * https://bugzilla.suse.com/show_bug.cgi?id=1251159 * https://bugzilla.suse.com/show_bug.cgi?id=1251164 * https://bugzilla.suse.com/show_bug.cgi?id=1251166 * https://bugzilla.suse.com/show_bug.cgi?id=1251169 * https://bugzilla.suse.com/show_bug.cgi?id=1251170 * https://bugzilla.suse.com/show_bug.cgi?id=1251173 * https://bugzilla.suse.com/show_bug.cgi?id=1251178 * https://bugzilla.suse.com/show_bug.cgi?id=1251180 * https://bugzilla.suse.com/show_bug.cgi?id=1251182 * https://bugzilla.suse.com/show_bug.cgi?id=1251197 * https://bugzilla.suse.com/show_bug.cgi?id=1251200 * https://bugzilla.suse.com/show_bug.cgi?id=1251201 * https://bugzilla.suse.com/show_bug.cgi?id=1251202 * https://bugzilla.suse.com/show_bug.cgi?id=1251208 * https://bugzilla.suse.com/show_bug.cgi?id=1251210 * https://bugzilla.suse.com/show_bug.cgi?id=1251215 * https://bugzilla.suse.com/show_bug.cgi?id=1251218 * https://bugzilla.suse.com/show_bug.cgi?id=1251222 * https://bugzilla.suse.com/show_bug.cgi?id=1251223 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251247 * https://bugzilla.suse.com/show_bug.cgi?id=1251268 * https://bugzilla.suse.com/show_bug.cgi?id=1251281 * https://bugzilla.suse.com/show_bug.cgi?id=1251282 * https://bugzilla.suse.com/show_bug.cgi?id=1251283 * https://bugzilla.suse.com/show_bug.cgi?id=1251285 * https://bugzilla.suse.com/show_bug.cgi?id=1251286 * https://bugzilla.suse.com/show_bug.cgi?id=1251292 * https://bugzilla.suse.com/show_bug.cgi?id=1251294 * https://bugzilla.suse.com/show_bug.cgi?id=1251295 * https://bugzilla.suse.com/show_bug.cgi?id=1251296 * https://bugzilla.suse.com/show_bug.cgi?id=1251298 * https://bugzilla.suse.com/show_bug.cgi?id=1251299 * https://bugzilla.suse.com/show_bug.cgi?id=1251300 * https://bugzilla.suse.com/show_bug.cgi?id=1251302 * https://bugzilla.suse.com/show_bug.cgi?id=1251303 * https://bugzilla.suse.com/show_bug.cgi?id=1251306 * https://bugzilla.suse.com/show_bug.cgi?id=1251310 * https://bugzilla.suse.com/show_bug.cgi?id=1251312 * https://bugzilla.suse.com/show_bug.cgi?id=1251322 * https://bugzilla.suse.com/show_bug.cgi?id=1251324 * https://bugzilla.suse.com/show_bug.cgi?id=1251325 * https://bugzilla.suse.com/show_bug.cgi?id=1251326 * https://bugzilla.suse.com/show_bug.cgi?id=1251327 * https://bugzilla.suse.com/show_bug.cgi?id=1251329 * https://bugzilla.suse.com/show_bug.cgi?id=1251330 * https://bugzilla.suse.com/show_bug.cgi?id=1251331 * https://bugzilla.suse.com/show_bug.cgi?id=1251519 * https://bugzilla.suse.com/show_bug.cgi?id=1251521 * https://bugzilla.suse.com/show_bug.cgi?id=1251522 * https://bugzilla.suse.com/show_bug.cgi?id=1251527 * https://bugzilla.suse.com/show_bug.cgi?id=1251529 * https://bugzilla.suse.com/show_bug.cgi?id=1251550 * https://bugzilla.suse.com/show_bug.cgi?id=1251723 * https://bugzilla.suse.com/show_bug.cgi?id=1251725 * https://bugzilla.suse.com/show_bug.cgi?id=1251728 * https://bugzilla.suse.com/show_bug.cgi?id=1251730 * https://bugzilla.suse.com/show_bug.cgi?id=1251736 * https://bugzilla.suse.com/show_bug.cgi?id=1251737 * https://bugzilla.suse.com/show_bug.cgi?id=1251741 * https://bugzilla.suse.com/show_bug.cgi?id=1251743 * https://bugzilla.suse.com/show_bug.cgi?id=1251750 * https://bugzilla.suse.com/show_bug.cgi?id=1251753 * https://bugzilla.suse.com/show_bug.cgi?id=1251759 * https://bugzilla.suse.com/show_bug.cgi?id=1251761 * https://bugzilla.suse.com/show_bug.cgi?id=1251762 * https://bugzilla.suse.com/show_bug.cgi?id=1251763 * https://bugzilla.suse.com/show_bug.cgi?id=1251764 * https://bugzilla.suse.com/show_bug.cgi?id=1251767 * https://bugzilla.suse.com/show_bug.cgi?id=1251769 * https://bugzilla.suse.com/show_bug.cgi?id=1251772 * https://bugzilla.suse.com/show_bug.cgi?id=1251775 * https://bugzilla.suse.com/show_bug.cgi?id=1251777 * https://bugzilla.suse.com/show_bug.cgi?id=1251785 * https://bugzilla.suse.com/show_bug.cgi?id=1251823 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252474 * https://bugzilla.suse.com/show_bug.cgi?id=1252475 * https://bugzilla.suse.com/show_bug.cgi?id=1252476 * https://bugzilla.suse.com/show_bug.cgi?id=1252480 * https://bugzilla.suse.com/show_bug.cgi?id=1252484 * https://bugzilla.suse.com/show_bug.cgi?id=1252486 * https://bugzilla.suse.com/show_bug.cgi?id=1252489 * https://bugzilla.suse.com/show_bug.cgi?id=1252490 * https://bugzilla.suse.com/show_bug.cgi?id=1252492 * https://bugzilla.suse.com/show_bug.cgi?id=1252495 * https://bugzilla.suse.com/show_bug.cgi?id=1252497 * https://bugzilla.suse.com/show_bug.cgi?id=1252499 * https://bugzilla.suse.com/show_bug.cgi?id=1252501 * https://bugzilla.suse.com/show_bug.cgi?id=1252508 * https://bugzilla.suse.com/show_bug.cgi?id=1252509 * https://bugzilla.suse.com/show_bug.cgi?id=1252513 * https://bugzilla.suse.com/show_bug.cgi?id=1252515 * https://bugzilla.suse.com/show_bug.cgi?id=1252516 * https://bugzilla.suse.com/show_bug.cgi?id=1252519 * https://bugzilla.suse.com/show_bug.cgi?id=1252521 * https://bugzilla.suse.com/show_bug.cgi?id=1252522 * https://bugzilla.suse.com/show_bug.cgi?id=1252523 * https://bugzilla.suse.com/show_bug.cgi?id=1252526 * https://bugzilla.suse.com/show_bug.cgi?id=1252528 * https://bugzilla.suse.com/show_bug.cgi?id=1252529 * https://bugzilla.suse.com/show_bug.cgi?id=1252532 * https://bugzilla.suse.com/show_bug.cgi?id=1252535 * https://bugzilla.suse.com/show_bug.cgi?id=1252536 * https://bugzilla.suse.com/show_bug.cgi?id=1252537 * https://bugzilla.suse.com/show_bug.cgi?id=1252538 * https://bugzilla.suse.com/show_bug.cgi?id=1252539 * https://bugzilla.suse.com/show_bug.cgi?id=1252542 * https://bugzilla.suse.com/show_bug.cgi?id=1252545 * https://bugzilla.suse.com/show_bug.cgi?id=1252549 * https://bugzilla.suse.com/show_bug.cgi?id=1252554 * https://bugzilla.suse.com/show_bug.cgi?id=1252560 * https://bugzilla.suse.com/show_bug.cgi?id=1252564 * https://bugzilla.suse.com/show_bug.cgi?id=1252565 * https://bugzilla.suse.com/show_bug.cgi?id=1252568 * https://bugzilla.suse.com/show_bug.cgi?id=1252634 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252893 * https://bugzilla.suse.com/show_bug.cgi?id=1252904 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Nov 17 16:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 17 Nov 2025 16:30:08 -0000 Subject: SUSE-SU-2025:4121-1: moderate: Security update for alloy Message-ID: <176339700808.20159.7431662302266227813@smelt2.prg2.suse.org> # Security update for alloy Announcement ID: SUSE-SU-2025:4121-1 Release Date: 2025-11-17T12:10:11Z Rating: moderate References: * bsc#1248960 * bsc#1250621 Cross-References: * CVE-2025-11065 * CVE-2025-58058 CVSS scores: * CVE-2025-11065 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-11065 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2025-58058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58058 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for alloy fixes the following issues: * update to 1.11.3: * CVE-2025-58058: Fixed memory leaks in xz. (bsc#1248960) * CVE-2025-11065: Fixed sensitive Information leak in logs. (bsc#1250621) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4121=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * alloy-1.11.3-150700.15.9.1 * alloy-debuginfo-1.11.3-150700.15.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11065.html * https://www.suse.com/security/cve/CVE-2025-58058.html * https://bugzilla.suse.com/show_bug.cgi?id=1248960 * https://bugzilla.suse.com/show_bug.cgi?id=1250621 -------------- next part -------------- An HTML attachment was scrubbed... URL: