From null at suse.de Wed Oct 1 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 01 Oct 2025 16:30:06 -0000 Subject: SUSE-SU-2025:03445-1: moderate: Security update for snpguest Message-ID: <175933620657.6834.12706156988163473481@smelt2.prg2.suse.org> # Security update for snpguest Announcement ID: SUSE-SU-2025:03445-1 Release Date: 2025-10-01T13:10:00Z Rating: moderate References: * bsc#1242601 * bsc#1243869 Cross-References: * CVE-2024-12224 * CVE-2025-3416 CVSS scores: * CVE-2024-12224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-12224 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-3416 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-3416 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-3416 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for snpguest fixes the following issues: * CVE-2024-12224: idna: acceptance of Punycode labels that do not produce any non-ASCII output may lead to incorrect hostname comparisons and incorrect URL parsing (bsc#1243869). * CVE-2025-3416: openssl: use-after-free in `Md::fetch` and `Cipher::fetch` when `Some(...)` value is passed to the `properties` argument (bsc#1242601). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3445=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3445=1 openSUSE-SLE-15.6-2025-3445=1 ## Package List: * Server Applications Module 15-SP6 (x86_64) * snpguest-debuginfo-0.3.2-150600.3.6.1 * snpguest-0.3.2-150600.3.6.1 * openSUSE Leap 15.6 (x86_64) * snpguest-debuginfo-0.3.2-150600.3.6.1 * snpguest-0.3.2-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12224.html * https://www.suse.com/security/cve/CVE-2025-3416.html * https://bugzilla.suse.com/show_bug.cgi?id=1242601 * https://bugzilla.suse.com/show_bug.cgi?id=1243869 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 1 16:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 01 Oct 2025 16:30:12 -0000 Subject: SUSE-SU-2025:03444-1: moderate: Security update for nginx Message-ID: <175933621284.6834.10081986330361730564@smelt2.prg2.suse.org> # Security update for nginx Announcement ID: SUSE-SU-2025:03444-1 Release Date: 2025-10-01T12:43:06Z Rating: moderate References: * bsc#1236851 * bsc#1248070 Cross-References: * CVE-2025-23419 * CVE-2025-53859 CVSS scores: * CVE-2025-23419 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-23419 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-23419 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-23419 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-53859 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-53859 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-53859 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-53859 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for nginx fixes the following issues: * CVE-2025-53859:? the server side may leak arbitrary bytes during the NGINX SMTP authentication process (bsc#1248070). * CVE-2025-23419: session resumption can bypass client certificate authentication requirements using TLSv1.3 (bsc#1236851). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3444=1 openSUSE-SLE-15.6-2025-3444=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3444=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3444=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * nginx-1.21.5-150600.10.12.1 * nginx-debuginfo-1.21.5-150600.10.12.1 * nginx-debugsource-1.21.5-150600.10.12.1 * openSUSE Leap 15.6 (noarch) * nginx-source-1.21.5-150600.10.12.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * nginx-1.21.5-150600.10.12.1 * nginx-debuginfo-1.21.5-150600.10.12.1 * nginx-debugsource-1.21.5-150600.10.12.1 * Server Applications Module 15-SP6 (noarch) * nginx-source-1.21.5-150600.10.12.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * nginx-1.21.5-150600.10.12.1 * nginx-debuginfo-1.21.5-150600.10.12.1 * nginx-debugsource-1.21.5-150600.10.12.1 * Server Applications Module 15-SP7 (noarch) * nginx-source-1.21.5-150600.10.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23419.html * https://www.suse.com/security/cve/CVE-2025-53859.html * https://bugzilla.suse.com/show_bug.cgi?id=1236851 * https://bugzilla.suse.com/show_bug.cgi?id=1248070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 2 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 02 Oct 2025 08:30:08 -0000 Subject: SUSE-SU-2025:03450-1: low: Security update for cairo Message-ID: <175939380876.6584.12144380373248397698@smelt2.prg2.suse.org> # Security update for cairo Announcement ID: SUSE-SU-2025:03450-1 Release Date: 2025-10-02T07:15:39Z Rating: low References: * bsc#1122338 * bsc#1247589 Cross-References: * CVE-2019-6461 * CVE-2025-50422 CVSS scores: * CVE-2019-6461 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-6461 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-6461 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-50422 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-50422 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-50422 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for cairo fixes the following issues: * CVE-2019-6461: Avoid assert when drawing arcs with NaN angles. (bsc#1122338) * CVE-2025-50422: Fix NULL pointer access in `active_edges_to_traps()` leading to crash in Poppler. (bsc#1247589) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3450=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libcairo-gobject2-32bit-1.15.2-25.11.1 * libcairo2-debuginfo-1.15.2-25.11.1 * libcairo2-32bit-1.15.2-25.11.1 * libcairo2-1.15.2-25.11.1 * libcairo-gobject2-debuginfo-1.15.2-25.11.1 * libcairo-gobject2-debuginfo-32bit-1.15.2-25.11.1 * cairo-devel-1.15.2-25.11.1 * libcairo-script-interpreter2-debuginfo-1.15.2-25.11.1 * libcairo-gobject2-1.15.2-25.11.1 * libcairo2-debuginfo-32bit-1.15.2-25.11.1 * cairo-debugsource-1.15.2-25.11.1 * libcairo-script-interpreter2-1.15.2-25.11.1 ## References: * https://www.suse.com/security/cve/CVE-2019-6461.html * https://www.suse.com/security/cve/CVE-2025-50422.html * https://bugzilla.suse.com/show_bug.cgi?id=1122338 * https://bugzilla.suse.com/show_bug.cgi?id=1247589 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 2 08:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 02 Oct 2025 08:30:11 -0000 Subject: SUSE-SU-2025:03449-1: low: Security update for cairo Message-ID: <175939381110.6584.11725306154615290655@smelt2.prg2.suse.org> # Security update for cairo Announcement ID: SUSE-SU-2025:03449-1 Release Date: 2025-10-02T07:15:33Z Rating: low References: * bsc#1247589 Cross-References: * CVE-2025-50422 CVSS scores: * CVE-2025-50422 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-50422 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-50422 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for cairo fixes the following issues: * CVE-2025-50422: Fixed Poppler crash on malformed input (bsc#1247589) * Update to version 1.18.4: * The dependency on LZO has been made optional through a build time configuration toggle. * You can build Cairo against a Freetype installation that does not have the FT_Color type. * Cairo tests now build on Solaris 11.4 with GCC 14. * The DirectWrite backend now builds on MINGW 11. * The DirectWrite backend now supports font variations and proper glyph coverage. * Use tarball in lieu of source service due to freedesktop gitlab migration, will switch back at next release at the latest. * Add pkgconfig(lzo2) BuildRequires: New optional dependency, build lzo2 support feature. * Convert to source service: allows for easier upgrades by the GNOME team. * Update to version 1.18.2: * The malloc-stats code has been removed from the tests directory * Cairo now requires a version of pixman equal to, or newer than, 0.40. * There have been multiple build fixes for newer versions of GCC for MSVC; for Solaris; and on macOS 10.7. * PNG errors caused by loading malformed data are correctly propagated to callers, so they can handle the case. * Both stroke and fill colors are now set when showing glyphs on a PDF surface. * All the font options are copied when creating a fallback font object. * When drawing text on macOS, Cairo now tries harder to select the appropriate font name. * Cairo now prefers the COLRv1 table inside a font, if one is available. * Cairo requires a C11 toolchain when building. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3449=1 SUSE-2025-3449=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3449=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3449=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3449=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3449=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libcairo-script-interpreter2-debuginfo-1.18.4-150600.3.3.1 * libcairo2-1.18.4-150600.3.3.1 * libcairo-gobject2-1.18.4-150600.3.3.1 * libcairo-script-interpreter2-1.18.4-150600.3.3.1 * cairo-devel-1.18.4-150600.3.3.1 * libcairo2-debuginfo-1.18.4-150600.3.3.1 * cairo-tools-1.18.4-150600.3.3.1 * libcairo-gobject2-debuginfo-1.18.4-150600.3.3.1 * cairo-debugsource-1.18.4-150600.3.3.1 * cairo-tools-debuginfo-1.18.4-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libcairo-gobject2-32bit-debuginfo-1.18.4-150600.3.3.1 * libcairo-script-interpreter2-32bit-debuginfo-1.18.4-150600.3.3.1 * libcairo2-32bit-1.18.4-150600.3.3.1 * libcairo2-32bit-debuginfo-1.18.4-150600.3.3.1 * cairo-devel-32bit-1.18.4-150600.3.3.1 * libcairo-gobject2-32bit-1.18.4-150600.3.3.1 * libcairo-script-interpreter2-32bit-1.18.4-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libcairo-script-interpreter2-64bit-1.18.4-150600.3.3.1 * libcairo-gobject2-64bit-debuginfo-1.18.4-150600.3.3.1 * libcairo-gobject2-64bit-1.18.4-150600.3.3.1 * libcairo-script-interpreter2-64bit-debuginfo-1.18.4-150600.3.3.1 * libcairo2-64bit-debuginfo-1.18.4-150600.3.3.1 * libcairo2-64bit-1.18.4-150600.3.3.1 * cairo-devel-64bit-1.18.4-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libcairo-script-interpreter2-debuginfo-1.18.4-150600.3.3.1 * libcairo2-1.18.4-150600.3.3.1 * libcairo-gobject2-1.18.4-150600.3.3.1 * libcairo-script-interpreter2-1.18.4-150600.3.3.1 * libcairo2-debuginfo-1.18.4-150600.3.3.1 * libcairo-gobject2-debuginfo-1.18.4-150600.3.3.1 * cairo-debugsource-1.18.4-150600.3.3.1 * cairo-devel-1.18.4-150600.3.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libcairo-script-interpreter2-debuginfo-1.18.4-150600.3.3.1 * libcairo2-1.18.4-150600.3.3.1 * libcairo-gobject2-1.18.4-150600.3.3.1 * libcairo-script-interpreter2-1.18.4-150600.3.3.1 * libcairo2-debuginfo-1.18.4-150600.3.3.1 * libcairo-gobject2-debuginfo-1.18.4-150600.3.3.1 * cairo-debugsource-1.18.4-150600.3.3.1 * cairo-devel-1.18.4-150600.3.3.1 * Desktop Applications Module 15-SP6 (x86_64) * libcairo2-32bit-1.18.4-150600.3.3.1 * libcairo2-32bit-debuginfo-1.18.4-150600.3.3.1 * Desktop Applications Module 15-SP7 (x86_64) * libcairo2-32bit-1.18.4-150600.3.3.1 * libcairo2-32bit-debuginfo-1.18.4-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-50422.html * https://bugzilla.suse.com/show_bug.cgi?id=1247589 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 2 08:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 02 Oct 2025 08:30:18 -0000 Subject: SUSE-SU-2025:03448-1: moderate: Security update for warewulf4 Message-ID: <175939381810.6584.8594851087165818560@smelt2.prg2.suse.org> # Security update for warewulf4 Announcement ID: SUSE-SU-2025:03448-1 Release Date: 2025-10-02T07:15:03Z Rating: moderate References: * bsc#1227465 * bsc#1227686 * bsc#1246082 * bsc#1248768 * bsc#1248906 Cross-References: * CVE-2025-58058 CVSS scores: * CVE-2025-58058 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58058 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58058 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * HPC Module 15-SP6 * HPC Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 An update that solves one vulnerability and has four security fixes can now be installed. ## Description: This update for warewulf4 fixes the following issues: Update to version 4.6.4. Security issues fixed: * CVE-2025-58058: xz: excessive memory consuption when unpacking a large number of corrupted LZMA archives (bsc#1248906). Other issues fixed: * Convert disk booleans from `wwbool` to `*bool` which allows bools in disk to be set to false via command line (bsc#1248768). * Fix `wwctl` upgrade nodes to handle kernel argument lists (bsc#1227686, bsc#1227465). * Mark `slurm` as recommeneded in the `warewulf4-overlay-slurm` package (bsc#1246082). * Switch to `dnsmasq` as default DHCP and TFTP provider. * v4.6.4 release updates: * Update NetworkManager Overlay * Disable IPv4 in NetworkManager if no address or route is specified * Fix(`wwctl`): create overlay edit `tempfile` in `tmpdir` * Add default for systemd name for warewulf in `warewulf.conf` * Atomic overlay file application in `wwclient` * Simpler names for overlay methods * Fix `warewulfd` API behavior when deleting distribution overlay * v4.6.3 release updates: * IPv6 iPXE support * Fix a race condition in `wwctl` overlay edit * Fixed handling of comma-separated mount options in `fstab` and `ignition` overlays * Move `reexec.Init()` to beginning of `wwctl` * Added `warewuld` configure option * Address copilot review from #1945 * Bugfix: cloning a site overlay when parent dir does not exist * Clone to a site overlay when adding files in `wwapi` * Consolidated `createOverlayFile` and `updateOverlayFile` to `addOverlayFile` * Support for creating and updating overlay file in `wwapi` * Only return overlay files that refer to a path within the overlay * Add overlay file deletion support * `DELETE /api/overlays/{id}?force=true` can delete overlays in use * Restore idempotency of `PUT /api/nodes/{id}` * Simplify overlay mtime API and add tests * Add node overlay buildtime * Improved `netplan` support * Rebuild overlays for discovered nodes * v4.6.2 release updates: * (preview) support for provisioning to local disk * incoperated from v4.6.1: * REST API, which is disabled in the default configuration ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3448=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3448=1 * HPC Module 15-SP6 zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2025-3448=1 * HPC Module 15-SP7 zypper in -t patch SUSE-SLE-Module-HPC-15-SP7-2025-3448=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * warewulf4-overlay-4.6.4-150500.6.37.1 * warewulf4-4.6.4-150500.6.37.1 * openSUSE Leap 15.5 (noarch) * warewulf4-overlay-slurm-4.6.4-150500.6.37.1 * warewulf4-man-4.6.4-150500.6.37.1 * warewulf4-dracut-4.6.4-150500.6.37.1 * warewulf4-overlay-rke2-4.6.4-150500.6.37.1 * warewulf4-reference-doc-4.6.4-150500.6.37.1 * openSUSE Leap 15.6 (aarch64 x86_64) * warewulf4-overlay-4.6.4-150500.6.37.1 * warewulf4-4.6.4-150500.6.37.1 * openSUSE Leap 15.6 (noarch) * warewulf4-overlay-slurm-4.6.4-150500.6.37.1 * warewulf4-man-4.6.4-150500.6.37.1 * warewulf4-reference-doc-4.6.4-150500.6.37.1 * warewulf4-dracut-4.6.4-150500.6.37.1 * HPC Module 15-SP6 (aarch64 x86_64) * warewulf4-overlay-4.6.4-150500.6.37.1 * warewulf4-4.6.4-150500.6.37.1 * HPC Module 15-SP6 (noarch) * warewulf4-overlay-slurm-4.6.4-150500.6.37.1 * warewulf4-man-4.6.4-150500.6.37.1 * warewulf4-reference-doc-4.6.4-150500.6.37.1 * warewulf4-dracut-4.6.4-150500.6.37.1 * HPC Module 15-SP7 (aarch64 x86_64) * warewulf4-overlay-4.6.4-150500.6.37.1 * warewulf4-4.6.4-150500.6.37.1 * HPC Module 15-SP7 (noarch) * warewulf4-overlay-slurm-4.6.4-150500.6.37.1 * warewulf4-man-4.6.4-150500.6.37.1 * warewulf4-reference-doc-4.6.4-150500.6.37.1 * warewulf4-dracut-4.6.4-150500.6.37.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58058.html * https://bugzilla.suse.com/show_bug.cgi?id=1227465 * https://bugzilla.suse.com/show_bug.cgi?id=1227686 * https://bugzilla.suse.com/show_bug.cgi?id=1246082 * https://bugzilla.suse.com/show_bug.cgi?id=1248768 * https://bugzilla.suse.com/show_bug.cgi?id=1248906 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 2 08:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 02 Oct 2025 08:30:20 -0000 Subject: SUSE-SU-2025:03447-1: important: Security update for MozillaFirefox Message-ID: <175939382054.6584.4252061957870557036@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:03447-1 Release Date: 2025-10-02T07:14:13Z Rating: important References: * bsc#1250452 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one security fix can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.3.1 ESR (bsc#1250452). * Improved reliability when HTTP/3 connections fail: Firefox no longer forces HTTP/2 during fallback, allowing the server to choose the protocol and preventing stalls on some sites. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3447=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3447=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-common-140.3.1-112.283.1 * MozillaFirefox-140.3.1-112.283.1 * MozillaFirefox-debuginfo-140.3.1-112.283.1 * MozillaFirefox-debugsource-140.3.1-112.283.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-140.3.1-112.283.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-translations-common-140.3.1-112.283.1 * MozillaFirefox-140.3.1-112.283.1 * MozillaFirefox-debuginfo-140.3.1-112.283.1 * MozillaFirefox-debugsource-140.3.1-112.283.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-140.3.1-112.283.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1250452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 2 08:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 02 Oct 2025 08:30:23 -0000 Subject: SUSE-SU-2025:03446-1: critical: Security update for python-Django Message-ID: <175939382362.6584.7643221015684639138@smelt2.prg2.suse.org> # Security update for python-Django Announcement ID: SUSE-SU-2025:03446-1 Release Date: 2025-10-02T07:13:11Z Rating: critical References: * bsc#1250485 * bsc#1250487 Cross-References: * CVE-2025-59681 * CVE-2025-59682 CVSS scores: * CVE-2025-59681 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-59681 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-59681 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N * CVE-2025-59682 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-59682 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-59682 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-Django fixes the following issues: * CVE-2025-59681: SQL injection via the `QuerySet` annotate()`,`alias()`,`aggregate()`, or`extra()` methods when processing a specially crafted dictionary with dictionary expansion (bsc#1250485). * CVE-2025-59682: directory traversal via the `django.utils.archive.extract()` function when processing an archive with file paths that share a common prefix with the target directory (bsc#1250487). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3446=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3446=1 openSUSE-SLE-15.6-2025-3446=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3446=1 ## Package List: * SUSE Package Hub 15 15-SP7 (noarch) * python311-Django-4.2.11-150600.3.33.1 * openSUSE Leap 15.6 (noarch) * python311-Django-4.2.11-150600.3.33.1 * SUSE Package Hub 15 15-SP6 (noarch) * python311-Django-4.2.11-150600.3.33.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59681.html * https://www.suse.com/security/cve/CVE-2025-59682.html * https://bugzilla.suse.com/show_bug.cgi?id=1250485 * https://bugzilla.suse.com/show_bug.cgi?id=1250487 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 3 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 03 Oct 2025 12:30:06 -0000 Subject: SUSE-SU-2025:03453-1: moderate: Security update for frr Message-ID: <175949460681.6834.4842371687152007924@smelt2.prg2.suse.org> # Security update for frr Announcement ID: SUSE-SU-2025:03453-1 Release Date: 2025-10-03T10:41:08Z Rating: moderate References: * bsc#1235237 Cross-References: * CVE-2024-55553 CVSS scores: * CVE-2024-55553 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-55553 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-55553 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for frr fixes the following issues: * CVE-2024-55553: excessive resource consumption may lead to denial of service due to repeated RIB revalidation when processing several RPKI updates (bsc#1235237). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3453=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3453=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3453=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3453=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libfrrzmq0-8.5.6-150500.4.33.1 * libfrrospfapiclient0-8.5.6-150500.4.33.1 * libfrrzmq0-debuginfo-8.5.6-150500.4.33.1 * libmlag_pb0-8.5.6-150500.4.33.1 * libfrrcares0-8.5.6-150500.4.33.1 * frr-8.5.6-150500.4.33.1 * libfrr0-debuginfo-8.5.6-150500.4.33.1 * libfrr_pb0-8.5.6-150500.4.33.1 * libfrr_pb0-debuginfo-8.5.6-150500.4.33.1 * libfrr0-8.5.6-150500.4.33.1 * frr-debugsource-8.5.6-150500.4.33.1 * libfrrsnmp0-debuginfo-8.5.6-150500.4.33.1 * libfrrfpm_pb0-8.5.6-150500.4.33.1 * libfrrcares0-debuginfo-8.5.6-150500.4.33.1 * libfrrfpm_pb0-debuginfo-8.5.6-150500.4.33.1 * libmlag_pb0-debuginfo-8.5.6-150500.4.33.1 * libfrrospfapiclient0-debuginfo-8.5.6-150500.4.33.1 * libfrrsnmp0-8.5.6-150500.4.33.1 * frr-devel-8.5.6-150500.4.33.1 * frr-debuginfo-8.5.6-150500.4.33.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libfrrzmq0-8.5.6-150500.4.33.1 * libfrrospfapiclient0-8.5.6-150500.4.33.1 * libfrrzmq0-debuginfo-8.5.6-150500.4.33.1 * libmlag_pb0-8.5.6-150500.4.33.1 * libfrrcares0-8.5.6-150500.4.33.1 * frr-8.5.6-150500.4.33.1 * libfrr0-debuginfo-8.5.6-150500.4.33.1 * libfrr_pb0-8.5.6-150500.4.33.1 * libfrr_pb0-debuginfo-8.5.6-150500.4.33.1 * libfrr0-8.5.6-150500.4.33.1 * frr-debugsource-8.5.6-150500.4.33.1 * libfrrsnmp0-debuginfo-8.5.6-150500.4.33.1 * libfrrfpm_pb0-8.5.6-150500.4.33.1 * libfrrcares0-debuginfo-8.5.6-150500.4.33.1 * libfrrfpm_pb0-debuginfo-8.5.6-150500.4.33.1 * libmlag_pb0-debuginfo-8.5.6-150500.4.33.1 * libfrrospfapiclient0-debuginfo-8.5.6-150500.4.33.1 * libfrrsnmp0-8.5.6-150500.4.33.1 * frr-devel-8.5.6-150500.4.33.1 * frr-debuginfo-8.5.6-150500.4.33.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libfrrzmq0-8.5.6-150500.4.33.1 * libfrrospfapiclient0-8.5.6-150500.4.33.1 * libfrrzmq0-debuginfo-8.5.6-150500.4.33.1 * libmlag_pb0-8.5.6-150500.4.33.1 * libfrrcares0-8.5.6-150500.4.33.1 * frr-8.5.6-150500.4.33.1 * libfrr0-debuginfo-8.5.6-150500.4.33.1 * libfrr_pb0-8.5.6-150500.4.33.1 * libfrr_pb0-debuginfo-8.5.6-150500.4.33.1 * libfrr0-8.5.6-150500.4.33.1 * frr-debugsource-8.5.6-150500.4.33.1 * libfrrsnmp0-debuginfo-8.5.6-150500.4.33.1 * libfrrfpm_pb0-8.5.6-150500.4.33.1 * libfrrcares0-debuginfo-8.5.6-150500.4.33.1 * libfrrfpm_pb0-debuginfo-8.5.6-150500.4.33.1 * libmlag_pb0-debuginfo-8.5.6-150500.4.33.1 * libfrrospfapiclient0-debuginfo-8.5.6-150500.4.33.1 * libfrrsnmp0-8.5.6-150500.4.33.1 * frr-devel-8.5.6-150500.4.33.1 * frr-debuginfo-8.5.6-150500.4.33.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libmlag_pb0-debuginfo-8.5.6-150500.4.33.1 * frr-debugsource-8.5.6-150500.4.33.1 * libmlag_pb0-8.5.6-150500.4.33.1 * frr-debuginfo-8.5.6-150500.4.33.1 ## References: * https://www.suse.com/security/cve/CVE-2024-55553.html * https://bugzilla.suse.com/show_bug.cgi?id=1235237 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:06 -0000 Subject: SUSE-SU-2025:03464-1: important: Security update for openssl-1_0_0 Message-ID: <175982580625.6584.13873565203121468634@smelt2.prg2.suse.org> # Security update for openssl-1_0_0 Announcement ID: SUSE-SU-2025:03464-1 Release Date: 2025-10-07T07:49:29Z Rating: important References: * bsc#1250232 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_0_0 fixes the following issues: * CVE-2025-9230 incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap (bsc#1250232). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3464=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3464=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libopenssl1_0_0-debuginfo-1.0.2p-3.98.1 * libopenssl1_0_0-1.0.2p-3.98.1 * openssl-1_0_0-debuginfo-1.0.2p-3.98.1 * libopenssl1_0_0-hmac-1.0.2p-3.98.1 * libopenssl-1_0_0-devel-1.0.2p-3.98.1 * openssl-1_0_0-1.0.2p-3.98.1 * openssl-1_0_0-debugsource-1.0.2p-3.98.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * openssl-1_0_0-doc-1.0.2p-3.98.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libopenssl1_0_0-debuginfo-32bit-1.0.2p-3.98.1 * libopenssl-1_0_0-devel-32bit-1.0.2p-3.98.1 * libopenssl1_0_0-32bit-1.0.2p-3.98.1 * libopenssl1_0_0-hmac-32bit-1.0.2p-3.98.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libopenssl1_0_0-32bit-1.0.2p-3.98.1 * libopenssl1_0_0-debuginfo-1.0.2p-3.98.1 * libopenssl1_0_0-debuginfo-32bit-1.0.2p-3.98.1 * libopenssl1_0_0-hmac-32bit-1.0.2p-3.98.1 * libopenssl1_0_0-1.0.2p-3.98.1 * openssl-1_0_0-debuginfo-1.0.2p-3.98.1 * openssl-1_0_0-1.0.2p-3.98.1 * libopenssl-1_0_0-devel-1.0.2p-3.98.1 * libopenssl1_0_0-hmac-1.0.2p-3.98.1 * libopenssl-1_0_0-devel-32bit-1.0.2p-3.98.1 * openssl-1_0_0-debugsource-1.0.2p-3.98.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * openssl-1_0_0-doc-1.0.2p-3.98.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:08 -0000 Subject: SUSE-SU-2025:03463-1: important: Security update for openssl-1_1 Message-ID: <175982580871.6584.1809749898784979005@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2025:03463-1 Release Date: 2025-10-07T07:48:36Z Rating: important References: * bsc#1250232 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap (bsc#1250232). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3463=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3463=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libopenssl1_1-debuginfo-1.1.1d-2.119.1 * openssl-1_1-debugsource-1.1.1d-2.119.1 * libopenssl-1_1-devel-1.1.1d-2.119.1 * openssl-1_1-debuginfo-1.1.1d-2.119.1 * libopenssl1_1-1.1.1d-2.119.1 * openssl-1_1-1.1.1d-2.119.1 * libopenssl1_1-hmac-1.1.1d-2.119.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libopenssl1_1-32bit-1.1.1d-2.119.1 * libopenssl1_1-debuginfo-32bit-1.1.1d-2.119.1 * libopenssl-1_1-devel-32bit-1.1.1d-2.119.1 * libopenssl1_1-hmac-32bit-1.1.1d-2.119.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libopenssl1_1-debuginfo-1.1.1d-2.119.1 * libopenssl1_1-debuginfo-32bit-1.1.1d-2.119.1 * libopenssl1_1-hmac-32bit-1.1.1d-2.119.1 * openssl-1_1-debugsource-1.1.1d-2.119.1 * libopenssl-1_1-devel-1.1.1d-2.119.1 * libopenssl-1_1-devel-32bit-1.1.1d-2.119.1 * openssl-1_1-debuginfo-1.1.1d-2.119.1 * libopenssl1_1-32bit-1.1.1d-2.119.1 * libopenssl1_1-1.1.1d-2.119.1 * openssl-1_1-1.1.1d-2.119.1 * libopenssl1_1-hmac-1.1.1d-2.119.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:12 -0000 Subject: SUSE-SU-2025:03462-1: important: Security update for MozillaFirefox Message-ID: <175982581277.6584.16916591734339893059@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:03462-1 Release Date: 2025-10-07T07:47:16Z Rating: important References: * bsc#1250452 Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one security fix can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.3.1 ESR (bsc#1250452). * Improved reliability when HTTP/3 connections fail: Firefox no longer forces HTTP/2 during fallback, allowing the server to choose the protocol and preventing stalls on some sites. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3462=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3462=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3462=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3462=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3462=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3462=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3462=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3462=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3462=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3462=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3462=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3462=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3462=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3462=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3462=1 ## Package List: * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-branding-upstream-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * Desktop Applications Module 15-SP7 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * MozillaFirefox-debuginfo-140.3.1-150200.152.204.1 * MozillaFirefox-140.3.1-150200.152.204.1 * MozillaFirefox-translations-common-140.3.1-150200.152.204.1 * MozillaFirefox-translations-other-140.3.1-150200.152.204.1 * MozillaFirefox-debugsource-140.3.1-150200.152.204.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * MozillaFirefox-devel-140.3.1-150200.152.204.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1250452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:15 -0000 Subject: SUSE-SU-2025:03461-1: low: Security update for ghostscript Message-ID: <175982581537.6584.12935589920011828379@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2025:03461-1 Release Date: 2025-10-07T07:37:16Z Rating: low References: * bsc#1243701 Cross-References: * CVE-2025-48708 CVSS scores: * CVE-2025-48708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-48708 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-48708 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2025-48708: Fixed password disclosure due to lacks of argument sanitization (bsc#1243701) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3461=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3461=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3461=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ghostscript-debugsource-9.52-150000.206.1 * ghostscript-devel-9.52-150000.206.1 * ghostscript-9.52-150000.206.1 * ghostscript-x11-9.52-150000.206.1 * ghostscript-x11-debuginfo-9.52-150000.206.1 * ghostscript-debuginfo-9.52-150000.206.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ghostscript-debugsource-9.52-150000.206.1 * ghostscript-devel-9.52-150000.206.1 * ghostscript-9.52-150000.206.1 * ghostscript-x11-9.52-150000.206.1 * ghostscript-x11-debuginfo-9.52-150000.206.1 * ghostscript-debuginfo-9.52-150000.206.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ghostscript-debugsource-9.52-150000.206.1 * ghostscript-devel-9.52-150000.206.1 * ghostscript-9.52-150000.206.1 * ghostscript-x11-9.52-150000.206.1 * ghostscript-x11-debuginfo-9.52-150000.206.1 * ghostscript-debuginfo-9.52-150000.206.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48708.html * https://bugzilla.suse.com/show_bug.cgi?id=1243701 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:17 -0000 Subject: SUSE-SU-2025:03460-1: low: Security update for ghostscript Message-ID: <175982581796.6584.9094281002844153766@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2025:03460-1 Release Date: 2025-10-07T07:35:51Z Rating: low References: * bsc#1243701 Cross-References: * CVE-2025-48708 CVSS scores: * CVE-2025-48708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-48708 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-48708 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2025-48708: Fixed password disclosure due to lacks of argument sanitization (bsc#1243701) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3460=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * ghostscript-x11-debuginfo-9.52-23.92.1 * ghostscript-9.52-23.92.1 * ghostscript-x11-9.52-23.92.1 * ghostscript-debugsource-9.52-23.92.1 * ghostscript-debuginfo-9.52-23.92.1 * ghostscript-devel-9.52-23.92.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48708.html * https://bugzilla.suse.com/show_bug.cgi?id=1243701 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:20 -0000 Subject: SUSE-SU-2025:03459-1: low: Security update for gstreamer-plugins-rs Message-ID: <175982582094.6584.16236422732520386977@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-rs Announcement ID: SUSE-SU-2025:03459-1 Release Date: 2025-10-07T07:35:31Z Rating: low References: * bsc#1230028 Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one security fix can now be installed. ## Description: This update for gstreamer-plugins-rs fixes the following issues: * Update crate shlex to 1.3.0: *RUSTSEC-2024-0006: Fixed multiple issues involving quote API (bsc#1230028) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3459=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3459=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3459=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-0.8.2-150400.3.6.1 * Desktop Applications Module 15-SP6 (ppc64le) * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-0.8.2-150400.3.6.1 * Desktop Applications Module 15-SP7 (ppc64le) * gstreamer-plugins-rs-debugsource-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-debuginfo-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-devel-0.8.2-150400.3.6.1 * gstreamer-plugins-rs-0.8.2-150400.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230028 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:24 -0000 Subject: SUSE-SU-2025:03457-1: moderate: Security update for python-xmltodict Message-ID: <175982582457.6584.13259882317558071707@smelt2.prg2.suse.org> # Security update for python-xmltodict Announcement ID: SUSE-SU-2025:03457-1 Release Date: 2025-10-07T07:15:55Z Rating: moderate References: * bsc#1249036 Cross-References: * CVE-2025-9375 CVSS scores: * CVE-2025-9375 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-9375 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-9375 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-xmltodict fixes the following issues: * CVE-2025-9375: XML injection vulnerability in `xmltodict` allows input data manipulation (bsc#1249036). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-3457=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-3457=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3457=1 ## Package List: * Public Cloud Module 15-SP4 (noarch) * python311-xmltodict-0.13.0-150400.12.7.1 * Public Cloud Module 15-SP5 (noarch) * python311-xmltodict-0.13.0-150400.12.7.1 * openSUSE Leap 15.4 (noarch) * python311-xmltodict-0.13.0-150400.12.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249036 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 08:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 08:30:27 -0000 Subject: SUSE-SU-2025:03456-1: moderate: Security update for logback Message-ID: <175982582738.6584.13439263373838669975@smelt2.prg2.suse.org> # Security update for logback Announcement ID: SUSE-SU-2025:03456-1 Release Date: 2025-10-07T07:08:30Z Rating: moderate References: * bsc#1250715 Cross-References: * CVE-2025-11226 CVSS scores: * CVE-2025-11226 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L * CVE-2025-11226 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:L/VA:L/SC:H/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:M/U:Green Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for logback fixes the following issues: * CVE-2025-11226: fixed the ACE vulnerability in conditional configuration file processing (bsc#1250715) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3456=1 ## Package List: * openSUSE Leap 15.6 (noarch) * logback-1.2.13-150200.3.13.1 * logback-examples-1.2.13-150200.3.13.1 * logback-javadoc-1.2.13-150200.3.13.1 * logback-access-1.2.13-150200.3.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11226.html * https://bugzilla.suse.com/show_bug.cgi?id=1250715 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 12:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 12:30:11 -0000 Subject: SUSE-SU-2025:03465-1: important: Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) Message-ID: <175984021181.6834.11612325583462497329@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03465-1 Release Date: 2025-10-07T08:23:42Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_8 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3465=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-18-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-18-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-18-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 12:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 12:30:17 -0000 Subject: SUSE-SU-2025:03467-1: important: Security update for rubygem-puma Message-ID: <175984021777.6834.13093151373467790654@smelt2.prg2.suse.org> # Security update for rubygem-puma Announcement ID: SUSE-SU-2025:03467-1 Release Date: 2025-10-07T11:34:21Z Rating: important References: * bsc#1214425 * bsc#1218638 * bsc#1230848 Cross-References: * CVE-2023-40175 * CVE-2024-21647 * CVE-2024-45614 CVSS scores: * CVE-2023-40175 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2023-40175 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-21647 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21647 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45614 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-45614 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-45614 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-45614 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for rubygem-puma fixes the following issues: Update to version 5.6.9. * CVE-2024-45614: improper header normalization allows for clients to clobber proxy set headers, which can lead to information leaks (bsc#1230848, fixed in an earlier update). * CVE-2024-21647: unbounded resource consumption due to invalid parsing of chunked encoding in HTTP/1.1 can lead to denial-of-service attacks (bsc#1218638, fixed in an earlier update) * CVE-2023-40175: incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers can lead to HTTP request smuggling attacks (bsc#1214425, fixed in an earlier update). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3467=1 openSUSE-SLE-15.6-2025-3467=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-3467=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-3467=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ruby2.5-rubygem-puma-5.6.9-150600.18.3.1 * ruby2.5-rubygem-puma-doc-5.6.9-150600.18.3.1 * ruby2.5-rubygem-puma-debuginfo-5.6.9-150600.18.3.1 * rubygem-puma-debugsource-5.6.9-150600.18.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-puma-5.6.9-150600.18.3.1 * ruby2.5-rubygem-puma-debuginfo-5.6.9-150600.18.3.1 * rubygem-puma-debugsource-5.6.9-150600.18.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-puma-5.6.9-150600.18.3.1 * ruby2.5-rubygem-puma-debuginfo-5.6.9-150600.18.3.1 * rubygem-puma-debugsource-5.6.9-150600.18.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40175.html * https://www.suse.com/security/cve/CVE-2024-21647.html * https://www.suse.com/security/cve/CVE-2024-45614.html * https://bugzilla.suse.com/show_bug.cgi?id=1214425 * https://bugzilla.suse.com/show_bug.cgi?id=1218638 * https://bugzilla.suse.com/show_bug.cgi?id=1230848 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 12:30:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 12:30:22 -0000 Subject: SUSE-SU-2025:03466-1: important: Security update for rubygem-puma Message-ID: <175984022268.6834.17075252001412172739@smelt2.prg2.suse.org> # Security update for rubygem-puma Announcement ID: SUSE-SU-2025:03466-1 Release Date: 2025-10-07T11:33:53Z Rating: important References: * bsc#1214425 * bsc#1218638 * bsc#1230848 Cross-References: * CVE-2023-40175 * CVE-2024-21647 * CVE-2024-45614 CVSS scores: * CVE-2023-40175 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2023-40175 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-21647 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-21647 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45614 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-45614 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-45614 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2024-45614 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for rubygem-puma fixes the following issues: Update to version 5.6.9. * CVE-2024-45614: improper header normalization allows for clients to clobber proxy set headers, which can lead to information leaks (bsc#1230848, fixed in an earlier update). * CVE-2024-21647: unbounded resource consumption due to invalid parsing of chunked encoding in HTTP/1.1 can lead to denial-of-service attacks (bsc#1218638, fixed in an earlier update) * CVE-2023-40175: incorrect behavior when parsing chunked transfer encoding bodies and zero-length Content-Length headers can lead to HTTP request smuggling attacks (bsc#1214425, fixed in an earlier update). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-3466=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-3466=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-3466=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-5.6.9-150000.3.18.1 * ruby2.5-rubygem-puma-5.6.9-150000.3.18.1 * ruby2.5-rubygem-puma-debuginfo-5.6.9-150000.3.18.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-5.6.9-150000.3.18.1 * ruby2.5-rubygem-puma-5.6.9-150000.3.18.1 * ruby2.5-rubygem-puma-debuginfo-5.6.9-150000.3.18.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * rubygem-puma-debugsource-5.6.9-150000.3.18.1 * ruby2.5-rubygem-puma-5.6.9-150000.3.18.1 * ruby2.5-rubygem-puma-debuginfo-5.6.9-150000.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40175.html * https://www.suse.com/security/cve/CVE-2024-21647.html * https://www.suse.com/security/cve/CVE-2024-45614.html * https://bugzilla.suse.com/show_bug.cgi?id=1214425 * https://bugzilla.suse.com/show_bug.cgi?id=1218638 * https://bugzilla.suse.com/show_bug.cgi?id=1230848 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:06 -0000 Subject: SUSE-SU-2025:03476-1: important: Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) Message-ID: <175985460617.2834.16990143471485004117@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 9 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03476-1 Release Date: 2025-10-07T15:07:56Z Rating: important References: * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_29 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3476=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_29-rt-debuginfo-8-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_9-debugsource-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_29-rt-8-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:10 -0000 Subject: SUSE-SU-2025:03475-1: important: Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) Message-ID: <175985461035.2834.8252095629133184193@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03475-1 Release Date: 2025-10-07T14:10:38Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_237 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3475=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_237-default-12-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:13 -0000 Subject: SUSE-SU-2025:03473-1: important: Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP6) Message-ID: <175985461302.2834.692410134324561639@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 13 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03473-1 Release Date: 2025-10-07T13:15:27Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_44 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3473=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_44-rt-debuginfo-5-150600.2.1 * kernel-livepatch-6_4_0-150600_10_44-rt-5-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_13-debugsource-5-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:17 -0000 Subject: SUSE-SU-2025:03472-1: important: Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) Message-ID: <175985461752.2834.8598791720502877099@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 8 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03472-1 Release Date: 2025-10-07T14:00:40Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_26 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3472=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3474=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_8-debugsource-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-13-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_7-debugsource-13-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-debuginfo-13-150600.2.1 * kernel-livepatch-6_4_0-150600_10_26-rt-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_26-rt-debuginfo-8-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:20 -0000 Subject: SUSE-SU-2025:03470-1: important: Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP6) Message-ID: <175985462056.2834.6396482811295590260@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 11 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03470-1 Release Date: 2025-10-07T12:40:55Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_39 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3470=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_39-rt-debuginfo-6-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_11-debugsource-6-150600.2.1 * kernel-livepatch-6_4_0-150600_10_39-rt-6-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:26 -0000 Subject: SUSE-SU-2025:03469-1: important: Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6) Message-ID: <175985462601.2834.16710993883541232574@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03469-1 Release Date: 2025-10-07T12:40:52Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_20 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3469=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-13-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-13-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-13-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 16:30:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 16:30:31 -0000 Subject: SUSE-SU-2025:03468-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) Message-ID: <175985463181.2834.7160223651022402632@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03468-1 Release Date: 2025-10-07T13:15:20Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_17 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3468=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3471=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_17-rt-debuginfo-16-150600.2.1 * kernel-livepatch-6_4_0-150600_10_17-rt-16-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_4-debugsource-17-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-17-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_5-debugsource-16-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-debuginfo-17-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 20:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 20:30:04 -0000 Subject: SUSE-SU-2025:03479-1: important: Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7) Message-ID: <175986900446.8450.4381133946242226335@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 2 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:03479-1 Release Date: 2025-10-07T16:36:04Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_7_8 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3479=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_7_8-rt-debuginfo-5-150700.2.1 * kernel-livepatch-6_4_0-150700_7_8-rt-5-150700.2.1 * kernel-livepatch-SLE15-SP7-RT_Update_2-debugsource-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 7 20:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 07 Oct 2025 20:30:08 -0000 Subject: SUSE-SU-2025:03480-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP7) Message-ID: <175986900878.8450.3208600070097595701@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:03480-1 Release Date: 2025-10-07T17:05:19Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_7_3 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3480=1 SUSE-SLE- Module-Live-Patching-15-SP7-2025-3478=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_7_3-rt-5-150700.2.1 * kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource-5-150700.2.1 * kernel-livepatch-SLE15-SP7-RT_Update_0-debugsource-5-150700.3.1 * kernel-livepatch-6_4_0-150700_5-rt-debuginfo-5-150700.3.1 * kernel-livepatch-6_4_0-150700_5-rt-5-150700.3.1 * kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 08:30:08 -0000 Subject: SUSE-SU-2025:03485-1: important: Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5) Message-ID: <175991220827.22706.5589566019437133036@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 70 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03485-1 Release Date: 2025-10-08T00:36:00Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_266 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3485=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_266-default-5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 08:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 08:30:12 -0000 Subject: SUSE-SU-2025:03483-1: important: Security update for the Linux Kernel (Live Patch 67 for SLE 12 SP5) Message-ID: <175991221299.22706.13632234985567456594@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 67 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03483-1 Release Date: 2025-10-07T23:58:50Z Rating: important References: * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_255 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3483=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_255-default-8-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 08:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 08:30:18 -0000 Subject: SUSE-SU-2025:03482-1: important: Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5) Message-ID: <175991221801.22706.7499831637198785308@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 62 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03482-1 Release Date: 2025-10-08T00:35:52Z Rating: important References: * bsc#1233072 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_234 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3482=1 SUSE-SLE-Live- Patching-12-SP5-2025-3481=1 SUSE-SLE-Live-Patching-12-SP5-2025-3484=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_231-default-16-2.1 * kgraft-patch-4_12_14-122_234-default-16-2.1 * kgraft-patch-4_12_14-122_228-default-17-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 12:30:06 -0000 Subject: SUSE-SU-2025:03491-1: moderate: Security update for libxslt Message-ID: <175992660648.22729.15645987294147153845@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:03491-1 Release Date: 2025-10-08T07:37:48Z Rating: moderate References: * bsc#1250553 Cross-References: * CVE-2025-10911 CVSS scores: * CVE-2025-10911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2025-10911: fixed use-after-free with key data stored cross-RVT (bsc#1250553) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3491=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3491=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3491=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3491=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libxslt-python-debugsource-1.1.32-150000.3.20.1 * libxslt-python-debuginfo-1.1.32-150000.3.20.1 * libxslt-python-1.1.32-150000.3.20.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.32-150000.3.20.1 * libxslt1-1.1.32-150000.3.20.1 * libxslt-debugsource-1.1.32-150000.3.20.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.32-150000.3.20.1 * libxslt1-1.1.32-150000.3.20.1 * libxslt-debugsource-1.1.32-150000.3.20.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.32-150000.3.20.1 * libxslt1-1.1.32-150000.3.20.1 * libxslt-debugsource-1.1.32-150000.3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10911.html * https://bugzilla.suse.com/show_bug.cgi?id=1250553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 12:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 12:30:10 -0000 Subject: SUSE-SU-2025:03490-1: low: Security update for cairo Message-ID: <175992661028.22729.3133356685783924153@smelt2.prg2.suse.org> # Security update for cairo Announcement ID: SUSE-SU-2025:03490-1 Release Date: 2025-10-08T07:36:44Z Rating: low References: * bsc#1122338 Cross-References: * CVE-2019-6461 CVSS scores: * CVE-2019-6461 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2019-6461 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2019-6461 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for cairo fixes the following issues: * CVE-2019-6461: Avoid assert when drawing arcs with NaN angles (bsc#1122338) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3490=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3490=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libcairo2-1.16.0-150200.5.11.1 * cairo-debugsource-1.16.0-150200.5.11.1 * libcairo2-debuginfo-1.16.0-150200.5.11.1 * libcairo-gobject2-debuginfo-1.16.0-150200.5.11.1 * libcairo-gobject2-1.16.0-150200.5.11.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libcairo2-1.16.0-150200.5.11.1 * cairo-debugsource-1.16.0-150200.5.11.1 * libcairo2-debuginfo-1.16.0-150200.5.11.1 * libcairo-gobject2-debuginfo-1.16.0-150200.5.11.1 * libcairo-gobject2-1.16.0-150200.5.11.1 ## References: * https://www.suse.com/security/cve/CVE-2019-6461.html * https://bugzilla.suse.com/show_bug.cgi?id=1122338 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 16:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 16:30:04 -0000 Subject: SUSE-SU-2025:03498-1: important: Security update for the Linux Kernel (Live Patch 68 for SLE 12 SP5) Message-ID: <175994100471.7803.5794101207883803892@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 68 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03498-1 Release Date: 2025-10-08T15:35:38Z Rating: important References: * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_258 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3498=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_258-default-6-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 16:30:09 -0000 Subject: SUSE-SU-2025:03497-1: important: Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5) Message-ID: <175994100966.7803.13461932117405042132@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 69 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03497-1 Release Date: 2025-10-08T14:35:21Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_261 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3497=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_261-default-5-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 16:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 16:30:13 -0000 Subject: SUSE-SU-2025:03495-1: important: Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6) Message-ID: <175994101362.7803.1336498109318866983@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 10 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03495-1 Release Date: 2025-10-08T12:58:59Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_34 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3495=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo-7-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_34-rt-7-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 16:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 16:30:20 -0000 Subject: SUSE-SU-2025:03494-1: important: Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) Message-ID: <175994102041.7803.787848261982604819@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03494-1 Release Date: 2025-10-08T12:58:55Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_11 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3494=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_11-rt-debuginfo-18-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_3-debugsource-18-150600.2.1 * kernel-livepatch-6_4_0-150600_10_11-rt-18-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 16:30:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 16:30:25 -0000 Subject: SUSE-SU-2025:03496-1: important: Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) Message-ID: <175994102507.7803.4403931572103820557@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 66 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03496-1 Release Date: 2025-10-08T13:17:47Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_250 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3496=1 SUSE-SLE-Live- Patching-12-SP5-2025-3493=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_247-default-9-2.1 * kgraft-patch-4_12_14-122_250-default-9-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 20:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 20:30:04 -0000 Subject: SUSE-SU-2025:03500-1: critical: Security update for redis7 Message-ID: <175995540461.22729.16525494688772630410@smelt2.prg2.suse.org> # Security update for redis7 Announcement ID: SUSE-SU-2025:03500-1 Release Date: 2025-10-08T18:35:36Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for redis7 fixes the following issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3500=1 openSUSE-SLE-15.6-2025-3500=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3500=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * redis7-7.0.8-150600.8.19.1 * redis7-debugsource-7.0.8-150600.8.19.1 * redis7-debuginfo-7.0.8-150600.8.19.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * redis7-7.0.8-150600.8.19.1 * redis7-debugsource-7.0.8-150600.8.19.1 * redis7-debuginfo-7.0.8-150600.8.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 8 20:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 08 Oct 2025 20:30:07 -0000 Subject: SUSE-SU-2025:03499-1: critical: Security update for valkey Message-ID: <175995540735.22729.4888306192830532074@smelt2.prg2.suse.org> # Security update for valkey Announcement ID: SUSE-SU-2025:03499-1 Release Date: 2025-10-08T18:35:22Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for valkey to version 8.0.6 fixes the following issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3499=1 openSUSE-SLE-15.6-2025-3499=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3499=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * valkey-devel-8.0.6-150600.13.17.1 * valkey-8.0.6-150600.13.17.1 * valkey-debugsource-8.0.6-150600.13.17.1 * valkey-debuginfo-8.0.6-150600.13.17.1 * openSUSE Leap 15.6 (noarch) * valkey-compat-redis-8.0.6-150600.13.17.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * valkey-devel-8.0.6-150600.13.17.1 * valkey-8.0.6-150600.13.17.1 * valkey-debugsource-8.0.6-150600.13.17.1 * valkey-debuginfo-8.0.6-150600.13.17.1 * Server Applications Module 15-SP6 (noarch) * valkey-compat-redis-8.0.6-150600.13.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:09 -0000 Subject: SUSE-SU-2025:03504-1: important: Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) Message-ID: <175999860923.22729.446011345975234200@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 51 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03504-1 Release Date: 2025-10-09T06:33:53Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_185 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3504=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3504=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-13-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_51-debugsource-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_185-default-13-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_185-preempt-13-150300.2.1 * kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-13-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_185-default-13-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:15 -0000 Subject: SUSE-SU-2025:03503-1: important: Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) Message-ID: <175999861517.22729.6895987324201908049@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03503-1 Release Date: 2025-10-09T06:33:46Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_174 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3503=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3503=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-18-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_48-debugsource-18-150300.2.1 * kernel-livepatch-5_3_18-150300_59_174-default-18-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_174-preempt-18-150300.2.1 * kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-18-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_174-default-18-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:18 -0000 Subject: SUSE-SU-2025:03507-1: critical: Security update for redis Message-ID: <175999861814.22729.18021109570441348589@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:03507-1 Release Date: 2025-10-09T07:45:06Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3507=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3507=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3507=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3507=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * redis-debugsource-6.0.14-150200.6.43.1 * redis-6.0.14-150200.6.43.1 * redis-debuginfo-6.0.14-150200.6.43.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.0.14-150200.6.43.1 * redis-6.0.14-150200.6.43.1 * redis-debuginfo-6.0.14-150200.6.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * redis-debugsource-6.0.14-150200.6.43.1 * redis-6.0.14-150200.6.43.1 * redis-debuginfo-6.0.14-150200.6.43.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * redis-debugsource-6.0.14-150200.6.43.1 * redis-6.0.14-150200.6.43.1 * redis-debuginfo-6.0.14-150200.6.43.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:20 -0000 Subject: SUSE-SU-2025:03506-1: critical: Security update for redis Message-ID: <175999862057.22729.12595023056766190854@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:03506-1 Release Date: 2025-10-09T07:44:49Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves four vulnerabilities can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3506=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3506=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3506=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3506=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3506=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3506=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3506=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3506=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3506=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3506=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3506=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3506=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.40.1 * redis-debuginfo-6.2.6-150400.3.40.1 * redis-6.2.6-150400.3.40.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:23 -0000 Subject: SUSE-SU-2025:03505-1: critical: Security update for redis Message-ID: <175999862341.22729.3551647811513939931@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:03505-1 Release Date: 2025-10-09T07:43:10Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3505=1 openSUSE-SLE-15.6-2025-3505=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3505=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * redis-debugsource-7.2.4-150600.3.18.1 * redis-debuginfo-7.2.4-150600.3.18.1 * redis-7.2.4-150600.3.18.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * redis-debugsource-7.2.4-150600.3.18.1 * redis-debuginfo-7.2.4-150600.3.18.1 * redis-7.2.4-150600.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:25 -0000 Subject: SUSE-SU-2025:03502-1: critical: Security update for valkey Message-ID: <175999862575.22729.14693945611999685222@smelt2.prg2.suse.org> # Security update for valkey Announcement ID: SUSE-SU-2025:03502-1 Release Date: 2025-10-08T22:04:15Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for valkey to version 8.0.6 fixes the following security issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3502=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * valkey-8.0.6-150700.3.11.1 * valkey-debugsource-8.0.6-150700.3.11.1 * valkey-debuginfo-8.0.6-150700.3.11.1 * valkey-devel-8.0.6-150700.3.11.1 * Server Applications Module 15-SP7 (noarch) * valkey-compat-redis-8.0.6-150700.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 08:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 08:30:27 -0000 Subject: SUSE-SU-2025:03501-1: critical: Security update for redis7 Message-ID: <175999862798.22729.8652517166717733758@smelt2.prg2.suse.org> # Security update for redis7 Announcement ID: SUSE-SU-2025:03501-1 Release Date: 2025-10-08T21:04:47Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for redis7 fixes the following issues: * CVE-2025-49844: Malicious Lua scripts may lead to remote code execution. [bsc#1250995] * CVE-2025-46817: Malicious Lua scripts may lead to integer overflow and potential remote code execution. [bsc#1250995] * CVE-2025-46818: Malicious Lua scripts can be executed in the context of another user. [bsc#1250995] * CVE-2025-46819: Malicious Lua scripts can trigger out-of-bound reads to facilitate denial-of-service attacks. [bsc#1250995] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3501=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3501=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3501=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3501=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3501=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * redis7-debugsource-7.0.8-150500.3.24.1 * redis7-7.0.8-150500.3.24.1 * redis7-debuginfo-7.0.8-150500.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * redis7-debugsource-7.0.8-150500.3.24.1 * redis7-7.0.8-150500.3.24.1 * redis7-debuginfo-7.0.8-150500.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * redis7-debugsource-7.0.8-150500.3.24.1 * redis7-7.0.8-150500.3.24.1 * redis7-debuginfo-7.0.8-150500.3.24.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * redis7-debugsource-7.0.8-150500.3.24.1 * redis7-7.0.8-150500.3.24.1 * redis7-debuginfo-7.0.8-150500.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * redis7-debugsource-7.0.8-150500.3.24.1 * redis7-7.0.8-150500.3.24.1 * redis7-debuginfo-7.0.8-150500.3.24.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 12:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 12:30:13 -0000 Subject: SUSE-SU-2025:03511-1: moderate: Security update for python-xmltodict Message-ID: <176001301369.22729.1376008525186310119@smelt2.prg2.suse.org> # Security update for python-xmltodict Announcement ID: SUSE-SU-2025:03511-1 Release Date: 2025-10-09T08:34:06Z Rating: moderate References: * bsc#1249036 Cross-References: * CVE-2025-9375 CVSS scores: * CVE-2025-9375 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-9375 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-9375 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-xmltodict fixes the following issues: * CVE-2025-9375: XML injection vulnerability in `xmltodict` allows input data manipulation (bsc#1249036). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3511=1 openSUSE-SLE-15.6-2025-3511=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3511=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3511=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-xmltodict-0.13.0-150600.3.5.1 * Public Cloud Module 15-SP6 (noarch) * python311-xmltodict-0.13.0-150600.3.5.1 * Public Cloud Module 15-SP7 (noarch) * python311-xmltodict-0.13.0-150600.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249036 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 12:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 12:30:16 -0000 Subject: SUSE-SU-2025:03510-1: moderate: Security update for ImageMagick Message-ID: <176001301615.22729.16619577978952197300@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:03510-1 Release Date: 2025-10-09T08:33:45Z Rating: moderate References: * bsc#1249362 Cross-References: * CVE-2025-57807 CVSS scores: * CVE-2025-57807 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-57807 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-57807 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2025-57807 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-57807: heap out-of-bounds write can lead to memory corruption (bsc#1249362). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3510=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3510=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.43-150700.3.16.1 * ImageMagick-config-7-upstream-open-7.1.1.43-150700.3.16.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.16.1 * ImageMagick-7.1.1.43-150700.3.16.1 * libMagickCore-7_Q16HDRI10-7.1.1.43-150700.3.16.1 * ImageMagick-config-7-upstream-limited-7.1.1.43-150700.3.16.1 * libMagick++-7_Q16HDRI5-7.1.1.43-150700.3.16.1 * ImageMagick-config-7-upstream-websafe-7.1.1.43-150700.3.16.1 * ImageMagick-config-7-upstream-secure-7.1.1.43-150700.3.16.1 * ImageMagick-config-7-SUSE-7.1.1.43-150700.3.16.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.16.1 * libMagickWand-7_Q16HDRI10-7.1.1.43-150700.3.16.1 * ImageMagick-devel-7.1.1.43-150700.3.16.1 * ImageMagick-debugsource-7.1.1.43-150700.3.16.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.16.1 * libMagick++-devel-7.1.1.43-150700.3.16.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-debugsource-7.1.1.43-150700.3.16.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.16.1 * perl-PerlMagick-7.1.1.43-150700.3.16.1 * perl-PerlMagick-debuginfo-7.1.1.43-150700.3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2025-57807.html * https://bugzilla.suse.com/show_bug.cgi?id=1249362 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 12:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 12:30:18 -0000 Subject: SUSE-SU-2025:03509-1: moderate: Security update for ImageMagick Message-ID: <176001301857.22729.16092639285179419586@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:03509-1 Release Date: 2025-10-09T08:33:23Z Rating: moderate References: * bsc#1249362 Cross-References: * CVE-2025-57807 CVSS scores: * CVE-2025-57807 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-57807 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-57807 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2025-57807 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-57807: heap out-of-bounds write can lead to memory corruption (bsc#1249362). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3509=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3509=1 openSUSE-SLE-15.6-2025-3509=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3509=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-PerlMagick-7.1.1.21-150600.3.23.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.23.1 * ImageMagick-debugsource-7.1.1.21-150600.3.23.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.23.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.23.1 * ImageMagick-devel-7.1.1.21-150600.3.23.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.23.1 * perl-PerlMagick-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.23.1 * ImageMagick-extra-7.1.1.21-150600.3.23.1 * ImageMagick-extra-debuginfo-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.23.1 * libMagick++-devel-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.23.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.23.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.23.1 * ImageMagick-debugsource-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.23.1 * ImageMagick-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.23.1 * openSUSE Leap 15.6 (x86_64) * libMagick++-devel-32bit-7.1.1.21-150600.3.23.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.23.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.23.1 * ImageMagick-devel-32bit-7.1.1.21-150600.3.23.1 * openSUSE Leap 15.6 (noarch) * ImageMagick-doc-7.1.1.21-150600.3.23.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libMagick++-devel-64bit-7.1.1.21-150600.3.23.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.23.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.23.1 * ImageMagick-devel-64bit-7.1.1.21-150600.3.23.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.23.1 * ImageMagick-devel-7.1.1.21-150600.3.23.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.23.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.23.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.23.1 * libMagick++-devel-7.1.1.21-150600.3.23.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.23.1 * ImageMagick-debugsource-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.23.1 * ImageMagick-7.1.1.21-150600.3.23.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-57807.html * https://bugzilla.suse.com/show_bug.cgi?id=1249362 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 12:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 12:30:21 -0000 Subject: SUSE-SU-2025:03508-1: important: Security update for expat Message-ID: <176001302138.22729.17129125225987296645@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:03508-1 Release Date: 2025-10-09T08:33:01Z Rating: important References: * bsc#1249584 Cross-References: * CVE-2025-59375 CVSS scores: * CVE-2025-59375 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59375 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59375 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations by submitting crafted XML input (bsc#1249584). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3508=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libexpat-devel-2.7.1-150700.3.6.1 * expat-debugsource-2.7.1-150700.3.6.1 * expat-2.7.1-150700.3.6.1 * expat-debuginfo-2.7.1-150700.3.6.1 * libexpat1-2.7.1-150700.3.6.1 * libexpat1-debuginfo-2.7.1-150700.3.6.1 * Basesystem Module 15-SP7 (x86_64) * libexpat1-32bit-2.7.1-150700.3.6.1 * libexpat1-32bit-debuginfo-2.7.1-150700.3.6.1 * expat-32bit-debuginfo-2.7.1-150700.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 16:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 16:30:05 -0000 Subject: SUSE-SU-2025:03515-1: important: Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) Message-ID: <176002740561.14921.4130230532235269229@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 57 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03515-1 Release Date: 2025-10-09T12:04:22Z Rating: important References: * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_204 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3515=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3515=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_204-default-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_204-default-7-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_57-debugsource-7-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_204-preempt-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_204-preempt-debuginfo-7-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_204-default-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_204-default-7-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_57-debugsource-7-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 9 16:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 09 Oct 2025 16:30:13 -0000 Subject: SUSE-SU-2025:03514-1: important: Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) Message-ID: <176002741305.14921.10556470316573147382@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03514-1 Release Date: 2025-10-09T12:04:14Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_182 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3514=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3514=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_50-debugsource-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-default-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-15-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-preempt-15-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_182-default-15-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 08:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 08:30:08 -0000 Subject: SUSE-SU-2025:03523-1: important: Security update for openssl-1_1-livepatches Message-ID: <176008500865.6884.13248010121479445318@smelt2.prg2.suse.org> # Security update for openssl-1_1-livepatches Announcement ID: SUSE-SU-2025:03523-1 Release Date: 2025-10-10T07:23:16Z Rating: important References: * bsc#1224458 * bsc#1225552 * bsc#1250410 Cross-References: * CVE-2024-4741 * CVE-2025-9230 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-4741 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for openssl-1_1-livepatches fixes the following issues: * Add livepatch for CVE-2025-9230 (bsc#1250410). * Use strong externalization for ssl3_setup_read_buffer and ssl3_release_read_buffer * Use strong externalization for ossl_statem_fatal. * Add livepatch for CVE-2024-4741 (bsc#1225552). * Drop trigger rules for very old libpulp-tools package. * Fix building process to include functions of older livepatches correctly (bsc#1224458)'. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3523=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le x86_64) * openssl-1_1-livepatches-debuginfo-0.5-150700.13.3.1 * openssl-1_1-livepatches-debugsource-0.5-150700.13.3.1 * openssl-1_1-livepatches-0.5-150700.13.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1224458 * https://bugzilla.suse.com/show_bug.cgi?id=1225552 * https://bugzilla.suse.com/show_bug.cgi?id=1250410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 08:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 08:30:11 -0000 Subject: SUSE-SU-2025:03522-1: important: Security update for openssl-1_1-livepatches Message-ID: <176008501162.6884.7204055748858220414@smelt2.prg2.suse.org> # Security update for openssl-1_1-livepatches Announcement ID: SUSE-SU-2025:03522-1 Release Date: 2025-10-10T07:23:10Z Rating: important References: * bsc#1250410 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1-livepatches fixes the following issues: * Add livepatch for CVE-2025-9230 (bsc#1250410). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3522=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3522=1 ## Package List: * openSUSE Leap 15.5 (x86_64) * openssl-1_1-livepatches-debugsource-0.5-150500.6.11.1 * openssl-1_1-livepatches-debuginfo-0.5-150500.6.11.1 * openssl-1_1-livepatches-0.5-150500.6.11.1 * SUSE Linux Enterprise Live Patching 15-SP5 (x86_64) * openssl-1_1-livepatches-debugsource-0.5-150500.6.11.1 * openssl-1_1-livepatches-debuginfo-0.5-150500.6.11.1 * openssl-1_1-livepatches-0.5-150500.6.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 08:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 08:30:15 -0000 Subject: SUSE-SU-2025:03521-1: important: Security update for squid Message-ID: <176008501559.6884.10937402375765007757@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:03521-1 Release Date: 2025-10-10T07:23:05Z Rating: important References: * bsc#1225417 * bsc#1227086 * bsc#1250627 Cross-References: * CVE-2024-33427 * CVE-2024-37894 * CVE-2025-59362 CVSS scores: * CVE-2024-33427 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-37894 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-37894 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-59362 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59362 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59362 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-59362: fixed buffer overflow (bsc#1250627) * CVE-2024-37894: fixed denial of service in ESI processing (bsc#1227086) * CVE-2024-33427: fixed possible buffer overread leading to denial of service (bsc#1225417) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3521=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3521=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3521=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3521=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * squid-4.17-150000.5.55.1 * squid-debugsource-4.17-150000.5.55.1 * squid-debuginfo-4.17-150000.5.55.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * squid-4.17-150000.5.55.1 * squid-debugsource-4.17-150000.5.55.1 * squid-debuginfo-4.17-150000.5.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * squid-4.17-150000.5.55.1 * squid-debugsource-4.17-150000.5.55.1 * squid-debuginfo-4.17-150000.5.55.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * squid-4.17-150000.5.55.1 * squid-debugsource-4.17-150000.5.55.1 * squid-debuginfo-4.17-150000.5.55.1 ## References: * https://www.suse.com/security/cve/CVE-2024-33427.html * https://www.suse.com/security/cve/CVE-2024-37894.html * https://www.suse.com/security/cve/CVE-2025-59362.html * https://bugzilla.suse.com/show_bug.cgi?id=1225417 * https://bugzilla.suse.com/show_bug.cgi?id=1227086 * https://bugzilla.suse.com/show_bug.cgi?id=1250627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 08:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 08:30:18 -0000 Subject: SUSE-SU-2025:03520-1: important: Security update for cJSON Message-ID: <176008501880.6884.10461982191523239046@smelt2.prg2.suse.org> # Security update for cJSON Announcement ID: SUSE-SU-2025:03520-1 Release Date: 2025-10-10T07:22:45Z Rating: important References: * bsc#1241502 * bsc#1249112 Cross-References: * CVE-2023-26819 * CVE-2025-57052 CVSS scores: * CVE-2023-26819 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-26819 ( SUSE ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-26819 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-57052 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-57052 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-57052 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for cJSON fixes the following issues: * CVE-2023-26819: Allocate memory for the temporary buffer when paring numbers (bsc#1241502) * CVE-2025-57052: Fix the incorrect check in decode_array_index_from_pointer (bsc#1249112) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-3520=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libcjson1-debuginfo-1.7.19-150700.3.3.1 * cJSON-debugsource-1.7.19-150700.3.3.1 * libcjson1-1.7.19-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-26819.html * https://www.suse.com/security/cve/CVE-2025-57052.html * https://bugzilla.suse.com/show_bug.cgi?id=1241502 * https://bugzilla.suse.com/show_bug.cgi?id=1249112 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 12:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 12:30:09 -0000 Subject: SUSE-SU-2025:03525-1: moderate: Security update for go1.25-openssl Message-ID: <176009940929.22706.4263894099083361974@smelt2.prg2.suse.org> # Security update for go1.25-openssl Announcement ID: SUSE-SU-2025:03525-1 Release Date: 2025-10-10T10:33:25Z Rating: moderate References: * bsc#1244485 * bsc#1249141 * jsc#SLE-18320 Cross-References: * CVE-2025-47910 CVSS scores: * CVE-2025-47910 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-47910 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Description: This update for go1.25-openssl fixes the following issues: Update to version 1.25.1, released 2025-09-03 (bsc#1244485). Security issues fixed: * CVE-2025-47910: net/http: `CrossOriginProtection` insecure bypass patterns not limited to exact matches (bsc#1249141). Other issues fixed: * go#74822 cmd/go: "get toolchain at latest" should ignore release candidates * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755 * go#75021 testing/synctest: bubble not terminating * go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3525=1 SUSE-2025-3525=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3525=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3525=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * go1.25-openssl-1.25.1-150600.13.6.1 * go1.25-openssl-debuginfo-1.25.1-150600.13.6.1 * go1.25-openssl-doc-1.25.1-150600.13.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.25-openssl-race-1.25.1-150600.13.6.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.25-openssl-1.25.1-150600.13.6.1 * go1.25-openssl-race-1.25.1-150600.13.6.1 * go1.25-openssl-debuginfo-1.25.1-150600.13.6.1 * go1.25-openssl-doc-1.25.1-150600.13.6.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.25-openssl-1.25.1-150600.13.6.1 * go1.25-openssl-race-1.25.1-150600.13.6.1 * go1.25-openssl-debuginfo-1.25.1-150600.13.6.1 * go1.25-openssl-doc-1.25.1-150600.13.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47910.html * https://bugzilla.suse.com/show_bug.cgi?id=1244485 * https://bugzilla.suse.com/show_bug.cgi?id=1249141 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 12:30:12 -0000 Subject: SUSE-SU-2025:03524-1: moderate: Security update for go1.25-openssl Message-ID: <176009941252.22706.10804754172211655234@smelt2.prg2.suse.org> # Security update for go1.25-openssl Announcement ID: SUSE-SU-2025:03524-1 Release Date: 2025-10-10T10:33:09Z Rating: moderate References: * bsc#1244485 * bsc#1249141 * jsc#SLE-18320 Cross-References: * CVE-2025-47910 CVSS scores: * CVE-2025-47910 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-47910 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability, contains one feature and has one security fix can now be installed. ## Description: This update for go1.25-openssl fixes the following issues: Update to version 1.25.1, released 2025-09-03 (bsc#1244485). Security issues fixed: * CVE-2025-47910: net/http: `CrossOriginProtection` insecure bypass patterns not limited to exact matches (bsc#1249141). Other issues fixed: * go#74822 cmd/go: "get toolchain at latest" should ignore release candidates * go#74999 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination addresses on IPv4 UDP sockets * go#75008 os/exec: TestLookPath fails on plan9 after CL 685755 * go#75021 testing/synctest: bubble not terminating * go#75083 os: File.Seek doesn't set the correct offset with Windows overlapped handles ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3524=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3524=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3524=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3524=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3524=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3524=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3524=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3524=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3524=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.25-openssl-1.25.1-150000.1.6.1 * go1.25-openssl-doc-1.25.1-150000.1.6.1 * go1.25-openssl-debuginfo-1.25.1-150000.1.6.1 * go1.25-openssl-race-1.25.1-150000.1.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47910.html * https://bugzilla.suse.com/show_bug.cgi?id=1244485 * https://bugzilla.suse.com/show_bug.cgi?id=1249141 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:06 -0000 Subject: SUSE-SU-2025:03529-1: important: Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) Message-ID: <176011380646.22729.8268859958529467502@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 56 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03529-1 Release Date: 2025-10-10T15:03:55Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_201 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3529=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-3532=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3532=1 SUSE-2025-3529=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_56-debugsource-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_201-default-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_201-default-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_198-default-9-150300.2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_201-default-7-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_56-debugsource-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_198-default-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_201-default-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_198-default-9-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_55-debugsource-9-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_198-preempt-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_198-preempt-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_201-preempt-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_201-preempt-debuginfo-7-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:11 -0000 Subject: SUSE-SU-2025:03528-1: important: Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) Message-ID: <176011381117.22729.10688975016158892252@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 54 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03528-1 Release Date: 2025-10-10T12:03:57Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_195 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3528=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3528=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_195-default-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_195-default-debuginfo-9-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_54-debugsource-9-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_195-preempt-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_195-preempt-9-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_195-default-9-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:13 -0000 Subject: SUSE-SU-2025:03537-1: important: Security update for expat Message-ID: <176011381365.22729.3583803441285651837@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:03537-1 Release Date: 2025-10-10T15:21:56Z Rating: important References: * bsc#1249584 Cross-References: * CVE-2025-59375 CVSS scores: * CVE-2025-59375 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59375 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59375 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations by submitting crafted XML input (bsc#1249584). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3537=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3537=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3537=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3537=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3537=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3537=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3537=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * expat-debuginfo-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * libexpat-devel-2.7.1-150000.3.39.1 * libexpat1-2.7.1-150000.3.39.1 * expat-2.7.1-150000.3.39.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150000.3.39.1 * expat-32bit-debuginfo-2.7.1-150000.3.39.1 * libexpat1-32bit-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * expat-debuginfo-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * libexpat-devel-2.7.1-150000.3.39.1 * libexpat1-2.7.1-150000.3.39.1 * expat-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150000.3.39.1 * expat-32bit-debuginfo-2.7.1-150000.3.39.1 * libexpat1-32bit-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * expat-debuginfo-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * libexpat-devel-2.7.1-150000.3.39.1 * libexpat1-2.7.1-150000.3.39.1 * expat-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150000.3.39.1 * expat-32bit-debuginfo-2.7.1-150000.3.39.1 * libexpat1-32bit-2.7.1-150000.3.39.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * expat-debuginfo-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * libexpat-devel-2.7.1-150000.3.39.1 * libexpat1-2.7.1-150000.3.39.1 * expat-2.7.1-150000.3.39.1 * SUSE Enterprise Storage 7.1 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150000.3.39.1 * expat-32bit-debuginfo-2.7.1-150000.3.39.1 * libexpat1-32bit-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libexpat1-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * expat-debuginfo-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libexpat1-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * expat-debuginfo-2.7.1-150000.3.39.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libexpat1-2.7.1-150000.3.39.1 * libexpat1-debuginfo-2.7.1-150000.3.39.1 * expat-debugsource-2.7.1-150000.3.39.1 * expat-debuginfo-2.7.1-150000.3.39.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:15 -0000 Subject: SUSE-SU-2025:03536-1: important: Security update for expat Message-ID: <176011381596.22729.9578969592846961837@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:03536-1 Release Date: 2025-10-10T15:20:31Z Rating: important References: * bsc#1249584 Cross-References: * CVE-2025-59375 CVSS scores: * CVE-2025-59375 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59375 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59375 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations by submitting crafted XML input (bsc#1249584). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3536=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3536=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * expat-debuginfo-2.7.1-21.46.1 * libexpat-devel-2.7.1-21.46.1 * expat-debugsource-2.7.1-21.46.1 * libexpat1-2.7.1-21.46.1 * expat-2.7.1-21.46.1 * libexpat1-debuginfo-2.7.1-21.46.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libexpat1-32bit-2.7.1-21.46.1 * libexpat1-debuginfo-32bit-2.7.1-21.46.1 * expat-debuginfo-32bit-2.7.1-21.46.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * expat-debuginfo-2.7.1-21.46.1 * libexpat-devel-2.7.1-21.46.1 * expat-debugsource-2.7.1-21.46.1 * libexpat1-32bit-2.7.1-21.46.1 * expat-debuginfo-32bit-2.7.1-21.46.1 * libexpat1-2.7.1-21.46.1 * expat-2.7.1-21.46.1 * libexpat1-debuginfo-2.7.1-21.46.1 * libexpat1-debuginfo-32bit-2.7.1-21.46.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:18 -0000 Subject: SUSE-SU-2025:03535-1: important: Security update for open-vm-tools Message-ID: <176011381889.22729.6087501163971173798@smelt2.prg2.suse.org> # Security update for open-vm-tools Announcement ID: SUSE-SU-2025:03535-1 Release Date: 2025-10-10T15:15:26Z Rating: important References: * bsc#1250373 * bsc#1250692 Cross-References: * CVE-2025-41244 CVSS scores: * CVE-2025-41244 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-41244 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-41244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Containers Module 15-SP6 * Containers Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: \- CVE-2025-41244: fixed a local privilege escalation vulnerability (bnc#1250373). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3535=1 openSUSE-SLE-15.6-2025-3535=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3535=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3535=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-3535=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-3535=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3535=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3535=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64 i586) * open-vm-tools-sdmp-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-desktop-debuginfo-13.0.5-150600.3.21.1 * libvmtools0-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * open-vm-tools-desktop-13.0.5-150600.3.21.1 * libvmtools-devel-13.0.5-150600.3.21.1 * libvmtools0-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-containerinfo-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-containerinfo-13.0.5-150600.3.21.1 * open-vm-tools-13.0.5-150600.3.21.1 * open-vm-tools-sdmp-13.0.5-150600.3.21.1 * openSUSE Leap 15.6 (x86_64) * open-vm-tools-salt-minion-13.0.5-150600.3.21.1 * Basesystem Module 15-SP6 (aarch64 x86_64) * open-vm-tools-sdmp-debuginfo-13.0.5-150600.3.21.1 * libvmtools0-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * libvmtools0-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-13.0.5-150600.3.21.1 * open-vm-tools-sdmp-13.0.5-150600.3.21.1 * Basesystem Module 15-SP6 (x86_64) * open-vm-tools-salt-minion-13.0.5-150600.3.21.1 * libvmtools-devel-13.0.5-150600.3.21.1 * Basesystem Module 15-SP7 (aarch64 x86_64) * open-vm-tools-sdmp-debuginfo-13.0.5-150600.3.21.1 * libvmtools0-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * libvmtools0-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-13.0.5-150600.3.21.1 * open-vm-tools-sdmp-13.0.5-150600.3.21.1 * Basesystem Module 15-SP7 (x86_64) * open-vm-tools-salt-minion-13.0.5-150600.3.21.1 * libvmtools-devel-13.0.5-150600.3.21.1 * Containers Module 15-SP6 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-containerinfo-13.0.5-150600.3.21.1 * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 * Containers Module 15-SP7 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-containerinfo-13.0.5-150600.3.21.1 * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 * Desktop Applications Module 15-SP6 (aarch64 x86_64) * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * open-vm-tools-desktop-13.0.5-150600.3.21.1 * open-vm-tools-desktop-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 * Desktop Applications Module 15-SP7 (aarch64 x86_64) * open-vm-tools-debugsource-13.0.5-150600.3.21.1 * open-vm-tools-desktop-13.0.5-150600.3.21.1 * open-vm-tools-desktop-debuginfo-13.0.5-150600.3.21.1 * open-vm-tools-debuginfo-13.0.5-150600.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-41244.html * https://bugzilla.suse.com/show_bug.cgi?id=1250373 * https://bugzilla.suse.com/show_bug.cgi?id=1250692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:21 -0000 Subject: SUSE-SU-2025:03534-1: important: Security update for podman Message-ID: <176011382135.22729.15132584517306891758@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:03534-1 Release Date: 2025-10-10T15:14:56Z Rating: important References: * bsc#1249154 Cross-References: * CVE-2025-9566 CVSS scores: * CVE-2025-9566 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-9566 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-9566: fixed an issue where kube play command could cause host files to get overwritten (bsc#1249154) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3534=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3534=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3534=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3534=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3534=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3534=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3534=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3534=1 ## Package List: * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * podman-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * podman-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * podman-4.9.5-150300.9.55.1 * podman-debuginfo-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.55.1 * podman-debuginfo-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * podman-4.9.5-150300.9.55.1 * podman-debuginfo-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * podman-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-debuginfo-4.9.5-150300.9.55.1 * podmansh-4.9.5-150300.9.55.1 * openSUSE Leap 15.3 (noarch) * podman-docker-4.9.5-150300.9.55.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * podman-4.9.5-150300.9.55.1 * podman-remote-4.9.5-150300.9.55.1 * podman-remote-debuginfo-4.9.5-150300.9.55.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9566.html * https://bugzilla.suse.com/show_bug.cgi?id=1249154 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 16:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 16:30:24 -0000 Subject: SUSE-SU-2025:03533-1: moderate: Security update for podofo Message-ID: <176011382441.22729.12242874539090468426@smelt2.prg2.suse.org> # Security update for podofo Announcement ID: SUSE-SU-2025:03533-1 Release Date: 2025-10-10T15:14:06Z Rating: moderate References: * bsc#1231058 * bsc#1249105 Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has two security fixes can now be installed. ## Description: This update for podofo fixes the following issues: * fixed a free-after-use in PdfTokenizer (bsc#1249105) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3533=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libpodofo-devel-1.0.2-150700.3.3.1 * podofo-debugsource-1.0.2-150700.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231058 * https://bugzilla.suse.com/show_bug.cgi?id=1249105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 20:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 20:30:07 -0000 Subject: SUSE-SU-2025:03539-1: important: Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) Message-ID: <176012820719.22729.14906983695717481387@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03539-1 Release Date: 2025-10-10T18:33:53Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_141 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3539=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3539=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_33-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-15-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_33-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-15-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 20:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 20:30:12 -0000 Subject: SUSE-SU-2025:03538-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Message-ID: <176012821218.22729.16571630395761603100@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03538-1 Release Date: 2025-10-10T18:03:53Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_188 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3538=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3538=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_188-default-debuginfo-12-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_52-debugsource-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-default-12-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_188-preempt-debuginfo-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-preempt-12-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_188-default-12-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 10 20:32:36 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 10 Oct 2025 20:32:36 -0000 Subject: SUSE-SU-2025:03540-1: important: Security update for docker-stable Message-ID: <176012835607.22729.13953064519998849283@smelt2.prg2.suse.org> # Security update for docker-stable Announcement ID: SUSE-SU-2025:03540-1 Release Date: 2025-10-10T19:04:05Z Rating: important References: * bsc#1001161 * bsc#1004490 * bsc#1007249 * bsc#1009961 * bsc#1012568 * bsc#1015661 * bsc#1016307 * bsc#1016992 * bsc#1019251 * bsc#1020806 * bsc#1021227 * bsc#1026827 * bsc#1028638 * bsc#1028639 * bsc#1029320 * bsc#1029630 * bsc#1030702 * bsc#1032287 * bsc#1032644 * bsc#1034053 * bsc#1034063 * bsc#1037436 * bsc#1037607 * bsc#1038476 * bsc#1038493 * bsc#1045628 * bsc#1046024 * bsc#1047218 * bsc#1048046 * bsc#1051429 * bsc#1055676 * bsc#1057743 * bsc#1058173 * bsc#1059011 * bsc#1064781 * bsc#1065609 * bsc#1066210 * bsc#1066801 * bsc#1069468 * bsc#1069758 * bsc#1072798 * bsc#1073877 * bsc#1074971 * bsc#1080978 * bsc#1084533 * bsc#1085117 * bsc#1085380 * bsc#1086185 * bsc#1089732 * bsc#1095817 * bsc#1096726 * bsc#1099277 * bsc#1100331 * bsc#1100727 * bsc#1102522 * bsc#1104821 * bsc#1105000 * bsc#1108038 * bsc#1112980 * bsc#1113313 * bsc#1114832 * bsc#1115464 * bsc#1118897 * bsc#1118898 * bsc#1118899 * bsc#1118990 * bsc#1119634 * bsc#1121412 * bsc#1121768 * bsc#1122469 * bsc#1124308 * bsc#1128376 * bsc#1128746 * bsc#1134068 * bsc#1138920 * bsc#1139649 * bsc#1142160 * bsc#1142413 * bsc#1143349 * bsc#1150397 * bsc#1153367 * bsc#1157330 * bsc#1158590 * bsc#1170415 * bsc#1170446 * bsc#1172377 * bsc#1174075 * bsc#1175081 * bsc#1176708 * bsc#1178760 * bsc#1178801 * bsc#1180243 * bsc#1180401 * bsc#1181594 * bsc#1181641 * bsc#1181677 * bsc#1181730 * bsc#1181732 * bsc#1182168 * bsc#1182476 * bsc#1182947 * bsc#1183855 * bsc#1184768 * bsc#1188447 * bsc#1190670 * bsc#1191015 * bsc#1191121 * bsc#1191334 * bsc#1191355 * bsc#1191434 * bsc#1192814 * bsc#1193273 * bsc#1193930 * bsc#1197284 * bsc#1197517 * bsc#1200022 * bsc#1200145 * bsc#1205375 * bsc#1206065 * bsc#1208074 * bsc#1210141 * bsc#1210797 * bsc#1211578 * bsc#1212368 * bsc#1213120 * bsc#1213229 * bsc#1213500 * bsc#1214107 * bsc#1214108 * bsc#1214109 * bsc#1215323 * bsc#1217513 * bsc#1219267 * bsc#1219268 * bsc#1219438 * bsc#1240150 * bsc#1247362 * bsc#1250508 * bsc#1250596 * bsc#885209 * bsc#907012 * bsc#907014 * bsc#908033 * bsc#909709 * bsc#909710 * bsc#909712 * bsc#913211 * bsc#913213 * bsc#920645 * bsc#930235 * bsc#931301 * bsc#935570 * bsc#938156 * bsc#942369 * bsc#942370 * bsc#946653 * bsc#949660 * bsc#950931 * bsc#953182 * bsc#954737 * bsc#954797 * bsc#954812 * bsc#956434 * bsc#958255 * bsc#959405 * bsc#963142 * bsc#964468 * bsc#964673 * bsc#965600 * bsc#965918 * bsc#968933 * bsc#968972 * bsc#970637 * bsc#974208 * bsc#976777 * bsc#977394 * bsc#978260 * bsc#980555 * bsc#983015 * bsc#984942 * bsc#987198 * bsc#988408 * bsc#988707 * bsc#989566 * bsc#993847 * bsc#995058 * bsc#995102 * bsc#995620 * bsc#996015 * bsc#999582 * jsc#SLE-16460 Cross-References: * CVE-2014-3499 * CVE-2014-5277 * CVE-2014-6407 * CVE-2014-6408 * CVE-2014-8178 * CVE-2014-8179 * CVE-2014-9356 * CVE-2014-9357 * CVE-2014-9358 * CVE-2015-3627 * CVE-2015-3629 * CVE-2015-3630 * CVE-2015-3631 * CVE-2016-3697 * CVE-2016-8867 * CVE-2016-9962 * CVE-2017-14992 * CVE-2017-16539 * CVE-2018-10892 * CVE-2018-15664 * CVE-2018-16873 * CVE-2018-16874 * CVE-2018-16875 * CVE-2018-20699 * CVE-2019-13509 * CVE-2019-14271 * CVE-2020-12912 * CVE-2020-13401 * CVE-2020-15257 * CVE-2020-8694 * CVE-2020-8695 * CVE-2021-21284 * CVE-2021-21285 * CVE-2021-41089 * CVE-2021-41091 * CVE-2021-41092 * CVE-2021-41103 * CVE-2021-41190 * CVE-2021-43565 * CVE-2022-24769 * CVE-2022-27191 * CVE-2022-36109 * CVE-2023-28840 * CVE-2023-28841 * CVE-2023-28842 * CVE-2024-2365 * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 * CVE-2024-29018 * CVE-2024-41110 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2014-8178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2014-8179 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2014-9356 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2015-3629 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2016-3697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2016-3697 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2016-8867 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2016-9962 ( NVD ): 6.4 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2017-14992 ( SUSE ): 6.2 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2017-14992 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2017-16539 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2017-16539 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-10892 ( SUSE ): 6.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2018-10892 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2018-10892 ( NVD ): 6.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2018-15664 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2018-15664 ( NVD ): 7.5 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2018-16873 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2018-16873 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16873 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16874 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2018-16874 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16874 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16875 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-16875 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-20699 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-20699 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2019-13509 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2019-13509 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2019-14271 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2019-14271 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2019-14271 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2020-12912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-12912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-13401 ( SUSE ): 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2020-13401 ( NVD ): 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2020-15257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2020-15257 ( NVD ): 5.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2020-8694 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-8694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-8695 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2020-8695 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-21284 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N * CVE-2021-21284 ( NVD ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N * CVE-2021-21285 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-21285 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-41089 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2021-41089 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2021-41091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2021-41091 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2021-41092 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N * CVE-2021-41092 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-41103 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2021-41103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-41190 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2021-41190 ( NVD ): 3.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N * CVE-2021-43565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-43565 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-24769 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-24769 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-27191 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-27191 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36109 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-36109 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-36109 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-28840 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L * CVE-2023-28840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L * CVE-2023-28841 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2023-28841 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2023-28842 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2023-28842 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 53 vulnerabilities, contains one feature and has 137 security fixes can now be installed. ## Description: This update for docker-stable fixes the following issues: * Include historical changelog data from before the docker-stable fork. The initial changelog entry did technically provide all the necessary information, but our CVE tracking tools do not understand how the package is forked and so it seems that this package does not include fixes for ~12 years of updates. So, include a copy of the original package's changelog up until the fork point. (bsc#1250596) * Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes by default and thus end up installing git with Docker. bsc#1250508 This feature is mostly intended for developers ("docker build git://") so most users already have the dependency installed, and the error when git is missing is fairly straightforward (so they can easily figure out what they need to install). * Backport . bsc#1247362 * Update to docker-buildx v0.25.0. Upstream changelog: * Do not try to inject SUSEConnect secrets when in Rootless Docker mode, as Docker does not have permission to access the host zypper credentials in this mode (and unprivileged users cannot disable the feature using /etc/docker/suse-secrets-enable.) bsc#1240150 * Initial docker-stable fork, forked from Docker 24.0.7-ce release (packaged on 2024-02-14). The original changelog is included below for historical reference. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3540=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3540=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-debuginfo-24.0.9_ce-1.20.1 * docker-stable-24.0.9_ce-1.20.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-1.20.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-stable-debuginfo-24.0.9_ce-1.20.1 * docker-stable-24.0.9_ce-1.20.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-stable-bash-completion-24.0.9_ce-1.20.1 ## References: * https://www.suse.com/security/cve/CVE-2014-3499.html * https://www.suse.com/security/cve/CVE-2014-5277.html * https://www.suse.com/security/cve/CVE-2014-6407.html * https://www.suse.com/security/cve/CVE-2014-6408.html * https://www.suse.com/security/cve/CVE-2014-8178.html * https://www.suse.com/security/cve/CVE-2014-8179.html * https://www.suse.com/security/cve/CVE-2014-9356.html * https://www.suse.com/security/cve/CVE-2014-9357.html * https://www.suse.com/security/cve/CVE-2014-9358.html * https://www.suse.com/security/cve/CVE-2015-3627.html * https://www.suse.com/security/cve/CVE-2015-3629.html * https://www.suse.com/security/cve/CVE-2015-3630.html * https://www.suse.com/security/cve/CVE-2015-3631.html * https://www.suse.com/security/cve/CVE-2016-3697.html * https://www.suse.com/security/cve/CVE-2016-8867.html * https://www.suse.com/security/cve/CVE-2016-9962.html * https://www.suse.com/security/cve/CVE-2017-14992.html * https://www.suse.com/security/cve/CVE-2017-16539.html * https://www.suse.com/security/cve/CVE-2018-10892.html * https://www.suse.com/security/cve/CVE-2018-15664.html * https://www.suse.com/security/cve/CVE-2018-16873.html * https://www.suse.com/security/cve/CVE-2018-16874.html * https://www.suse.com/security/cve/CVE-2018-16875.html * https://www.suse.com/security/cve/CVE-2018-20699.html * https://www.suse.com/security/cve/CVE-2019-13509.html * https://www.suse.com/security/cve/CVE-2019-14271.html * https://www.suse.com/security/cve/CVE-2020-12912.html * https://www.suse.com/security/cve/CVE-2020-13401.html * https://www.suse.com/security/cve/CVE-2020-15257.html * https://www.suse.com/security/cve/CVE-2020-8694.html * https://www.suse.com/security/cve/CVE-2020-8695.html * https://www.suse.com/security/cve/CVE-2021-21284.html * https://www.suse.com/security/cve/CVE-2021-21285.html * https://www.suse.com/security/cve/CVE-2021-41089.html * https://www.suse.com/security/cve/CVE-2021-41091.html * https://www.suse.com/security/cve/CVE-2021-41092.html * https://www.suse.com/security/cve/CVE-2021-41103.html * https://www.suse.com/security/cve/CVE-2021-41190.html * https://www.suse.com/security/cve/CVE-2021-43565.html * https://www.suse.com/security/cve/CVE-2022-24769.html * https://www.suse.com/security/cve/CVE-2022-27191.html * https://www.suse.com/security/cve/CVE-2022-36109.html * https://www.suse.com/security/cve/CVE-2023-28840.html * https://www.suse.com/security/cve/CVE-2023-28841.html * https://www.suse.com/security/cve/CVE-2023-28842.html * https://www.suse.com/security/cve/CVE-2024-2365.html * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1001161 * https://bugzilla.suse.com/show_bug.cgi?id=1004490 * https://bugzilla.suse.com/show_bug.cgi?id=1007249 * https://bugzilla.suse.com/show_bug.cgi?id=1009961 * https://bugzilla.suse.com/show_bug.cgi?id=1012568 * https://bugzilla.suse.com/show_bug.cgi?id=1015661 * https://bugzilla.suse.com/show_bug.cgi?id=1016307 * https://bugzilla.suse.com/show_bug.cgi?id=1016992 * https://bugzilla.suse.com/show_bug.cgi?id=1019251 * https://bugzilla.suse.com/show_bug.cgi?id=1020806 * https://bugzilla.suse.com/show_bug.cgi?id=1021227 * https://bugzilla.suse.com/show_bug.cgi?id=1026827 * https://bugzilla.suse.com/show_bug.cgi?id=1028638 * https://bugzilla.suse.com/show_bug.cgi?id=1028639 * https://bugzilla.suse.com/show_bug.cgi?id=1029320 * https://bugzilla.suse.com/show_bug.cgi?id=1029630 * https://bugzilla.suse.com/show_bug.cgi?id=1030702 * https://bugzilla.suse.com/show_bug.cgi?id=1032287 * https://bugzilla.suse.com/show_bug.cgi?id=1032644 * https://bugzilla.suse.com/show_bug.cgi?id=1034053 * https://bugzilla.suse.com/show_bug.cgi?id=1034063 * https://bugzilla.suse.com/show_bug.cgi?id=1037436 * https://bugzilla.suse.com/show_bug.cgi?id=1037607 * https://bugzilla.suse.com/show_bug.cgi?id=1038476 * https://bugzilla.suse.com/show_bug.cgi?id=1038493 * https://bugzilla.suse.com/show_bug.cgi?id=1045628 * https://bugzilla.suse.com/show_bug.cgi?id=1046024 * https://bugzilla.suse.com/show_bug.cgi?id=1047218 * https://bugzilla.suse.com/show_bug.cgi?id=1048046 * https://bugzilla.suse.com/show_bug.cgi?id=1051429 * https://bugzilla.suse.com/show_bug.cgi?id=1055676 * https://bugzilla.suse.com/show_bug.cgi?id=1057743 * https://bugzilla.suse.com/show_bug.cgi?id=1058173 * https://bugzilla.suse.com/show_bug.cgi?id=1059011 * https://bugzilla.suse.com/show_bug.cgi?id=1064781 * https://bugzilla.suse.com/show_bug.cgi?id=1065609 * https://bugzilla.suse.com/show_bug.cgi?id=1066210 * https://bugzilla.suse.com/show_bug.cgi?id=1066801 * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1069758 * https://bugzilla.suse.com/show_bug.cgi?id=1072798 * https://bugzilla.suse.com/show_bug.cgi?id=1073877 * https://bugzilla.suse.com/show_bug.cgi?id=1074971 * https://bugzilla.suse.com/show_bug.cgi?id=1080978 * https://bugzilla.suse.com/show_bug.cgi?id=1084533 * https://bugzilla.suse.com/show_bug.cgi?id=1085117 * https://bugzilla.suse.com/show_bug.cgi?id=1085380 * https://bugzilla.suse.com/show_bug.cgi?id=1086185 * https://bugzilla.suse.com/show_bug.cgi?id=1089732 * https://bugzilla.suse.com/show_bug.cgi?id=1095817 * https://bugzilla.suse.com/show_bug.cgi?id=1096726 * https://bugzilla.suse.com/show_bug.cgi?id=1099277 * https://bugzilla.suse.com/show_bug.cgi?id=1100331 * https://bugzilla.suse.com/show_bug.cgi?id=1100727 * https://bugzilla.suse.com/show_bug.cgi?id=1102522 * https://bugzilla.suse.com/show_bug.cgi?id=1104821 * https://bugzilla.suse.com/show_bug.cgi?id=1105000 * https://bugzilla.suse.com/show_bug.cgi?id=1108038 * https://bugzilla.suse.com/show_bug.cgi?id=1112980 * https://bugzilla.suse.com/show_bug.cgi?id=1113313 * https://bugzilla.suse.com/show_bug.cgi?id=1114832 * https://bugzilla.suse.com/show_bug.cgi?id=1115464 * https://bugzilla.suse.com/show_bug.cgi?id=1118897 * https://bugzilla.suse.com/show_bug.cgi?id=1118898 * https://bugzilla.suse.com/show_bug.cgi?id=1118899 * https://bugzilla.suse.com/show_bug.cgi?id=1118990 * https://bugzilla.suse.com/show_bug.cgi?id=1119634 * https://bugzilla.suse.com/show_bug.cgi?id=1121412 * https://bugzilla.suse.com/show_bug.cgi?id=1121768 * https://bugzilla.suse.com/show_bug.cgi?id=1122469 * https://bugzilla.suse.com/show_bug.cgi?id=1124308 * https://bugzilla.suse.com/show_bug.cgi?id=1128376 * https://bugzilla.suse.com/show_bug.cgi?id=1128746 * https://bugzilla.suse.com/show_bug.cgi?id=1134068 * https://bugzilla.suse.com/show_bug.cgi?id=1138920 * https://bugzilla.suse.com/show_bug.cgi?id=1139649 * https://bugzilla.suse.com/show_bug.cgi?id=1142160 * https://bugzilla.suse.com/show_bug.cgi?id=1142413 * https://bugzilla.suse.com/show_bug.cgi?id=1143349 * https://bugzilla.suse.com/show_bug.cgi?id=1150397 * https://bugzilla.suse.com/show_bug.cgi?id=1153367 * https://bugzilla.suse.com/show_bug.cgi?id=1157330 * https://bugzilla.suse.com/show_bug.cgi?id=1158590 * https://bugzilla.suse.com/show_bug.cgi?id=1170415 * https://bugzilla.suse.com/show_bug.cgi?id=1170446 * https://bugzilla.suse.com/show_bug.cgi?id=1172377 * https://bugzilla.suse.com/show_bug.cgi?id=1174075 * https://bugzilla.suse.com/show_bug.cgi?id=1175081 * https://bugzilla.suse.com/show_bug.cgi?id=1176708 * https://bugzilla.suse.com/show_bug.cgi?id=1178760 * https://bugzilla.suse.com/show_bug.cgi?id=1178801 * https://bugzilla.suse.com/show_bug.cgi?id=1180243 * https://bugzilla.suse.com/show_bug.cgi?id=1180401 * https://bugzilla.suse.com/show_bug.cgi?id=1181594 * https://bugzilla.suse.com/show_bug.cgi?id=1181641 * https://bugzilla.suse.com/show_bug.cgi?id=1181677 * https://bugzilla.suse.com/show_bug.cgi?id=1181730 * https://bugzilla.suse.com/show_bug.cgi?id=1181732 * https://bugzilla.suse.com/show_bug.cgi?id=1182168 * https://bugzilla.suse.com/show_bug.cgi?id=1182476 * https://bugzilla.suse.com/show_bug.cgi?id=1182947 * https://bugzilla.suse.com/show_bug.cgi?id=1183855 * https://bugzilla.suse.com/show_bug.cgi?id=1184768 * https://bugzilla.suse.com/show_bug.cgi?id=1188447 * https://bugzilla.suse.com/show_bug.cgi?id=1190670 * https://bugzilla.suse.com/show_bug.cgi?id=1191015 * https://bugzilla.suse.com/show_bug.cgi?id=1191121 * https://bugzilla.suse.com/show_bug.cgi?id=1191334 * https://bugzilla.suse.com/show_bug.cgi?id=1191355 * https://bugzilla.suse.com/show_bug.cgi?id=1191434 * https://bugzilla.suse.com/show_bug.cgi?id=1192814 * https://bugzilla.suse.com/show_bug.cgi?id=1193273 * https://bugzilla.suse.com/show_bug.cgi?id=1193930 * https://bugzilla.suse.com/show_bug.cgi?id=1197284 * https://bugzilla.suse.com/show_bug.cgi?id=1197517 * https://bugzilla.suse.com/show_bug.cgi?id=1200022 * https://bugzilla.suse.com/show_bug.cgi?id=1200145 * https://bugzilla.suse.com/show_bug.cgi?id=1205375 * https://bugzilla.suse.com/show_bug.cgi?id=1206065 * https://bugzilla.suse.com/show_bug.cgi?id=1208074 * https://bugzilla.suse.com/show_bug.cgi?id=1210141 * https://bugzilla.suse.com/show_bug.cgi?id=1210797 * https://bugzilla.suse.com/show_bug.cgi?id=1211578 * https://bugzilla.suse.com/show_bug.cgi?id=1212368 * https://bugzilla.suse.com/show_bug.cgi?id=1213120 * https://bugzilla.suse.com/show_bug.cgi?id=1213229 * https://bugzilla.suse.com/show_bug.cgi?id=1213500 * https://bugzilla.suse.com/show_bug.cgi?id=1214107 * https://bugzilla.suse.com/show_bug.cgi?id=1214108 * https://bugzilla.suse.com/show_bug.cgi?id=1214109 * https://bugzilla.suse.com/show_bug.cgi?id=1215323 * https://bugzilla.suse.com/show_bug.cgi?id=1217513 * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 * https://bugzilla.suse.com/show_bug.cgi?id=1240150 * https://bugzilla.suse.com/show_bug.cgi?id=1247362 * https://bugzilla.suse.com/show_bug.cgi?id=1250508 * https://bugzilla.suse.com/show_bug.cgi?id=1250596 * https://bugzilla.suse.com/show_bug.cgi?id=885209 * https://bugzilla.suse.com/show_bug.cgi?id=907012 * https://bugzilla.suse.com/show_bug.cgi?id=907014 * https://bugzilla.suse.com/show_bug.cgi?id=908033 * https://bugzilla.suse.com/show_bug.cgi?id=909709 * https://bugzilla.suse.com/show_bug.cgi?id=909710 * https://bugzilla.suse.com/show_bug.cgi?id=909712 * https://bugzilla.suse.com/show_bug.cgi?id=913211 * https://bugzilla.suse.com/show_bug.cgi?id=913213 * https://bugzilla.suse.com/show_bug.cgi?id=920645 * https://bugzilla.suse.com/show_bug.cgi?id=930235 * https://bugzilla.suse.com/show_bug.cgi?id=931301 * https://bugzilla.suse.com/show_bug.cgi?id=935570 * https://bugzilla.suse.com/show_bug.cgi?id=938156 * https://bugzilla.suse.com/show_bug.cgi?id=942369 * https://bugzilla.suse.com/show_bug.cgi?id=942370 * https://bugzilla.suse.com/show_bug.cgi?id=946653 * https://bugzilla.suse.com/show_bug.cgi?id=949660 * https://bugzilla.suse.com/show_bug.cgi?id=950931 * https://bugzilla.suse.com/show_bug.cgi?id=953182 * https://bugzilla.suse.com/show_bug.cgi?id=954737 * https://bugzilla.suse.com/show_bug.cgi?id=954797 * https://bugzilla.suse.com/show_bug.cgi?id=954812 * https://bugzilla.suse.com/show_bug.cgi?id=956434 * https://bugzilla.suse.com/show_bug.cgi?id=958255 * https://bugzilla.suse.com/show_bug.cgi?id=959405 * https://bugzilla.suse.com/show_bug.cgi?id=963142 * https://bugzilla.suse.com/show_bug.cgi?id=964468 * https://bugzilla.suse.com/show_bug.cgi?id=964673 * https://bugzilla.suse.com/show_bug.cgi?id=965600 * https://bugzilla.suse.com/show_bug.cgi?id=965918 * https://bugzilla.suse.com/show_bug.cgi?id=968933 * https://bugzilla.suse.com/show_bug.cgi?id=968972 * https://bugzilla.suse.com/show_bug.cgi?id=970637 * https://bugzilla.suse.com/show_bug.cgi?id=974208 * https://bugzilla.suse.com/show_bug.cgi?id=976777 * https://bugzilla.suse.com/show_bug.cgi?id=977394 * https://bugzilla.suse.com/show_bug.cgi?id=978260 * https://bugzilla.suse.com/show_bug.cgi?id=980555 * https://bugzilla.suse.com/show_bug.cgi?id=983015 * https://bugzilla.suse.com/show_bug.cgi?id=984942 * https://bugzilla.suse.com/show_bug.cgi?id=987198 * https://bugzilla.suse.com/show_bug.cgi?id=988408 * https://bugzilla.suse.com/show_bug.cgi?id=988707 * https://bugzilla.suse.com/show_bug.cgi?id=989566 * https://bugzilla.suse.com/show_bug.cgi?id=993847 * https://bugzilla.suse.com/show_bug.cgi?id=995058 * https://bugzilla.suse.com/show_bug.cgi?id=995102 * https://bugzilla.suse.com/show_bug.cgi?id=995620 * https://bugzilla.suse.com/show_bug.cgi?id=996015 * https://bugzilla.suse.com/show_bug.cgi?id=999582 * https://jira.suse.com/browse/SLE-16460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:15 -0000 Subject: SUSE-SU-2025:03580-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Message-ID: <176034439542.22706.5585234806338136232@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03580-1 Release Date: 2025-10-13T03:33:38Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_179 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3580=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3580=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-17-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-preempt-17-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-17-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:18 -0000 Subject: SUSE-SU-2025:03583-1: important: Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3) Message-ID: <176034439828.22706.9470355837807362038@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 60 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:03583-1 Release Date: 2025-10-13T06:04:04Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_215 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3583=1 SUSE-2025-3581=1 SUSE-2025-3579=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3583=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-3581=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-3579=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_215-default-debuginfo-3-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_60-debugsource-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-default-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-default-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_59-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-default-debuginfo-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_58-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-default-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-default-3-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_207-preempt-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-preempt-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-preempt-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-preempt-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-preempt-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-preempt-debuginfo-6-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_215-default-debuginfo-3-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_60-debugsource-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-default-debuginfo-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_211-default-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_59-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-default-debuginfo-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_58-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_207-default-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_215-default-3-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:22 -0000 Subject: SUSE-SU-2025:03578-1: important: Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP4) Message-ID: <176034440245.22706.4209684639773882003@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 39 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03578-1 Release Date: 2025-10-13T07:04:11Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_161 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3588=1 SUSE-2025-3578=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3588=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-3578=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_38-debugsource-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-7-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_38-debugsource-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-7-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:25 -0000 Subject: SUSE-SU-2025:03589-1: moderate: Security update for haproxy Message-ID: <176034440509.22706.10107187473778667796@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:03589-1 Release Date: 2025-10-13T07:04:42Z Rating: moderate References: * bsc#1250983 Cross-References: * CVE-2025-11230 CVSS scores: * CVE-2025-11230 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11230 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-11230: Fixed issue in the mjson JSON decoder, that could have let to excessive resource consumption when processing numbers with large exponents (bsc#1250983). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3589=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3589=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3589=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3589=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3589=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3589=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-3589=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-3589=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.25.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.25.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:27 -0000 Subject: SUSE-SU-2025:03587-1: moderate: Security update for haproxy Message-ID: <176034440780.22706.517783360114356418@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:03587-1 Release Date: 2025-10-13T07:04:02Z Rating: moderate References: * bsc#1250983 Cross-References: * CVE-2025-11230 CVSS scores: * CVE-2025-11230 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11230 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-11230: Fixed issue in the mjson JSON decoder, that could have let to excessive resource consumption when processing numbers with large exponents (bsc#1250983). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3587=1 openSUSE-SLE-15.6-2025-3587=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-3587=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-3587=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * haproxy-2.8.11+git0.01c1056a4-150600.3.9.1 * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.9.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.9.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * haproxy-2.8.11+git0.01c1056a4-150600.3.9.1 * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.9.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.9.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * haproxy-2.8.11+git0.01c1056a4-150600.3.9.1 * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.9.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:30 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:30 -0000 Subject: SUSE-SU-2025:03586-1: important: Security update for openssl-3-livepatches Message-ID: <176034441025.22706.16923328739817580504@smelt2.prg2.suse.org> # Security update for openssl-3-livepatches Announcement ID: SUSE-SU-2025:03586-1 Release Date: 2025-10-13T07:02:35Z Rating: important References: * bsc#1250410 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3-livepatches fixes the following issues: * CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap (bsc#1250410). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3586=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3586=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3586=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * openssl-3-livepatches-debuginfo-0.2-150600.13.8.1 * openssl-3-livepatches-debugsource-0.2-150600.13.8.1 * openssl-3-livepatches-0.2-150600.13.8.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * openssl-3-livepatches-debuginfo-0.2-150600.13.8.1 * openssl-3-livepatches-debugsource-0.2-150600.13.8.1 * openssl-3-livepatches-0.2-150600.13.8.1 * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * openssl-3-livepatches-debuginfo-0.2-150600.13.8.1 * openssl-3-livepatches-debugsource-0.2-150600.13.8.1 * openssl-3-livepatches-0.2-150600.13.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:34 -0000 Subject: SUSE-SU-2025:03585-1: important: Security update for open-vm-tools Message-ID: <176034441445.22706.17950854690118933763@smelt2.prg2.suse.org> # Security update for open-vm-tools Announcement ID: SUSE-SU-2025:03585-1 Release Date: 2025-10-13T06:59:46Z Rating: important References: * bsc#1250373 * bsc#1250692 Cross-References: * CVE-2025-41244 CVSS scores: * CVE-2025-41244 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-41244 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-41244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * CVE-2025-41244: fixed a local privilege escalation vulnerability (bnc#1250373). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3585=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3585=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * open-vm-tools-salt-minion-13.0.5-4.92.1 * open-vm-tools-sdmp-13.0.5-4.92.1 * open-vm-tools-debugsource-13.0.5-4.92.1 * open-vm-tools-sdmp-debuginfo-13.0.5-4.92.1 * open-vm-tools-desktop-debuginfo-13.0.5-4.92.1 * libvmtools0-13.0.5-4.92.1 * open-vm-tools-debuginfo-13.0.5-4.92.1 * open-vm-tools-13.0.5-4.92.1 * libvmtools0-debuginfo-13.0.5-4.92.1 * open-vm-tools-desktop-13.0.5-4.92.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * open-vm-tools-salt-minion-13.0.5-4.92.1 * open-vm-tools-sdmp-13.0.5-4.92.1 * open-vm-tools-debugsource-13.0.5-4.92.1 * open-vm-tools-sdmp-debuginfo-13.0.5-4.92.1 * open-vm-tools-desktop-debuginfo-13.0.5-4.92.1 * libvmtools0-13.0.5-4.92.1 * open-vm-tools-debuginfo-13.0.5-4.92.1 * open-vm-tools-13.0.5-4.92.1 * libvmtools0-debuginfo-13.0.5-4.92.1 * open-vm-tools-desktop-13.0.5-4.92.1 ## References: * https://www.suse.com/security/cve/CVE-2025-41244.html * https://bugzilla.suse.com/show_bug.cgi?id=1250373 * https://bugzilla.suse.com/show_bug.cgi?id=1250692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:36 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:36 -0000 Subject: SUSE-SU-2025:03584-1: important: Security update for podman Message-ID: <176034441687.22706.4596618076277445967@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:03584-1 Release Date: 2025-10-13T06:59:34Z Rating: important References: * bsc#1249154 Cross-References: * CVE-2025-9566 CVSS scores: * CVE-2025-9566 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-9566 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-9566: fixed an issue in kube play command that could cause overwriting host files (bsc#1249154) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3584=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3584=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3584=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3584=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3584=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3584=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3584=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3584=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3584=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-debuginfo-4.9.5-150400.4.53.1 * podmansh-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * openSUSE Leap 15.4 (noarch) * podman-docker-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * podman-docker-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * podman-debuginfo-4.9.5-150400.4.53.1 * podman-remote-debuginfo-4.9.5-150400.4.53.1 * podman-remote-4.9.5-150400.4.53.1 * podman-4.9.5-150400.4.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * podman-docker-4.9.5-150400.4.53.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9566.html * https://bugzilla.suse.com/show_bug.cgi?id=1249154 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:49 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:49 -0000 Subject: SUSE-SU-2025:03577-1: important: Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) Message-ID: <176034442970.22706.8926447741129472927@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:03577-1 Release Date: 2025-10-12T17:03:59Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_244 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3577=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_244-default-11-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:52 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:52 -0000 Subject: SUSE-SU-2025:03576-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) Message-ID: <176034443220.22706.6270428703497007103@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:03576-1 Release Date: 2025-10-12T15:33:31Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_53_6 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3576=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_6-default-debuginfo-5-150700.2.1 * kernel-livepatch-6_4_0-150700_53_6-default-5-150700.2.1 * kernel-livepatch-SLE15-SP7_Update_2-debugsource-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:56 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:56 -0000 Subject: SUSE-SU-2025:03575-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) Message-ID: <176034443608.22706.9963919213316419412@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:03575-1 Release Date: 2025-10-12T15:04:12Z Rating: important References: * bsc#1245509 * bsc#1246754 * bsc#1247315 Cross-References: * CVE-2025-22023 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-22023 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-22023 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_51 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-22023: usb: xhci: Don't skip on Stopped - Length Invalid (bsc#1246754). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3575=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_51-default-5-150700.3.12.2 * kernel-livepatch-6_4_0-150700_51-default-debuginfo-5-150700.3.12.2 * kernel-livepatch-SLE15-SP7_Update_0-debugsource-5-150700.3.12.2 ## References: * https://www.suse.com/security/cve/CVE-2025-22023.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1246754 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:33:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:33:59 -0000 Subject: SUSE-SU-2025:03572-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) Message-ID: <176034443907.22706.10407365535237442309@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP7) Announcement ID: SUSE-SU-2025:03572-1 Release Date: 2025-10-12T13:33:30Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150700_53_3 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3572=1 SUSE-2025-3573=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3572=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3573=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3574=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-7-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-6-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-7-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-7-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-6-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-7-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_3-default-debuginfo-5-150700.2.1 * kernel-livepatch-SLE15-SP7_Update_1-debugsource-5-150700.2.1 * kernel-livepatch-6_4_0-150700_53_3-default-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:06 -0000 Subject: SUSE-SU-2025:03571-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) Message-ID: <176034444699.22706.2204675062150467751@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03571-1 Release Date: 2025-10-12T11:33:33Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_30 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3571=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3571=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-13-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-13-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-13-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-13-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:11 -0000 Subject: SUSE-SU-2025:03569-1: important: Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) Message-ID: <176034445170.22706.17301975192719515724@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03569-1 Release Date: 2025-10-12T10:04:13Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_38 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3569=1 SUSE-2025-3570=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3569=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3570=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_7-debugsource-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-13-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-8-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_7-debugsource-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-13-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-8-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:14 -0000 Subject: SUSE-SU-2025:03568-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) Message-ID: <176034445431.22706.1252401224914124089@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03568-1 Release Date: 2025-10-12T08:33:33Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_60 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3568=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3568=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_13-debugsource-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_60-default-5-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_13-debugsource-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_60-default-5-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:17 -0000 Subject: SUSE-SU-2025:03567-1: important: Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) Message-ID: <176034445759.22706.16641353241945276582@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 12 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03567-1 Release Date: 2025-10-12T08:04:03Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_53 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3567=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3567=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_12-debugsource-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-6-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_12-debugsource-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-6-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-6-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:23 -0000 Subject: SUSE-SU-2025:03566-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) Message-ID: <176034446359.22706.2757099569780152394@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03566-1 Release Date: 2025-10-12T07:04:09Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_25 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3566=1 SUSE-2025-3565=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3566=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-3565=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_5-debugsource-17-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-18-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-17-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-18-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-18-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-17-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_5-debugsource-17-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-18-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-17-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-18-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-18-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-17-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:28 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:28 -0000 Subject: SUSE-SU-2025:03563-1: important: Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) Message-ID: <176034446838.22706.1326115436155879749@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 9 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:03563-1 Release Date: 2025-10-12T04:33:29Z Rating: important References: * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_42 fixes several issues. The following security issues were fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3563=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3563=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-8-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-8-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-8-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-8-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:31 -0000 Subject: SUSE-SU-2025:03561-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5) Message-ID: <176034447170.22706.12479213255933257010@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03561-1 Release Date: 2025-10-12T03:04:45Z Rating: important References: * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_103 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3561=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3561=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_103-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_103-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-7-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:35 -0000 Subject: SUSE-SU-2025:03559-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5) Message-ID: <176034447574.22706.14718261035662583816@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03559-1 Release Date: 2025-10-12T05:03:48Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_100 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3559=1 SUSE-2025-3564=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3559=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-3564=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_100-default-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_100-default-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-7-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:38 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:38 -0000 Subject: SUSE-SU-2025:03562-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5) Message-ID: <176034447822.22706.5241766785600666729@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03562-1 Release Date: 2025-10-12T03:04:53Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_116 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3558=1 SUSE-2025-3562=1 SUSE-2025-3560=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3558=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-3562=1 SUSE-SLE-Module-Live- Patching-15-SP5-2025-3560=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_28-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-6-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_29-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-4-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_28-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-4-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-4-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:43 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:43 -0000 Subject: SUSE-SU-2025:03557-1: important: Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) Message-ID: <176034448340.22706.3743436472552807018@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03557-1 Release Date: 2025-10-11T22:33:38Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_83 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3557=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3557=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_83-default-16-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-16-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_83-default-16-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-16-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:48 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:48 -0000 Subject: SUSE-SU-2025:03555-1: important: Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) Message-ID: <176034448823.22706.8176472635848040638@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 23 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03555-1 Release Date: 2025-10-11T20:33:39Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_94 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3556=1 SUSE-2025-3555=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3556=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-3555=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_88-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-8-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_88-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-8-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:53 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:53 -0000 Subject: SUSE-SU-2025:03554-1: important: Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) Message-ID: <176034449318.22706.3388945080846476806@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 22 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03554-1 Release Date: 2025-10-11T18:33:41Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_91 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3554=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3554=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_91-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-12-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_91-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-12-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:34:58 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:34:58 -0000 Subject: SUSE-SU-2025:03553-1: important: Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) Message-ID: <176034449869.22706.1852267035006191205@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:03553-1 Release Date: 2025-10-11T18:33:34Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_80 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3553=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3553=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_19-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-16-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_19-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-16-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:01 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:01 -0000 Subject: SUSE-SU-2025:03552-1: important: Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4) Message-ID: <176034450127.22706.6950633780271255820@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03552-1 Release Date: 2025-10-11T16:04:03Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_170 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3552=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3552=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_42-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-5-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_42-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-5-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:04 -0000 Subject: SUSE-SU-2025:03551-1: important: Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4) Message-ID: <176034450450.22706.11112374518167986702@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 40 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03551-1 Release Date: 2025-10-11T16:03:56Z Rating: important References: * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_164 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3551=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3551=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_164-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-7-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_164-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-7-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:07 -0000 Subject: SUSE-SU-2025:03550-1: important: Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) Message-ID: <176034450715.22706.9123570488027348066@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 41 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03550-1 Release Date: 2025-10-11T07:04:07Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_167 fixes one issue. The following security issue was fixed: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3550=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3550=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_167-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-6-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_167-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-6-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:12 -0000 Subject: SUSE-SU-2025:03548-1: important: Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) Message-ID: <176034451259.22706.7415732248659158899@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03548-1 Release Date: 2025-10-11T07:04:00Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_136 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2024-50154: tcp/dccp: Do not use timer_pending() in reqsk_queue_unlink() (bsc#1233072). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3548=1 SUSE-2025-3549=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3548=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-3549=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_136-default-16-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-16-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_31-debugsource-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_133-default-16-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_136-default-16-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-16-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_31-debugsource-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_133-default-16-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:17 -0000 Subject: SUSE-SU-2025:03543-1: important: Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) Message-ID: <176034451730.22706.9340946070778065466@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 36 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03543-1 Release Date: 2025-10-10T23:33:51Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_150 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3543=1 SUSE-2025-3544=1 SUSE-2025-3542=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3543=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-3544=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-3542=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_36-debugsource-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-13-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_36-debugsource-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-13-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:21 -0000 Subject: SUSE-SU-2025:03541-1: important: Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) Message-ID: <176034452169.22706.7362230770241801118@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 37 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:03541-1 Release Date: 2025-10-10T20:33:43Z Rating: important References: * bsc#1240744 * bsc#1243650 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21791 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_153 fixes several issues. The following security issues were fixed: * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650). * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3541=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3541=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_153-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-8-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_153-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-8-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:31 -0000 Subject: SUSE-SU-2025:03547-1: important: Security update for go1.25 Message-ID: <176034453182.22706.13461126274179298017@smelt2.prg2.suse.org> # Security update for go1.25 Announcement ID: SUSE-SU-2025:03547-1 Release Date: 2025-10-11T01:22:57Z Rating: important References: * bsc#1244485 * bsc#1251253 * bsc#1251254 * bsc#1251255 * bsc#1251256 * bsc#1251257 * bsc#1251258 * bsc#1251259 * bsc#1251260 * bsc#1251261 * bsc#1251262 Cross-References: * CVE-2025-47912 * CVE-2025-58183 * CVE-2025-58185 * CVE-2025-58186 * CVE-2025-58187 * CVE-2025-58188 * CVE-2025-58189 * CVE-2025-61723 * CVE-2025-61724 * CVE-2025-61725 CVSS scores: * CVE-2025-47912 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N * CVE-2025-47912 ( SUSE ): 8.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-58183 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-58185 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58186 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58187 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58188 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58189 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N * CVE-2025-58189 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-61723 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61724 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-61725 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves 10 vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.25 fixes the following issues: go1.25.2 (released 2025-10-07) includes security fixes to the archive/tar, crypto/tls, crypto/x509, encoding/asn1, encoding/pem, net/http, net/mail, net/textproto, and net/url packages, as well as bug fixes to the compiler, the runtime, and the context, debug/pe, net/http, os, and sync/atomic packages. (bsc#1244485) CVE-2025-58189 CVE-2025-61725 CVE-2025-58188 CVE-2025-58185 CVE-2025-58186 CVE-2025-61723 CVE-2025-58183 CVE-2025-47912 CVE-2025-58187 CVE-2025-61724: * bsc#1251255 CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker controlled information * bsc#1251253 CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress * bsc#1251260 CVE-2025-58188: crypto/x509: panic when validating certificates with DSA public keys * bsc#1251258 CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER payload can cause memory exhaustion * bsc#1251259 CVE-2025-58186: net/http: lack of limit when parsing cookies can cause memory exhaustion * bsc#1251256 CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid inputs * bsc#1251261 CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse map * bsc#1251257 CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames * bsc#1251254 CVE-2025-58187: crypto/x509: quadratic complexity when checking name constraints * bsc#1251262 CVE-2025-61724: net/textproto: excessive CPU consumption in Reader.ReadResponse * go#75111 os, syscall: volume handles with FILE_FLAG_OVERLAPPED fail when calling ReadAt * go#75116 os: Root.MkdirAll can return "file exists" when called concurrently on the same path * go#75139 os: Root.OpenRoot sets incorrect name, losing prefix of original root * go#75221 debug/pe: pe.Open fails on object files produced by llvm-mingw 21 * go#75255 cmd/compile: export to DWARF types only referenced through interfaces * go#75347 testing/synctest: test timeout with no runnable goroutines * go#75357 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails on plan9 * go#75524 crypto/internal/fips140/rsa: requires a panic if self-tests fail * go#75537 context: Err can return non-nil before Done channel is closed * go#75539 net/http: internal error: connCount underflow * go#75595 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on github.com/leodido/go-urn * go#75610 sync/atomic: comment for Uintptr.Or incorrectly describes return value * go#75669 runtime: debug.decoratemappings don't work as expected ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3547=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3547=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3547=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3547=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3547=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3547=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3547=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3547=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3547=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3547=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3547=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3547=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3547=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3547=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3547=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.25-race-1.25.2-150000.1.14.1 * go1.25-1.25.2-150000.1.14.1 * go1.25-doc-1.25.2-150000.1.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47912.html * https://www.suse.com/security/cve/CVE-2025-58183.html * https://www.suse.com/security/cve/CVE-2025-58185.html * https://www.suse.com/security/cve/CVE-2025-58186.html * https://www.suse.com/security/cve/CVE-2025-58187.html * https://www.suse.com/security/cve/CVE-2025-58188.html * https://www.suse.com/security/cve/CVE-2025-58189.html * https://www.suse.com/security/cve/CVE-2025-61723.html * https://www.suse.com/security/cve/CVE-2025-61724.html * https://www.suse.com/security/cve/CVE-2025-61725.html * https://bugzilla.suse.com/show_bug.cgi?id=1244485 * https://bugzilla.suse.com/show_bug.cgi?id=1251253 * https://bugzilla.suse.com/show_bug.cgi?id=1251254 * https://bugzilla.suse.com/show_bug.cgi?id=1251255 * https://bugzilla.suse.com/show_bug.cgi?id=1251256 * https://bugzilla.suse.com/show_bug.cgi?id=1251257 * https://bugzilla.suse.com/show_bug.cgi?id=1251258 * https://bugzilla.suse.com/show_bug.cgi?id=1251259 * https://bugzilla.suse.com/show_bug.cgi?id=1251260 * https://bugzilla.suse.com/show_bug.cgi?id=1251261 * https://bugzilla.suse.com/show_bug.cgi?id=1251262 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:35:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:35:34 -0000 Subject: SUSE-SU-2025:03546-1: important: Security update for openssl-3 Message-ID: <176034453443.22706.11465198271915318637@smelt2.prg2.suse.org> # Security update for openssl-3 Announcement ID: SUSE-SU-2025:03546-1 Release Date: 2025-10-11T01:21:40Z Rating: important References: * bsc#1250232 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-3 fixes the following issues: * CVE-2025-9230: Fixed out-of-bounds read & write in RFC 3211 KEK unwrap (bsc#1250232). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3546=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libopenssl-3-devel-3.2.3-150700.5.21.1 * openssl-3-debugsource-3.2.3-150700.5.21.1 * libopenssl3-3.2.3-150700.5.21.1 * libopenssl-3-fips-provider-3.2.3-150700.5.21.1 * libopenssl-3-fips-provider-debuginfo-3.2.3-150700.5.21.1 * libopenssl3-debuginfo-3.2.3-150700.5.21.1 * openssl-3-debuginfo-3.2.3-150700.5.21.1 * openssl-3-3.2.3-150700.5.21.1 * Basesystem Module 15-SP7 (x86_64) * libopenssl-3-fips-provider-32bit-3.2.3-150700.5.21.1 * libopenssl3-32bit-3.2.3-150700.5.21.1 * libopenssl3-32bit-debuginfo-3.2.3-150700.5.21.1 * libopenssl-3-fips-provider-32bit-debuginfo-3.2.3-150700.5.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 08:37:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 08:37:59 -0000 Subject: SUSE-SU-2025:03545-1: important: Security update for docker-stable Message-ID: <176034467996.22706.8499137147014172319@smelt2.prg2.suse.org> # Security update for docker-stable Announcement ID: SUSE-SU-2025:03545-1 Release Date: 2025-10-11T01:21:27Z Rating: important References: * bsc#1001161 * bsc#1004490 * bsc#1007249 * bsc#1009961 * bsc#1012568 * bsc#1015661 * bsc#1016307 * bsc#1016992 * bsc#1019251 * bsc#1020806 * bsc#1021227 * bsc#1026827 * bsc#1028638 * bsc#1028639 * bsc#1029320 * bsc#1029630 * bsc#1030702 * bsc#1032287 * bsc#1032644 * bsc#1034053 * bsc#1034063 * bsc#1037436 * bsc#1037607 * bsc#1038476 * bsc#1038493 * bsc#1045628 * bsc#1046024 * bsc#1047218 * bsc#1048046 * bsc#1051429 * bsc#1055676 * bsc#1057743 * bsc#1058173 * bsc#1059011 * bsc#1064781 * bsc#1065609 * bsc#1066210 * bsc#1066801 * bsc#1069468 * bsc#1069758 * bsc#1072798 * bsc#1073877 * bsc#1074971 * bsc#1080978 * bsc#1084533 * bsc#1085117 * bsc#1085380 * bsc#1086185 * bsc#1089732 * bsc#1095817 * bsc#1096726 * bsc#1099277 * bsc#1100331 * bsc#1100727 * bsc#1102522 * bsc#1104821 * bsc#1105000 * bsc#1108038 * bsc#1112980 * bsc#1113313 * bsc#1114832 * bsc#1115464 * bsc#1118897 * bsc#1118898 * bsc#1118899 * bsc#1118990 * bsc#1119634 * bsc#1121412 * bsc#1121768 * bsc#1122469 * bsc#1124308 * bsc#1128376 * bsc#1128746 * bsc#1134068 * bsc#1138920 * bsc#1139649 * bsc#1142160 * bsc#1142413 * bsc#1143349 * bsc#1150397 * bsc#1153367 * bsc#1157330 * bsc#1158590 * bsc#1170415 * bsc#1170446 * bsc#1172377 * bsc#1174075 * bsc#1175081 * bsc#1176708 * bsc#1178760 * bsc#1178801 * bsc#1180243 * bsc#1180401 * bsc#1181594 * bsc#1181641 * bsc#1181677 * bsc#1181730 * bsc#1181732 * bsc#1182168 * bsc#1182476 * bsc#1182947 * bsc#1183855 * bsc#1184768 * bsc#1188447 * bsc#1190670 * bsc#1191015 * bsc#1191121 * bsc#1191334 * bsc#1191355 * bsc#1191434 * bsc#1192814 * bsc#1193273 * bsc#1193930 * bsc#1197284 * bsc#1197517 * bsc#1200022 * bsc#1200145 * bsc#1205375 * bsc#1206065 * bsc#1208074 * bsc#1210141 * bsc#1210797 * bsc#1211578 * bsc#1212368 * bsc#1213120 * bsc#1213229 * bsc#1213500 * bsc#1214107 * bsc#1214108 * bsc#1214109 * bsc#1215323 * bsc#1217513 * bsc#1219267 * bsc#1219268 * bsc#1219438 * bsc#1240150 * bsc#1247362 * bsc#1250508 * bsc#1250596 * bsc#885209 * bsc#907012 * bsc#907014 * bsc#908033 * bsc#909709 * bsc#909710 * bsc#909712 * bsc#913211 * bsc#913213 * bsc#920645 * bsc#930235 * bsc#931301 * bsc#935570 * bsc#938156 * bsc#942369 * bsc#942370 * bsc#946653 * bsc#949660 * bsc#950931 * bsc#953182 * bsc#954737 * bsc#954797 * bsc#954812 * bsc#956434 * bsc#958255 * bsc#959405 * bsc#963142 * bsc#964468 * bsc#964673 * bsc#965600 * bsc#965918 * bsc#968933 * bsc#968972 * bsc#970637 * bsc#974208 * bsc#976777 * bsc#977394 * bsc#978260 * bsc#980555 * bsc#983015 * bsc#984942 * bsc#987198 * bsc#988408 * bsc#988707 * bsc#989566 * bsc#993847 * bsc#995058 * bsc#995102 * bsc#995620 * bsc#996015 * bsc#999582 * jsc#SLE-16460 Cross-References: * CVE-2014-3499 * CVE-2014-5277 * CVE-2014-6407 * CVE-2014-6408 * CVE-2014-8178 * CVE-2014-8179 * CVE-2014-9356 * CVE-2014-9357 * CVE-2014-9358 * CVE-2015-3627 * CVE-2015-3629 * CVE-2015-3630 * CVE-2015-3631 * CVE-2016-3697 * CVE-2016-8867 * CVE-2016-9962 * CVE-2017-14992 * CVE-2017-16539 * CVE-2018-10892 * CVE-2018-15664 * CVE-2018-16873 * CVE-2018-16874 * CVE-2018-16875 * CVE-2018-20699 * CVE-2019-13509 * CVE-2019-14271 * CVE-2020-12912 * CVE-2020-13401 * CVE-2020-15257 * CVE-2020-8694 * CVE-2020-8695 * CVE-2021-21284 * CVE-2021-21285 * CVE-2021-41089 * CVE-2021-41091 * CVE-2021-41092 * CVE-2021-41103 * CVE-2021-41190 * CVE-2021-43565 * CVE-2022-24769 * CVE-2022-27191 * CVE-2022-36109 * CVE-2023-28840 * CVE-2023-28841 * CVE-2023-28842 * CVE-2024-2365 * CVE-2024-23651 * CVE-2024-23652 * CVE-2024-23653 * CVE-2024-29018 * CVE-2024-41110 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2014-8178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2014-8179 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2014-9356 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2015-3629 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2016-3697 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2016-3697 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2016-8867 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2016-9962 ( NVD ): 6.4 CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2017-14992 ( SUSE ): 6.2 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2017-14992 ( NVD ): 6.5 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2017-16539 ( SUSE ): 4.4 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2017-16539 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-10892 ( SUSE ): 6.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2018-10892 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2018-10892 ( NVD ): 6.3 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2018-15664 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2018-15664 ( NVD ): 7.5 CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2018-16873 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2018-16873 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16873 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16874 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2018-16874 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16874 ( NVD ): 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2018-16875 ( SUSE ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-16875 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2018-20699 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2018-20699 ( NVD ): 4.9 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2019-13509 ( SUSE ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2019-13509 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2019-14271 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2019-14271 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2019-14271 ( NVD ): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2020-12912 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-12912 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-13401 ( SUSE ): 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2020-13401 ( NVD ): 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2020-15257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2020-15257 ( NVD ): 5.2 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N * CVE-2020-8694 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2020-8694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2020-8695 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2020-8695 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2021-21284 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N * CVE-2021-21284 ( NVD ): 6.8 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N * CVE-2021-21285 ( SUSE ): 5.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2021-21285 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2021-41089 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2021-41089 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2021-41091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2021-41091 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2021-41092 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N * CVE-2021-41092 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2021-41103 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2021-41103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-41190 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2021-41190 ( NVD ): 3.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N * CVE-2021-43565 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2021-43565 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-24769 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-24769 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-27191 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-27191 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36109 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-36109 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-36109 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-28840 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L * CVE-2023-28840 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L * CVE-2023-28841 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2023-28841 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2023-28842 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2023-28842 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2024-23651 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-23651 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2024-23652 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23652 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-29018 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves 53 vulnerabilities, contains one feature and has 137 security fixes can now be installed. ## Description: This update for docker-stable fixes the following issues: Note this update contains a already fixed references mostly. * Remove git-core recommends on SLE to avoid pulling it in unnecessary. (bsc#1250508) This feature is mostly intended for developers ("docker build git://") so most users already have the dependency installed, and the error when git is missing is fairly straightforward (so they can easily figure out what they need to install). * Include historical changelog data from before the docker-stable fork. The initial changelog entry did technically provide all the necessary information, but our CVE tracking tools do not understand how the package is forked and so it seems that this package does not include fixes for ~12 years of updates. So, include a copy of the original package's changelog up until the fork point. bsc#1250596 * Update to docker-buildx v0.25.0. Upstream changelog: * Update to Go 1.23 for building now that upstream has switched their 23.0.x LTSS to use Go 1.23. * Do not try to inject SUSEConnect secrets when in Rootless Docker mode, as Docker does not have permission to access the host zypper credentials in this mode (and unprivileged users cannot disable the feature using /etc/docker/suse-secrets-enable.) bsc#1240150 * Initial docker-stable fork, forked from Docker 24.0.7-ce release (packaged on 2024-02-14). The original changelog is included below for historical reference. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3545=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-3545=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-3545=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3545=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3545=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3545=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3545=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3545=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3545=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3545=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3545=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3545=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3545=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3545=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3545=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * openSUSE Leap 15.6 (noarch) * docker-stable-zsh-completion-24.0.9_ce-150000.1.25.1 * docker-stable-fish-completion-24.0.9_ce-150000.1.25.1 * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * docker-stable-rootless-extras-24.0.9_ce-150000.1.25.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * Containers Module 15-SP6 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * docker-stable-zsh-completion-24.0.9_ce-150000.1.25.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * Containers Module 15-SP7 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * docker-stable-zsh-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * docker-stable-24.0.9_ce-150000.1.25.1 * docker-stable-debuginfo-24.0.9_ce-150000.1.25.1 * SUSE Enterprise Storage 7.1 (noarch) * docker-stable-bash-completion-24.0.9_ce-150000.1.25.1 ## References: * https://www.suse.com/security/cve/CVE-2014-3499.html * https://www.suse.com/security/cve/CVE-2014-5277.html * https://www.suse.com/security/cve/CVE-2014-6407.html * https://www.suse.com/security/cve/CVE-2014-6408.html * https://www.suse.com/security/cve/CVE-2014-8178.html * https://www.suse.com/security/cve/CVE-2014-8179.html * https://www.suse.com/security/cve/CVE-2014-9356.html * https://www.suse.com/security/cve/CVE-2014-9357.html * https://www.suse.com/security/cve/CVE-2014-9358.html * https://www.suse.com/security/cve/CVE-2015-3627.html * https://www.suse.com/security/cve/CVE-2015-3629.html * https://www.suse.com/security/cve/CVE-2015-3630.html * https://www.suse.com/security/cve/CVE-2015-3631.html * https://www.suse.com/security/cve/CVE-2016-3697.html * https://www.suse.com/security/cve/CVE-2016-8867.html * https://www.suse.com/security/cve/CVE-2016-9962.html * https://www.suse.com/security/cve/CVE-2017-14992.html * https://www.suse.com/security/cve/CVE-2017-16539.html * https://www.suse.com/security/cve/CVE-2018-10892.html * https://www.suse.com/security/cve/CVE-2018-15664.html * https://www.suse.com/security/cve/CVE-2018-16873.html * https://www.suse.com/security/cve/CVE-2018-16874.html * https://www.suse.com/security/cve/CVE-2018-16875.html * https://www.suse.com/security/cve/CVE-2018-20699.html * https://www.suse.com/security/cve/CVE-2019-13509.html * https://www.suse.com/security/cve/CVE-2019-14271.html * https://www.suse.com/security/cve/CVE-2020-12912.html * https://www.suse.com/security/cve/CVE-2020-13401.html * https://www.suse.com/security/cve/CVE-2020-15257.html * https://www.suse.com/security/cve/CVE-2020-8694.html * https://www.suse.com/security/cve/CVE-2020-8695.html * https://www.suse.com/security/cve/CVE-2021-21284.html * https://www.suse.com/security/cve/CVE-2021-21285.html * https://www.suse.com/security/cve/CVE-2021-41089.html * https://www.suse.com/security/cve/CVE-2021-41091.html * https://www.suse.com/security/cve/CVE-2021-41092.html * https://www.suse.com/security/cve/CVE-2021-41103.html * https://www.suse.com/security/cve/CVE-2021-41190.html * https://www.suse.com/security/cve/CVE-2021-43565.html * https://www.suse.com/security/cve/CVE-2022-24769.html * https://www.suse.com/security/cve/CVE-2022-27191.html * https://www.suse.com/security/cve/CVE-2022-36109.html * https://www.suse.com/security/cve/CVE-2023-28840.html * https://www.suse.com/security/cve/CVE-2023-28841.html * https://www.suse.com/security/cve/CVE-2023-28842.html * https://www.suse.com/security/cve/CVE-2024-2365.html * https://www.suse.com/security/cve/CVE-2024-23651.html * https://www.suse.com/security/cve/CVE-2024-23652.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1001161 * https://bugzilla.suse.com/show_bug.cgi?id=1004490 * https://bugzilla.suse.com/show_bug.cgi?id=1007249 * https://bugzilla.suse.com/show_bug.cgi?id=1009961 * https://bugzilla.suse.com/show_bug.cgi?id=1012568 * https://bugzilla.suse.com/show_bug.cgi?id=1015661 * https://bugzilla.suse.com/show_bug.cgi?id=1016307 * https://bugzilla.suse.com/show_bug.cgi?id=1016992 * https://bugzilla.suse.com/show_bug.cgi?id=1019251 * https://bugzilla.suse.com/show_bug.cgi?id=1020806 * https://bugzilla.suse.com/show_bug.cgi?id=1021227 * https://bugzilla.suse.com/show_bug.cgi?id=1026827 * https://bugzilla.suse.com/show_bug.cgi?id=1028638 * https://bugzilla.suse.com/show_bug.cgi?id=1028639 * https://bugzilla.suse.com/show_bug.cgi?id=1029320 * https://bugzilla.suse.com/show_bug.cgi?id=1029630 * https://bugzilla.suse.com/show_bug.cgi?id=1030702 * https://bugzilla.suse.com/show_bug.cgi?id=1032287 * https://bugzilla.suse.com/show_bug.cgi?id=1032644 * https://bugzilla.suse.com/show_bug.cgi?id=1034053 * https://bugzilla.suse.com/show_bug.cgi?id=1034063 * https://bugzilla.suse.com/show_bug.cgi?id=1037436 * https://bugzilla.suse.com/show_bug.cgi?id=1037607 * https://bugzilla.suse.com/show_bug.cgi?id=1038476 * https://bugzilla.suse.com/show_bug.cgi?id=1038493 * https://bugzilla.suse.com/show_bug.cgi?id=1045628 * https://bugzilla.suse.com/show_bug.cgi?id=1046024 * https://bugzilla.suse.com/show_bug.cgi?id=1047218 * https://bugzilla.suse.com/show_bug.cgi?id=1048046 * https://bugzilla.suse.com/show_bug.cgi?id=1051429 * https://bugzilla.suse.com/show_bug.cgi?id=1055676 * https://bugzilla.suse.com/show_bug.cgi?id=1057743 * https://bugzilla.suse.com/show_bug.cgi?id=1058173 * https://bugzilla.suse.com/show_bug.cgi?id=1059011 * https://bugzilla.suse.com/show_bug.cgi?id=1064781 * https://bugzilla.suse.com/show_bug.cgi?id=1065609 * https://bugzilla.suse.com/show_bug.cgi?id=1066210 * https://bugzilla.suse.com/show_bug.cgi?id=1066801 * https://bugzilla.suse.com/show_bug.cgi?id=1069468 * https://bugzilla.suse.com/show_bug.cgi?id=1069758 * https://bugzilla.suse.com/show_bug.cgi?id=1072798 * https://bugzilla.suse.com/show_bug.cgi?id=1073877 * https://bugzilla.suse.com/show_bug.cgi?id=1074971 * https://bugzilla.suse.com/show_bug.cgi?id=1080978 * https://bugzilla.suse.com/show_bug.cgi?id=1084533 * https://bugzilla.suse.com/show_bug.cgi?id=1085117 * https://bugzilla.suse.com/show_bug.cgi?id=1085380 * https://bugzilla.suse.com/show_bug.cgi?id=1086185 * https://bugzilla.suse.com/show_bug.cgi?id=1089732 * https://bugzilla.suse.com/show_bug.cgi?id=1095817 * https://bugzilla.suse.com/show_bug.cgi?id=1096726 * https://bugzilla.suse.com/show_bug.cgi?id=1099277 * https://bugzilla.suse.com/show_bug.cgi?id=1100331 * https://bugzilla.suse.com/show_bug.cgi?id=1100727 * https://bugzilla.suse.com/show_bug.cgi?id=1102522 * https://bugzilla.suse.com/show_bug.cgi?id=1104821 * https://bugzilla.suse.com/show_bug.cgi?id=1105000 * https://bugzilla.suse.com/show_bug.cgi?id=1108038 * https://bugzilla.suse.com/show_bug.cgi?id=1112980 * https://bugzilla.suse.com/show_bug.cgi?id=1113313 * https://bugzilla.suse.com/show_bug.cgi?id=1114832 * https://bugzilla.suse.com/show_bug.cgi?id=1115464 * https://bugzilla.suse.com/show_bug.cgi?id=1118897 * https://bugzilla.suse.com/show_bug.cgi?id=1118898 * https://bugzilla.suse.com/show_bug.cgi?id=1118899 * https://bugzilla.suse.com/show_bug.cgi?id=1118990 * https://bugzilla.suse.com/show_bug.cgi?id=1119634 * https://bugzilla.suse.com/show_bug.cgi?id=1121412 * https://bugzilla.suse.com/show_bug.cgi?id=1121768 * https://bugzilla.suse.com/show_bug.cgi?id=1122469 * https://bugzilla.suse.com/show_bug.cgi?id=1124308 * https://bugzilla.suse.com/show_bug.cgi?id=1128376 * https://bugzilla.suse.com/show_bug.cgi?id=1128746 * https://bugzilla.suse.com/show_bug.cgi?id=1134068 * https://bugzilla.suse.com/show_bug.cgi?id=1138920 * https://bugzilla.suse.com/show_bug.cgi?id=1139649 * https://bugzilla.suse.com/show_bug.cgi?id=1142160 * https://bugzilla.suse.com/show_bug.cgi?id=1142413 * https://bugzilla.suse.com/show_bug.cgi?id=1143349 * https://bugzilla.suse.com/show_bug.cgi?id=1150397 * https://bugzilla.suse.com/show_bug.cgi?id=1153367 * https://bugzilla.suse.com/show_bug.cgi?id=1157330 * https://bugzilla.suse.com/show_bug.cgi?id=1158590 * https://bugzilla.suse.com/show_bug.cgi?id=1170415 * https://bugzilla.suse.com/show_bug.cgi?id=1170446 * https://bugzilla.suse.com/show_bug.cgi?id=1172377 * https://bugzilla.suse.com/show_bug.cgi?id=1174075 * https://bugzilla.suse.com/show_bug.cgi?id=1175081 * https://bugzilla.suse.com/show_bug.cgi?id=1176708 * https://bugzilla.suse.com/show_bug.cgi?id=1178760 * https://bugzilla.suse.com/show_bug.cgi?id=1178801 * https://bugzilla.suse.com/show_bug.cgi?id=1180243 * https://bugzilla.suse.com/show_bug.cgi?id=1180401 * https://bugzilla.suse.com/show_bug.cgi?id=1181594 * https://bugzilla.suse.com/show_bug.cgi?id=1181641 * https://bugzilla.suse.com/show_bug.cgi?id=1181677 * https://bugzilla.suse.com/show_bug.cgi?id=1181730 * https://bugzilla.suse.com/show_bug.cgi?id=1181732 * https://bugzilla.suse.com/show_bug.cgi?id=1182168 * https://bugzilla.suse.com/show_bug.cgi?id=1182476 * https://bugzilla.suse.com/show_bug.cgi?id=1182947 * https://bugzilla.suse.com/show_bug.cgi?id=1183855 * https://bugzilla.suse.com/show_bug.cgi?id=1184768 * https://bugzilla.suse.com/show_bug.cgi?id=1188447 * https://bugzilla.suse.com/show_bug.cgi?id=1190670 * https://bugzilla.suse.com/show_bug.cgi?id=1191015 * https://bugzilla.suse.com/show_bug.cgi?id=1191121 * https://bugzilla.suse.com/show_bug.cgi?id=1191334 * https://bugzilla.suse.com/show_bug.cgi?id=1191355 * https://bugzilla.suse.com/show_bug.cgi?id=1191434 * https://bugzilla.suse.com/show_bug.cgi?id=1192814 * https://bugzilla.suse.com/show_bug.cgi?id=1193273 * https://bugzilla.suse.com/show_bug.cgi?id=1193930 * https://bugzilla.suse.com/show_bug.cgi?id=1197284 * https://bugzilla.suse.com/show_bug.cgi?id=1197517 * https://bugzilla.suse.com/show_bug.cgi?id=1200022 * https://bugzilla.suse.com/show_bug.cgi?id=1200145 * https://bugzilla.suse.com/show_bug.cgi?id=1205375 * https://bugzilla.suse.com/show_bug.cgi?id=1206065 * https://bugzilla.suse.com/show_bug.cgi?id=1208074 * https://bugzilla.suse.com/show_bug.cgi?id=1210141 * https://bugzilla.suse.com/show_bug.cgi?id=1210797 * https://bugzilla.suse.com/show_bug.cgi?id=1211578 * https://bugzilla.suse.com/show_bug.cgi?id=1212368 * https://bugzilla.suse.com/show_bug.cgi?id=1213120 * https://bugzilla.suse.com/show_bug.cgi?id=1213229 * https://bugzilla.suse.com/show_bug.cgi?id=1213500 * https://bugzilla.suse.com/show_bug.cgi?id=1214107 * https://bugzilla.suse.com/show_bug.cgi?id=1214108 * https://bugzilla.suse.com/show_bug.cgi?id=1214109 * https://bugzilla.suse.com/show_bug.cgi?id=1215323 * https://bugzilla.suse.com/show_bug.cgi?id=1217513 * https://bugzilla.suse.com/show_bug.cgi?id=1219267 * https://bugzilla.suse.com/show_bug.cgi?id=1219268 * https://bugzilla.suse.com/show_bug.cgi?id=1219438 * https://bugzilla.suse.com/show_bug.cgi?id=1240150 * https://bugzilla.suse.com/show_bug.cgi?id=1247362 * https://bugzilla.suse.com/show_bug.cgi?id=1250508 * https://bugzilla.suse.com/show_bug.cgi?id=1250596 * https://bugzilla.suse.com/show_bug.cgi?id=885209 * https://bugzilla.suse.com/show_bug.cgi?id=907012 * https://bugzilla.suse.com/show_bug.cgi?id=907014 * https://bugzilla.suse.com/show_bug.cgi?id=908033 * https://bugzilla.suse.com/show_bug.cgi?id=909709 * https://bugzilla.suse.com/show_bug.cgi?id=909710 * https://bugzilla.suse.com/show_bug.cgi?id=909712 * https://bugzilla.suse.com/show_bug.cgi?id=913211 * https://bugzilla.suse.com/show_bug.cgi?id=913213 * https://bugzilla.suse.com/show_bug.cgi?id=920645 * https://bugzilla.suse.com/show_bug.cgi?id=930235 * https://bugzilla.suse.com/show_bug.cgi?id=931301 * https://bugzilla.suse.com/show_bug.cgi?id=935570 * https://bugzilla.suse.com/show_bug.cgi?id=938156 * https://bugzilla.suse.com/show_bug.cgi?id=942369 * https://bugzilla.suse.com/show_bug.cgi?id=942370 * https://bugzilla.suse.com/show_bug.cgi?id=946653 * https://bugzilla.suse.com/show_bug.cgi?id=949660 * https://bugzilla.suse.com/show_bug.cgi?id=950931 * https://bugzilla.suse.com/show_bug.cgi?id=953182 * https://bugzilla.suse.com/show_bug.cgi?id=954737 * https://bugzilla.suse.com/show_bug.cgi?id=954797 * https://bugzilla.suse.com/show_bug.cgi?id=954812 * https://bugzilla.suse.com/show_bug.cgi?id=956434 * https://bugzilla.suse.com/show_bug.cgi?id=958255 * https://bugzilla.suse.com/show_bug.cgi?id=959405 * https://bugzilla.suse.com/show_bug.cgi?id=963142 * https://bugzilla.suse.com/show_bug.cgi?id=964468 * https://bugzilla.suse.com/show_bug.cgi?id=964673 * https://bugzilla.suse.com/show_bug.cgi?id=965600 * https://bugzilla.suse.com/show_bug.cgi?id=965918 * https://bugzilla.suse.com/show_bug.cgi?id=968933 * https://bugzilla.suse.com/show_bug.cgi?id=968972 * https://bugzilla.suse.com/show_bug.cgi?id=970637 * https://bugzilla.suse.com/show_bug.cgi?id=974208 * https://bugzilla.suse.com/show_bug.cgi?id=976777 * https://bugzilla.suse.com/show_bug.cgi?id=977394 * https://bugzilla.suse.com/show_bug.cgi?id=978260 * https://bugzilla.suse.com/show_bug.cgi?id=980555 * https://bugzilla.suse.com/show_bug.cgi?id=983015 * https://bugzilla.suse.com/show_bug.cgi?id=984942 * https://bugzilla.suse.com/show_bug.cgi?id=987198 * https://bugzilla.suse.com/show_bug.cgi?id=988408 * https://bugzilla.suse.com/show_bug.cgi?id=988707 * https://bugzilla.suse.com/show_bug.cgi?id=989566 * https://bugzilla.suse.com/show_bug.cgi?id=993847 * https://bugzilla.suse.com/show_bug.cgi?id=995058 * https://bugzilla.suse.com/show_bug.cgi?id=995102 * https://bugzilla.suse.com/show_bug.cgi?id=995620 * https://bugzilla.suse.com/show_bug.cgi?id=996015 * https://bugzilla.suse.com/show_bug.cgi?id=999582 * https://jira.suse.com/browse/SLE-16460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 16:30:06 -0000 Subject: SUSE-SU-2025:03019-2: important: Security update for postgresql14 Message-ID: <176037300660.26406.15241701860047185929@smelt2.prg2.suse.org> # Security update for postgresql14 Announcement ID: SUSE-SU-2025:03019-2 Release Date: 2025-10-13T14:33:39Z Rating: important References: * bsc#1248119 * bsc#1248120 * bsc#1248122 Cross-References: * CVE-2025-8713 * CVE-2025-8714 * CVE-2025-8715 CVSS scores: * CVE-2025-8713 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-8713 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-8713 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-8714 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-8714 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-8714 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-8715 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-8715 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-8715 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for postgresql14 fixes the following issues: Upgrade to 14.19: * CVE-2025-8713: optimizer statistics can expose sampled data within a view, partition, or child table (bsc#1248120). * CVE-2025-8714: untrusted data inclusion in `pg_dump` lets superuser of origin server execute arbitrary code in psql client (bsc#1248122). * CVE-2025-8715: improper neutralization of newlines in `pg_dump` allows execution of arbitrary code in psql client and in restore target server (bsc#1248119). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3019=1 ## Package List: * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-pltcl-debuginfo-14.19-150600.16.20.1 * postgresql14-debugsource-14.19-150600.16.20.1 * postgresql14-contrib-debuginfo-14.19-150600.16.20.1 * postgresql14-plpython-debuginfo-14.19-150600.16.20.1 * postgresql14-pltcl-14.19-150600.16.20.1 * postgresql14-server-14.19-150600.16.20.1 * postgresql14-devel-14.19-150600.16.20.1 * postgresql14-devel-debuginfo-14.19-150600.16.20.1 * postgresql14-server-debuginfo-14.19-150600.16.20.1 * postgresql14-server-devel-debuginfo-14.19-150600.16.20.1 * postgresql14-server-devel-14.19-150600.16.20.1 * postgresql14-plpython-14.19-150600.16.20.1 * postgresql14-debuginfo-14.19-150600.16.20.1 * postgresql14-14.19-150600.16.20.1 * postgresql14-plperl-debuginfo-14.19-150600.16.20.1 * postgresql14-contrib-14.19-150600.16.20.1 * postgresql14-plperl-14.19-150600.16.20.1 * Legacy Module 15-SP7 (noarch) * postgresql14-docs-14.19-150600.16.20.1 * Legacy Module 15-SP7 (ppc64le s390x x86_64) * postgresql14-test-14.19-150600.16.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8713.html * https://www.suse.com/security/cve/CVE-2025-8714.html * https://www.suse.com/security/cve/CVE-2025-8715.html * https://bugzilla.suse.com/show_bug.cgi?id=1248119 * https://bugzilla.suse.com/show_bug.cgi?id=1248120 * https://bugzilla.suse.com/show_bug.cgi?id=1248122 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Oct 13 16:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 13 Oct 2025 16:30:23 -0000 Subject: SUSE-SU-2025:03590-1: moderate: Security update for bluez Message-ID: <176037302339.26406.13210862343326318072@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2025:03590-1 Release Date: 2025-10-13T12:59:08Z Rating: moderate References: * bsc#1217877 Cross-References: * CVE-2023-45866 CVSS scores: * CVE-2023-45866 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2023-45866 ( NVD ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-45866: keystroke injection and arbitrary command execution via HID device connections (bsc#1217877). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3590=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * bluez-debugsource-5.13-5.45.1 * bluez-debuginfo-5.13-5.45.1 * bluez-5.13-5.45.1 * libbluetooth3-5.13-5.45.1 * bluez-devel-5.13-5.45.1 * libbluetooth3-debuginfo-5.13-5.45.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45866.html * https://bugzilla.suse.com/show_bug.cgi?id=1217877 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:07 -0000 Subject: SUSE-SU-2025:20822-1: moderate: Security update for python-xmltodict Message-ID: <176043060702.27771.3670816280769472145@smelt2.prg2.suse.org> # Security update for python-xmltodict Announcement ID: SUSE-SU-2025:20822-1 Release Date: 2025-10-01T13:46:15Z Rating: moderate References: * bsc#1249036 Cross-References: * CVE-2025-9375 CVSS scores: * CVE-2025-9375 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-9375 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-9375 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro Extras 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for python-xmltodict fixes the following issues: * CVE-2025-9375: Fixed XML Injection vulnerability in xmltodict (bsc#1249036) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-294=1 ## Package List: * SUSE Linux Micro Extras 6.1 (noarch) * python311-xmltodict-0.13.0-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249036 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:11 -0000 Subject: SUSE-SU-2025:20820-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Message-ID: <176043061173.27771.6180116864092608540@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Announcement ID: SUSE-SU-2025:20820-1 Release Date: 2025-10-07T15:45:17Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-149=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-34-rt-debuginfo-5-1.1 * kernel-livepatch-6_4_0-34-rt-5-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_10-debugsource-5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:20 -0000 Subject: SUSE-SU-2025:20819-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <176043062065.27771.14558002928838695071@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20819-1 Release Date: 2025-10-07T15:45:16Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072) * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-142=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-13-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-13-1.1 * kernel-livepatch-6_4_0-10-rt-13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:24 -0000 Subject: SUSE-SU-2025:20818-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <176043062417.27771.10739579910544344854@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-SU-2025:20818-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-148=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-33-rt-debuginfo-5-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-5-1.2 * kernel-livepatch-6_4_0-33-rt-5-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:27 -0000 Subject: SUSE-SU-2025:20817-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Message-ID: <176043062756.27771.7274614532782156477@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Announcement ID: SUSE-SU-2025:20817-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_8 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-147=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-6-1.2 * kernel-livepatch-6_4_0-31-rt-6-1.2 * kernel-livepatch-6_4_0-31-rt-debuginfo-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:30 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:30 -0000 Subject: SUSE-SU-2025:20816-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Message-ID: <176043063053.27771.2866105866123034692@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Announcement ID: SUSE-SU-2025:20816-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_7 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-146=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-7-1.3 * kernel-livepatch-6_4_0-30-rt-debuginfo-7-1.3 * kernel-livepatch-6_4_0-30-rt-7-1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:34 -0000 Subject: SUSE-SU-2025:20815-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Message-ID: <176043063424.27771.804846531778927742@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Announcement ID: SUSE-SU-2025:20815-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_6 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-145=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-28-rt-debuginfo-7-3.1 * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-7-3.1 * kernel-livepatch-6_4_0-28-rt-7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:39 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:39 -0000 Subject: SUSE-SU-2025:20814-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <176043063915.27771.7695286771185833497@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20814-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-144=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-25-rt-debuginfo-9-1.1 * kernel-livepatch-6_4_0-25-rt-9-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-9-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:46 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:46 -0000 Subject: SUSE-SU-2025:20813-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <176043064691.27771.16617584027703557141@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20813-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves five vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-141=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-10-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-10-1.1 * kernel-livepatch-6_4_0-22-rt-10-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:49 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:49 -0000 Subject: SUSE-SU-2025:20812-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_9 Message-ID: <176043064939.27771.9329699375971813497@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_9 Announcement ID: SUSE-SU-2025:20812-1 Release Date: 2025-10-07T15:38:23Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_9 fixes the following issues: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-157=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-31-default-debuginfo-6-1.2 * kernel-livepatch-MICRO-6-0_Update_9-debugsource-6-1.2 * kernel-livepatch-6_4_0-31-default-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:52 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:52 -0000 Subject: SUSE-SU-2025:20811-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <176043065242.27771.18127992233096628589@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-SU-2025:20811-1 Release Date: 2025-10-07T15:38:23Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-156=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-6-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-6-1.2 * kernel-livepatch-6_4_0-30-default-debuginfo-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:55 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:55 -0000 Subject: SUSE-SU-2025:20810-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_7 Message-ID: <176043065569.27771.9691969991988841649@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_7 Announcement ID: SUSE-SU-2025:20810-1 Release Date: 2025-10-07T15:38:23Z Rating: moderate References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_7 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-155=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-29-default-6-1.2 * kernel-livepatch-MICRO-6-0_Update_7-debugsource-6-1.2 * kernel-livepatch-6_4_0-29-default-debuginfo-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:30:58 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:30:58 -0000 Subject: SUSE-SU-2025:20809-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_6 Message-ID: <176043065853.27771.2962235049860969443@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_6 Announcement ID: SUSE-SU-2025:20809-1 Release Date: 2025-10-07T15:38:23Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_6 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-154=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_6-debugsource-7-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-7-3.1 * kernel-livepatch-6_4_0-28-default-7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:02 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:02 -0000 Subject: SUSE-SU-2025:20808-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <176043066257.27771.9454441835749837337@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20808-1 Release Date: 2025-10-07T15:38:23Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-153=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-9-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-9-1.2 * kernel-livepatch-6_4_0-25-default-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:07 -0000 Subject: SUSE-SU-2025:20807-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <176043066771.27771.17983132886681190358@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20807-1 Release Date: 2025-10-07T15:38:23Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves five vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-152=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-11-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-11-1.2 * kernel-livepatch-6_4_0-24-default-11-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:14 -0000 Subject: SUSE-SU-2025:20806-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <176043067441.27771.10165005524691094066@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20806-1 Release Date: 2025-10-07T15:38:23Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072) * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-150=1 ## Package List: * SUSE Linux Micro 6.1 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-debuginfo-13-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-13-1.1 * kernel-livepatch-6_4_0-19-default-13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:19 -0000 Subject: SUSE-SU-2025:20805-1: important: Security update for podman Message-ID: <176043067901.27771.12548688359816272827@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2025:20805-1 Release Date: 2025-10-01T13:49:41Z Rating: important References: * bsc#1239088 * bsc#1242132 * bsc#1245320 Cross-References: * CVE-2025-6032 CVSS scores: * CVE-2025-6032 ( SUSE ): 9.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-6032 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-6032 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-6032: Fixed machine init command failing to verify TLS certificate (bsc#1245320) * Fix conditional Requires (remove deprecated sle_version macro) * Update to version 5.4.2: * Add release notes for v5.4.2 * Fix a potential deadlock during `podman cp` * Improve the file format documentation of podman-import. * Revert "podman-import only supports gz and tar" * Bump buildah to v1.39.4 * libpod: do not cover idmapped mountpoint * test: Fix runc error message * oci: report empty exec path as ENOENT * test: adapt tests new crun error messages * test: remove duplicate test * cirrus: test only on f41/rawhide * CI: use z1d instance for windows machine testing * New images 2025-03-24 * test/e2e: use go net.Dial() ov nc * test: use ncat over nc * New images 2025-03-12 * RPM: Add riscv64 to ExclusiveArch-es * Fix HealthCheck log destination, count, and size defaults * Win installer test: hardcode latest GH release ID * Packit: Fix action script for fetching upstream commit * Bump to v5.4.2-dev * Bump to v5.4.1 * update gvproxy version to 0.8.4 * Update Buildah to v1.39.2 * Update release notes for v5.4.1 * Fix reporting summed image size for compat endpoint * podman-import only supports gz and tar * quadlet kube: correctly mark unit as failed * pkg/domain/infra/abi/play.go: fix two nilness issues * kube play: don't print start errors twice * libpod: race in WaitForConditionWithInterval() * libpod: race in WaitForExit() with autoremove * Don't try to resolve host path if copying to container from stdin. * Use svg for pkginstaller banner * Create quota before _data dir for volumes * Packit: clarify secondary status in CI * Packit/RPM: Display upstream commit SHA in all rpm builds * podman run: fix --pids-limit -1 wrt runc * vendor: update github.com/go-jose/go-jose/v3 to v3.0.4 * chore(deps): update module github.com/go-jose/go-jose/v4 to v4.0.5 [security] * wire up --retry-delay for artifact pull * Revert "silence false positve from golangci-lint" * update golangci-lint to v1.64.4 * update golangci-lint to v1.64.2 * silence false positve from golangci-lint * cmd/podman: refactor Context handling * fix new usetesting lint issue * Packit/Copr: Fix `podman version` in rpm * Remove persist directory when cleaning up Conmon files * Bump to v5.4.1-dev * Bump to v5.4.0 * Update release notes for v5.4.0 final * In SQLite state, use defaults for empty-string checks * Bump FreeBSD version to 13.4 * docs: add v5.4 to API reference * Update rpm/podman.spec * RPM: set buildOrigin in LDFLAG * RPM: cleanup macro defs * Makefile: escape BUILD_ORIGIN properly * rootless: fix hang on s390x * Set Cirrus DEST_BRANCH appropriately to fix CI * Bump to v5.4.0-dev * Bump to v5.4.0-rc3 * Update release notes for v5.4.0-rc3 * Add BuildOrigin field to podman info * artifact: only allow single manifest * test/e2e: improve write/removeConf() * Add --noheading to artifact ls * Add --no-trunc to artifact ls * Add type and annotations to artifact add * pkg/api: honor cdi devices from the hostconfig * util: replace Walk with WalkDir * fix(pkg/rootless): avoid memleak during init() contructor. * Add `machine init --playbook` * RPM: include empty check to silence rpmlint * RPM: adjust qemu dependencies * Force use of iptables on Windows WSL * rpm: add attr as dependency for podman-tests * update gvproxy version * [v5.4] Bump Buildah to v1.39.0 * podman exec: correctly support detaching * libpod: remove unused ExecStartAndAttach() * [v5.4] Bump c/storage to v1.57.1, c/image v5.34.0, c/common v0.62.0 * Move detection of libkrun and intel * Prevent two podman machines running on darwin * Remove unnecessary error handling * Remove usused Kind() function * Bump to v5.4.0-dev * Bump to v5.4.0-rc2 * Update release notes for v5.4.0-rc2 * Safer use of `filepath.EvalSymlinks()` on Windows * error with libkrun on intel-based machines * chore(deps): update dependency pytest to v8.3.4 * test/buildah-bud: skip two new problematic tests on remote * Fix podman-restart.service when there are no containers * Avoid upgrading from v5.3.1 on Windows * Clean up after unexpectedly terminated build * system-tests: switch ls with getfattr for selinux tests * vendor latest c/{buildah,common,image,storage} * Makefile: Add validatepr description for 'make help' output * docs: Enhance podman build --secret documentation and add examples * docs: mount.md - idmapped mounts only work for root user * Define, and use, PodmanExitCleanlyWithOptions * Eliminate PodmanSystemdScope * Fix image ID query * Revert "Use the config digest to compare images loaded/pulled using different methods" * Update c/image after https://github.com/containers/image/pull/2613 * Update expected errors when pulling encrypted images * Eliminate PodmanExtraFiles * Introduce PodmanTestIntegration.PodmanWithOptions * Restructure use of options * Inline PodmanBase into callers * Pass all of PodmanExecOptions to various [mM]akeOptions functions * Turn PodmanAsUserBase into PodmanExecBaseWithOptions * Avoid indirect links through quadlet(5) * do not set the CreateCommand for API users * Add podman manifest rm --ignore * Bump to v5.4.0-dev * Bump to v5.4.0-rc1 * fix(deps): update module github.com/containers/gvisor-tap-vsock to v0.8.2 * podman artifact * vendor latest c/{common,image,storage} * fix(deps): update module github.com/rootless-containers/rootlesskit/v2 to v2.3.2 * cirrus: bump macos machine test timeout * pkg/machine/e2e: improve podman.exe match * pkg/machine/e2e: improve "list machine from all providers" * Remove JSON tag from UseImageHosts in ContainerConfig * Set network ID if available during container inspect * Stop creating a patch for v5.3.1 upgrades on windows * compose docs: fix typo * Document kube-play CDI support * docs: Add quadlet debug method systemd-analyze * Replace instances of PodmanExitCleanly in play_kube_test.go * docs: add 'initialized' state to status filters * fix(deps): update module google.golang.org/protobuf to v1.36.3 * Switch all calls of assert.Nil to assert.NoError * Add --no-hostname option * Fix unescaping octal escape sequence in values of Quadlet unit files * Remove `.exe` suffix if any * Add kube play support for CDI resource allocation * add support to `;` for comments in unit files as per systemd documentation * Use PodmanExitCleanly in attach_test.go * Introduce PodmanTestIntegration.PodmanExitCleanly * chore(deps): update dependency setuptools to ~=75.8.0 * Add newer c/i to support artifacts * fix(deps): update module golang.org/x/tools to v0.29.0 * fix(deps): update module golang.org/x/net to v0.34.0 * specgenutil: Fix parsing of mount option ptmxmode * namespaces: allow configuring keep-id userns size * Update description for completion * Quadlet - make sure the /etc/containers/systemd/users is traversed in rootless * Document .build for Image .container option * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.9.1 * New VM Images * update golangci/golangci-lint to v1.63.4 * fix(deps): update module google.golang.org/protobuf to v1.36.2 * chore(deps): update dependency setuptools to ~=75.7.0 * Fixing ~/.ssh/identity handling * vendor latest c/common from main * fix(deps): update module github.com/shirou/gopsutil/v4 to v4.24.12 * fix(deps): update module github.com/opencontainers/runc to v1.2.4 * specgen: fix comment * Add hint to restart Podman machine to really accept new certificates * fix(deps): update module github.com/onsi/gomega to v1.36.2 * fix(deps): update module github.com/moby/term to v0.5.2 * Pass container hostname to netavark * Fix slirp4netns typo in podman-network.1.md * Add support to ShmSize in Pods with Quadlet * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.22.1 * chore(deps): update module golang.org/x/crypto to v0.31.0 [security] * fix(deps): update module golang.org/x/net to v0.33.0 [security] * Kube volumes can not container _ * fix(deps): update module github.com/docker/docker to v27.4.1+incompatible * test/system: fix "podman play --build private registry" error * test/system: CopyDirectory() do not chown files * test/system: remove system dial-stdio test * shell completion: respect CONTAINERS_REGISTRIES_CONF * fix(deps): update module github.com/cpuguy83/go-md2man/v2 to v2.0.6 * When generating host volumes for k8s, force to lowercase * test: enable newly added test * vfkit: Use 0.6.0 binary * gvproxy: Use 0.8.1 binary * systemd: simplify parser and fix infinite loop * Revert "win-installer test: revert to v5.3.0" * Avoid rebooting twice when installing WSL * Avoid rebooting on Windows when upgrading and WSL isn't installed * Add win installer patch * Bump WiX toolset version to 5.0.2 * test/e2e: SkipOnOSVersion() add reason field * test/e2e: remove outdated SkipOnOSVersion() calls * Update VM images * fix(deps): update module golang.org/x/crypto to v0.31.0 [security] * fix(deps): update module github.com/crc-org/crc/v2 to v2.45.0 * fix(deps): update module github.com/opencontainers/runc to v1.2.3 * quadlet: fix inter-dependency of containers in `Network=` * Add man pages to Mac installer * fix(deps): update module github.com/onsi/gomega to v1.36.1 * fix(deps): update module github.com/docker/docker to v27.4.0+incompatible * Fix device limitations in podman-remote update on remote systems * Use latest version of VS BuildTools * bin/docker: fix broken escaping and variable substitution * manifest annotate: connect IndexAnnotations * Fix panic in `manifest annotate --index` * fix(deps): update module github.com/cyphar/filepath-securejoin to v0.3.5 * fix(deps): update module golang.org/x/net to v0.32.0 * fix(deps): update module golang.org/x/tools to v0.28.0 * fix(deps): update module golang.org/x/crypto to v0.30.0 * fix(deps): update module golang.org/x/sys to v0.28.0 * Fix overwriting of LinuxResources structure in the database * api: replace inspectID with name * fix(deps): update github.com/opencontainers/runtime-tools digest to f7e3563 * Replace ExclusiveArch with ifarch * fix(deps): update module github.com/containers/gvisor-tap-vsock to v0.8.1 * Improve platform specific URL handling in `podman compose` for machines * Fix `podman info` with multiple imagestores * Switch to fixed common * refact: use uptime.minutes instead of uptime.seconds * fix(deps): update module github.com/shirou/gopsutil/v4 to v4.24.11 * fix(deps): update golang.org/x/exp digest to 2d47ceb * fix(deps): update github.com/godbus/dbus/v5 digest to c266b19 * Cover Unix socket in inpect test on Windows platform * Add a test for forcing compression and v2s2 format * fix(deps): update module github.com/crc-org/vfkit to v0.6.0 * Package podman-machine on supported architectures only. * Fixes missing binary in systemd. * stats: ignore errors from containers without cgroups * api: Error checking before NULL dereference * [skip-ci] Packit/copr: switch to fedora-all * make remotesystem: fail early if serial tests fail * spec: clamp rlimits without CAP_SYS_RESOURCE * Clarify the reason for skip_if_remote * Sanity-check that the test is really using partial pulls * Fix apparent typos in zstd:chunked tests * Fix compilation issues in QEMU machine files (Windows platform) * Mount volumes before copying into a container * Revert "libpod: remove shutdown.Unregister()" * docs: improve documentation for internal networks * docs: document bridge mode option * [skip-ci] Packit: remove epel and re-enable c9s * chore(deps): update dependency golangci/golangci-lint to v1.62.2 * vendor: update containers/common * OWNERS: remove edsantiago * fix(deps): update module github.com/onsi/gomega to v1.36.0 * fix(deps): update github.com/containers/common digest to ceceb40 * refact: EventerType and improve consistency * Add --hosts-file flag to container and pod commands * Add nohosts option to /build and /libpod/build * fix(deps): update module github.com/stretchr/testify to v1.10.0 * Quadlet - Use = sign when setting the pull arg for build * win-installer test: revert to v5.3.0 * fix(deps): update module github.com/crc-org/crc/v2 to v2.44.0 * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.22.0 * chore(deps): update dependency setuptools to ~=75.6.0 * Update windows installer tests * Windows: don't install WSL/HyperV on update * Switch to non-installing WSL by default * fix(deps): update github.com/containers/buildah digest to 52437ef * Configure HealthCheck with `podman update` * CI: --image-volume test: robustify * docs: add 5.3 as Reference version * Bump CI VMs * libpod: pass down NoPivotRoot to Buildah * vendor: bump containers/buildah * fix(deps): update module github.com/opencontainers/runc to v1.2.2 * Overlay mounts supersede image volumes & volumes-from * libpod: addHosts() prevent nil deref * only read ssh_config for non machine connections * ssh_config: allow IdentityFile file with tilde * ssh_config: do not overwrite values from config file * connection: ignore errors when parsing ssh_config * Bump bundled krunkit to 0.1.4 * fix(deps): update module google.golang.org/protobuf to v1.35.2 * add support for driver-specific options during container creation * doc: fix words repetitions * Update release notes on main for v5.3.0 * chore(deps): update dependency setuptools to ~=75.5.0 * CI: system tests: parallelize 010 * fix podman machine init --ignition-path * vendor: update containers/common * spec: clamp rlimits in a userns * Add subpath support to volumes in `--mount` option * refactor: simplify LinuxNS type definition and String method * test/e2e: remove FIPS test * vendor containers projects to tagged versions * fix(deps): update module github.com/moby/sys/capability to v0.4.0 * chore(deps): update dependency setuptools to ~=75.4.0 * system tests: safer install_kube_template() * Buildah treadmill tweaks * update golangci-lint to v1.62.0 * fix(deps): update module golang.org/x/net to v0.31.0 * fix(deps): update module golang.org/x/tools to v0.27.0 * Revert "Reapply "CI: test nftables driver on fedora"" * Yet another bump, f41 with fixed kernel * test: add zstd:chunked system tests * pkg/machine/e2e: remove dead code * fix(deps): update module golang.org/x/crypto to v0.29.0 * kube SIGINT system test: fix race in timeout handling * New `system connection add` tests * Update codespell to v2.3.0 * Avoid printing PR text to stdout in system test * Exclude symlink from pre-commit end-of-file-fixer * api: Add error check * [CI:ALL] Bump main to v5.4.0-dev * test/buildah-bud: build new inet helper * test/system: add regression test for TZDIR local issue * vendor latest c/{buildah,common,image,storage} * Reapply "CI: test nftables driver on fedora" * Revert "cirrus: test only on f40/rawhide" * test f41 VMs * AdditionalSupport for SubPath volume mounts * wsl-e2e: Add a test to ensure port 2222 is free with usermode networking * winmake.ps1: Fix the syntax of the function call Win-SSHProxy * volume ls: fix race that caused it to fail * gvproxy: Disable port-forwarding on WSL * build: update gvisor-tap-vsock to 0.8.0 * podman: update roadmap * Log network creation and removal events in Podman * libpod: journald do not lock thread * Add key to control if a container can get started by its pod * Honor users requests in quadlet files * CI: systests: workaround for parallel podman-stop flake * Fix inconsistent line ending in win-installer project * fix(deps): update module github.com/opencontainers/runc to v1.2.1 * Quadlet - support image file based mount in container file * API: container logs flush status code * rework event code to improve API errors * events: remove memory eventer * libpod: log file use Wait() over event API * Makefile: vendor target should always remove toolchain * cirrus: check consitent vendoring in test/tools * test/tools/go.mod: remove toolchain * fix(deps): update module github.com/shirou/gopsutil/v4 to v4.24.10 * fix(deps): update module github.com/onsi/gomega to v1.35.1 * doc: explain --interactive in more detail * fix(deps): update golang.org/x/exp digest to f66d83c * fix(deps): update github.com/opencontainers/runtime-tools digest to 6c9570a * fix(deps): update github.com/linuxkit/virtsock digest to cb6a20c * add default polling interval to Container.Wait * Instrument cleanup tracer to log weird volume removal flake * make podman-clean-transient.service work as user * Add default remote socket path if empty * Use current user if no user specified * Add support for ssh_config for connection * libpod: use pasta Setup() over Setup2() * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.21.0 * fix(deps): update module github.com/onsi/gomega to v1.35.0 * logformatter: add cleanup tracer log link * docs: fix broken example * docs: add missing swagger links for the stable branches * readthedocs: build extra formats * pkg/machine/e2e: remove debug * fix(docs): Integrate pasta in rootless tutorial * chore(deps): update dependency setuptools to ~=75.3.0 * libpod: report cgroups deleted during Stat() call * chore: fix some function names in comment * CI: parallelize 450-interactive system tests * CI: parallelize 520-checkpoint tests * CI: make 070-build.bats use safe image names * test/system: add podman network reload test to distro gating * System tests: clean up unit file leaks * healthcheck: do not leak service on failed stop * healthcheck: do not leak statup service * fix(deps): update module github.com/containers/gvisor-tap-vsock to v0.8.0 * Add Startup HealthCheck configuration to the podman inspect * buildah version display: use progress() * new showrun() for displaying and running shell commands * Buildah treadmill: redo the .cirrus.yml tweaks * Buildah treadmill: more allow-empty options * Buildah treadmill: improve test-failure instructions * Buildah treadmill: improve wording in test-fail instructions * doc: Remove whitespace before comma * fix(deps): update module github.com/checkpoint-restore/checkpointctl to v1.3.0 * ps: fix display of exposed ports * ps: do not loop over port protocol * readme: Add reference to pasta in the readme * test/system: Fix spurious "duplicate tests" failures in pasta tests * Improve "podman load - from URL" * Try to repair c/storage after removing an additional image store * Use the config digest to compare images loaded/pulled using different methods * Simplify the additional store test * Fix the store choice in "podman pull image with additional store" * Bump to v5.3.0-dev * Bump to v5.3.0-rc1 * Set quota on volume root directory, not _data * fix(deps): update module github.com/opencontainers/runc to v1.2.0 * test: set soft ulimit * Vagrantfile: Delete * Enable pod restore with crun * vendor: update c/{buildah,common,image,storage} * Fix 330-corrupt-images.bats in composefs test runs * quadlet: add default network dependencies to all units * quadlet: ensure user units wait for the network * add new podman-user-wait-network-online.service * contrib/systemd: switch user symlink for file symlinks * Makefile: remove some duplication from install.systemd * contrib/systemd: move podman-auto-update units * quadlet: do not reject RemapUsers=keep-id as root * test/e2e: test quadlet with and without --user * CI: e2e: fix checkpoint flake * APIv2 test fix: image history * pasta udp tests: new bytecheck helper * Document packaging process * [skip-ci] RPM: remove dup Provides * Update dependency setuptools to ~=75.2.0 * System tests: safer pause-image creation * Update module github.com/opencontainers/selinux to v1.11.1 * Added escaping to invoked powershell command for hyperv stubber. * use slices.Clone instead of assignment * libpod API: only return exit code without conditions * Housekeeping: remove duplicates from success_task * Thorough overhaul of CONTRIBUTING doc. * api: Replace close function in condition body * test/e2e: fix default signal exit code test * Test new VM build * CI: fix changing-rootFsSize flake * scp: add option types * Unlock mutex before returning from function * Note in the README that we are moving to timed releases * cirrus: let tar extract figure out the compression * Make error messages more descriptive * Mention containers.conf settings for podman machine commands * [skip-ci] Packit: re-enable CentOS Stream 10/Fedora ELN teasks" * cmd: use logrus to print error * podman: do not set rlimits to the default value * spec: always specify default rlimits * vendor: update containers/common * Note in the README that we are moving to timed releases * Revert "CI: test nftables driver on fedora" * cirrus: use zstd over bzip2 for repo archive * cirrus: use shared repo_prep/repo_artifacts scripts * cirrus: speed up postbuild * cirrus: change alt arch task to only compile binaries * cirrus: run make with parallel jobs where useful * Makefile: allow man-page-check to be run in parallel * cirrus: use fastvm for builds * test/e2e: skip some Containerized checkpoint tests * test: update timezone checks * cirrus: update CI images * test/e2e: try debug potential pasta issue * CI: quadlet system tests: use airgapped testimage * Allow removing implicit quadlet systemd dependencies * fix(deps): update module github.com/cyphar/filepath-securejoin to v0.3.4 * libpod API: make wait endpoint better against rm races * podman-remote run: improve how we get the exit code * [skip-ci] Packit: constrain koji and bodhi jobs to fedora package to avoid dupes * 055-rm test: clean up a test, and document * CI: remove skips for libkrun * Bump bundled krunkit to 0.1.3 * fix(deps): update module google.golang.org/protobuf to v1.35.0 * fix(deps): update module golang.org/x/net to v0.30.0 * server: fix url parsing in info * fix(deps): update module golang.org/x/tools to v0.26.0 * Makefile: fix ginkgo FOCUS option * fix(deps): update module golang.org/x/crypto to v0.28.0 * podman-systemd.unit.5: adjust example options * docs: prefer --network to --net * fix(deps): update module golang.org/x/term to v0.25.0 * fix(deps): update module github.com/mattn/go-sqlite3 to v1.14.24 * fix(deps): update module golang.org/x/sys to v0.26.0 * OWNERS file audit and update * Exposed ports are only included when not --net=host * libpod: hasCurrentUserMapped checks for gid too * [CI:DOCS] Document TESTFLAGS in test README file * Validate the bind-propagation option to `--mount` * Fix typo in secret inspect examples * Mention `no_hosts` and `base_hosts_file` configs in CLI option docs * Fixes for vendoring Buildah * vendor: update buildah to latest * Makefile - silence skipped tests when focusing on a file * vendor: update to latest c/common * Quadlet - prefer "param val" over "param=val" to allow env expansion * System tests: sdnotify: wait for socket file creation * Switch to moby/sys/capability * platformInspectContainerHostConfig: rm dead code * CI: require and test CI_DESIRED_NETWORK on RHEL * Add ExposedPorts to Inspect's ContainerConfig * fix(deps): update golang.org/x/exp digest to 701f63a * quadlet: allow variables in PublishPort * fix(deps): update module github.com/shirou/gopsutil/v4 to v4.24.9 * fix(deps): update github.com/godbus/dbus/v5 digest to a817f3c * Document that zstd:chunked is downgraded to zstd when encrypting * fix(deps): update module github.com/cyphar/filepath-securejoin to v0.3.3 * chore(deps): update dependency ubuntu to v24 * rpm: do not load iptables modules on f41+ * adding docs for network-cmd-path * Include exposed ports in inspect output when net=host * feat(libpod): support kube play tar content-type (#24015) * podman mount: some better error wrapping * podman mount: ignore ErrLayerUnknown * Quadlet - make sure the order of the UnitsDir is deterministic * packit: disable Centos Stream/fedora ELN teasks * libpod: remove shutdown.Unregister() * libpod: rework shutdown handler flow * libpod: ensure we are not killed during netns creation * Update module github.com/moby/sys/capability to v0.3.0 * Update documentation of `--no-hosts`, `--hostname`, and `--name` CLI options * Update documentation of `--add-host` CLI option * System tests: set a default XDG_RUNTIME_DIR * Modify machine "Remove machine" test * CORS system test: clean up * Add --health-max-log-count, --health-max-log-size, --health-log-destination flags * troubleshooting: adjust home path in tip 44 * test/system: For pasta port forwarding tests don't bind socat server * Update connection on removal * Simplify `RemoveConnections` * Move `DefaultMachineName` to `pkg/machine/define` * vendor: update containers/image * vendor: update containers/storage * CI: skip the flaking quadlet test * CI: make systemd tests parallel-safe (*) * CI: run and collect cleanup tracer logs * add epbf program to trace podman cleanup errors * CI: parallelize logs test as much as possible * CI: format test: use local registry if available * CI: make 700-play parallel-safe * docs: Fix missing negation * bin/docker support warning message suppression from user config dir * Update module github.com/docker/docker to v27.3.1+incompatible * Quadlet - add full support for Symlinks * libpod: setupNetNS() correctly mount netns * vendor latest c/common * docs: remove usage of deprecated `--storage` * Update module github.com/docker/docker to v27.3.0+incompatible * CI: Quadlet rootfs test: use container image as rootfs * CI: system test registry: use --net=host * CI: rm system test: bump grace period * CI: system tests: minor documentation on parallel * fix typo in error message Fixes: containers/podman#24001 * CI: system tests: always create pause image * CI: quadlet system test: be more forgiving * vendor latest c/common * CI: make 200-pod parallel-safe * allow exposed sctp ports * test/e2e: add netns leak check * test/system: netns leak check for rootless as well * test/system: Improve TODO comments on IPv6 pasta custom DNS forward test * test/system: Clarify "Local forwarder" pasta tests * test/system: Simplify testing for nameserver connectivity * test/system: Consolidate "External resolver" pasta tests * test/system: Move test for default forwarder into its own case * CI: make 090-events parallel-safe * Misc minor test fixes * Add network namespace leak check * Add workaround for buildah parallel bug * registry: lock start attempts * Update system test template and README * bats log: differentiate parallel tests from sequential * ci: bump system tests to fastvm * clean_setup: create pause image * CI: make 012-manifest parallel-safe * podman-manifest-remove: update docs and help output * test/system: remove wait workaround * wait: fix handling of multiple conditions with exited * Match output of Compat Top API to Docker * system test parallelization: enable two-pass approach * New VMs: test crun 1.17 * libpod: hides env secrets from container inspect * CI: e2e: workaround for events out-of-sequence flake * update golangci-lint to 1.61.0 * libpod: convert owner IDs only with :idmap * Podman CLI --add-host with multiple host for a single IP * Quadlet - Split getUnitDirs to small functions * fix(deps): update module github.com/cpuguy83/go-md2man/v2 to v2.0.5 * chore(deps): update dependency setuptools to ~=75.1.0 * Fxi typo in cache-ttl.md * Get WSL disk as an OCI artifact * CI: make 260-sdnotify parallel-safe * quadlet: do not log ENOENT errors * pkg/specgen: allow pasta when running inside userns * troubleshooting: add tip about the user containers * chore(deps): update dependency setuptools to v75 * Convert windows paths in volume arg of the build command * Improve error when starting multiple machines * fix(deps): update module github.com/cyphar/filepath-securejoin to v0.3.2 * Minor typo noticed when reading podman man page * Remove `RemoveFilesAndConnections` * Add `GetAllMachinesAndRootfulness` * rewrite typo osascript * typo * fix(deps): update module github.com/docker/docker to v27.2.1+incompatible * Add radio buttons to select WSL or Hyper-V in windows setup.exe * [skip-ci] Packit: split out ELN jobs and reuse fedora downstream targets * [skip-ci] Packit: Enable sidetags for bodhi updates * vendor: update c/common * CI: make 710-kube parallel-safe * CI: mark 320-system-df _NOT_ parallel safe * Add kube play support for image volume source * refactor: add sshClient function * fix(deps): update module golang.org/x/tools to v0.25.0 * CI: make 505-pasta parallel safe * CI: make 020-tag parallel-safe * CI: make 410-selinux parallel-safe * Bump VMs. ShellCheck is now built-in * troubleshooting: add tip about auto, keep-id, nomap * libpod: make use of new pasta option from c/common * vendor latest c/common * podman images: sort repository with tags * Remove containers/common/pkg/config from pkg/util * fix(deps): update module golang.org/x/net to v0.29.0 * fix(deps): update module github.com/mattn/go-sqlite3 to v1.14.23 * fix(deps): update module golang.org/x/crypto to v0.27.0 * Fix CI * Detect and fix typos using codespell * Fix typo: replace buildin with built-in * Add codespell config, pre-commit definition, and move options from Makefile * prune: support clearing build cache using CleanCacheMount * test/e2e: fix network prune flake * Add support for Job to kube generate & play * Add podman-rootless.7 man page * Add DNS, DNSOption and DNSSearch to quadlet pod * podman.1.md: improve policy.json section * e2e: flake fix: SIGPIPE in hook test * libpod: fix rootless cgroup path with --cgroup-parent * vendor: update c/storage * CI: make 055-rm parallel-safe * CI: make 130-kill parallel-safe * CI: make 125-import parallel-safe * CI: make 110-history parallel-safe * CI: system tests: parallelize low-hanging fruit * Add disclaimer to `podman machine info` manpage. * man pages: refactor two more options * update github.com/opencontainers/runc to v1.2.0-rc.3 * update go.etcd.io/bbolt to v1.3.11 * update github.com/onsi/{ginkgo,gomega} * Update module github.com/shirou/gopsutil to v4 * packit: update fedora and epel targets * bump go to 1.22 * cirrus: test only on f40/rawhide * cirrus: remove CI_DESIRED_NETWORK reference * cirrus: prebuild use f40 for extra tests * chore(deps): update dependency setuptools to ~=74.1.0 * libpod: fix HostConfig.Devices output from 'podman inspect' on FreeBSD * fix(deps): update golang.org/x/exp digest to 9b4947d * Implement publishing API UNIX socket on Windows platforms * Vendor c/common:8483ef6022b4 * quadlet: support container network reusing * docs: update read the docs changes * CI: parallel-safe network system test * Quadlet - Support multiple image tags in .build files * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.8.3 * cirrus: remove _bail_if_test_can_be_skipped * cirrus: move renovate check into validate * cirrus: remove 3rd party connectivity check * cirrus: remove cross jobs for aarch64 and x86_64 * cirrus: do not upload alt arch cross artifacts * cirrus: remove ginkgo-e2e.json artifact * cirrus: fix default timeouts * github: remove fcos-podman-next-build-prepush * Clarify podman machine volume mounting behavior under WSL * machine: Add -all-providers flag to machine list * Create a podman-troubleshooting man page * chore(deps): update dependency setuptools to v74 * fix(deps): update module github.com/docker/docker to v27.2.0+incompatible * Fix an improperly ignored error in SQLite * CI: flake workaround: ignore socat waitpid warnings * fix(deps): update module github.com/rootless-containers/rootlesskit/v2 to v2.3.1 * Stop skipping machine volume test on Hyper-V * cleanup: add new --stopped-only option * fix races in the HTTP attach API * cirrus: skip windows/macos machine task on RHEL branches * Update module github.com/containers/gvisor-tap-vsock to v0.7.5 * run: fix detach passthrough and --rmi * podman run: ignore image rm error * Add support for AddHost in quadlet .pod and .container * [CI:DOCS] Update dependency golangci/golangci-lint to v1.60.3 * update github.com/vishvananda/netlink to v1.3.0 * build: Update gvisor-tap-vsock to 0.7.5 * Quote systemd DefaultEnvironment Proxy values, as documented in systemd.conf man page: * fix typo in podman-network-create.1.md * Use HTTP path prefix of TCP connections to match Docker context behavior * Makefile: remotesystem: use real podman server, no --url * Update module github.com/openshift/imagebuilder to v1.2.15 * CI: parallel-safe userns test * Update module github.com/onsi/ginkgo/v2 to v2.20.1 * Add support for IP in quadlet .pod files * Specify format to use for referencing fixed bugs. * CI: parallel-safe run system test * Revert "test/e2e: work around for pasta issue" * CI: On vX.Y-rhel branches, ensure that some downstream Jira issue is linked * quadlet: support user mapping in pod unit * Update Release Process * Test new VM build * command is not optional to podman exec * CI: parallel-safe namespaces system test * [CI:DOCS] Update dependency golangci/golangci-lint to v1.60.2 * quadlet: add key CgroupsMode * Fix `podman stop` and `podman run --rmi` * quadlet: set infra name to %s-infra * chore(deps): update dependency setuptools to v73 * [skip-ci] Packit: update targets for propose-downstream * Do not segfault on hard stop * Fix description of :Z to talk about pods * CI: disable ginkgo flake retries * vendor: update go-criu to latest * golangci-lint: make darwin linting happy * golangci-lint: make windows linting happy * test/e2e: remove kernel version check * golangci-lint: remove most skip dirs * set !remote build tags where needed * update golangci-lint to 1.60.1 * test/e2e: rm systemd start test * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.8.1 * podman wait: allow waiting for removal of containers * libpod: remove UpdateContainerStatus() * podman mount: fix storage/libpod ctr race * CI: quadlet tests: make parallel-safe * CI: system tests: make random_free_port() parallel-safe * remove trailing comma in example * CI: format test: make parallel-safe * Fix podman-docker.sh under -eu shells (fixes #23628) * docs: update podman-wait man page * libpod: remove duplicated HasVolume() check * podman volume rm --force: fix ABBA deadlock * test/system: fix network cleanup restart test * libpod: do not stop pod on init ctr exit * libpod: simplify WaitForExit() * CI: remove build-time quay check * Fix known_hosts file clogging and remote host id * Update docker.io/library/golang Docker tag to v1.23 * Update dependency setuptools to ~=72.2.0 * Update module github.com/docker/docker to v27.1.2+incompatible * healthcheck system check: reduce raciness * CI: healthcheck system test: make parallel-safe * Validate renovate config in every PR * pkg/machine: Read stderr from ssh-keygen correctly * Fix renovate config syntax error * CI: 080-pause.bats: make parallel-safe * CI: 050-stop.bats: make parallel-safe * Additional potential race condition on os.Readdir * pkg/bindings/containers: handle ignore for stop * remote: fix invalid --cidfile + --ignore * Update/simplify renovate config header comment * Migrate renovate config to latest schema * Fix race condition when listing /dev * docs/podman-systemd: Try to clarify `Exec=` more * libpod: reset state error on init * test/system: pasta_test_do add explicit port check * test/e2e: work around new push warning * vendor: update c/common to latest * stopIfOnlyInfraRemains: log all errors * libpod: do not save expected stop errors in ctr state * libpod: fix broken saveContainerError() * Quadlet: fix filters failure when the search paths are symlinks * readme: replace GPG with PGP * Drop APIv2 CNI configuration * De-duplicate docker-py testing * chore(podmansnoop): explain why crun comm is 3 * libpod: cleanupNetwork() return error * fix(deps): update module golang.org/x/sys to v0.24.0 * Reduce python APIv2 test net dependency * Fix not testing registry.conf updates * test/e2e: improve command timeout handling * Update module github.com/onsi/ginkgo/v2 to v2.20.0 * Update module github.com/moby/sys/user to v0.3.0 * Add passwd validate and generate steps * podman container cleanup: ignore common errors * Quadlet - Allow the user to override the default service name * CI: e2e: serialize root containerPort tests * Should not force conversion of manifest type to DockerV2ListMediaType * fix(deps): update module golang.org/x/tools to v0.24.0 * fix(deps): update github.com/containers/common digest to 05b2e1f * CI: mount system test: parallelize * Update module golang.org/x/net to v0.28.0 * Ignore ERROR_SHARING_VIOLATION error on windows * CI: manifest system tests: make parallel-safe * Create volume path before state initialization * vendor: update c/storage * CI: fix broken libkrun test * test/e2e: work around for pasta issue * test/e2e: fix missing exit code checks * Test new CI images * Remove another race condition when mounting containers or images * fix(deps): update github.com/containers/common digest to c0cc6b7 * Change Windows installer MajorUpgrade Schedule * Ignore missing containers when calling GetExternalContainerLists * Remove runc edit to lock to specific version * fix(deps): update module golang.org/x/sys to v0.23.0 * CI: podman-machine: do not use cache registry * CI: completion system test: use safename * Temporarly disable failing Windows Installer CI test * libpod: fix volume copyup with idmap * libpod: avoid hang on errors * Temp. disable PM basic Volume ops test * Add libkrun Mac task * Never skip checkout step in release workflow * System tests: leak_test: readable output * fix(deps): update github.com/docker/go-plugins-helpers digest to 45e2431 * vendor: bump c/common * Version: bump to v5.3.0-dev * libpod: inhibit SIGTERM during cleanup() * Tweak versions in register_images.go * fix network cleanup flake in play kube * WIP: Fixes for vendoring Buildah * Add --compat-volumes option to build and farm build * Bump to Buildah v1.37.0 * Quadlet test - Split between success, warning and error cases * libpod: bind ports before network setup * Disable compose-warning-logs if PODMAN_COMPOSE_WARNING_LOGS=false * Use new syntax for selinux options in quadlet * fix(deps): update module github.com/onsi/gomega to v1.34.1 * CI: kube test: fix broken external-storage test * Update dependency setuptools to v72 * Convert additional build context paths on Windows * pkg/api: do not leak config pointers into specgen * Quadlet - Allow the user to set the service name for .pod files * Quadlet tests - allow overriding the expected service name * fix(deps): update module github.com/moby/sys/user to v0.2.0 * fix(deps): update module github.com/vbauerster/mpb/v8 to v8.7.5 * CI: enable root user namespaces * libpod: force rootfs for OCI path with idmap * fix(deps): update module github.com/onsi/ginkgo/v2 to v2.19.1 * Add test steps for automount with multi images * CI: cp tests: use safename * [skip-ci] RPM: podman-iptables.conf only on Fedora * CI: 700-play: fix a leaked non-safename * test: check that kube generate/play restores the userns * test: disable artifacts cache with composefs * test: fix podman pull tests * vendor: bump c/storage * Update module github.com/cyphar/filepath-securejoin to v0.3.1 * Add /run/containers/systemd, ${XDG_RUNTIME_DIR}/containers/systemd quadlet dirs * build: Update gvisor-tap-vsock to 0.7.4 * test/system: fix borken pasta interface name checks * test/system: fix bridge host.containers.internal test * api: honor the userns for the infra container * play: handle 'private' as 'auto' * kube: record infra user namespace * infra: user ns annotation higher precedence * specgenutil: record the pod userns in the annotations * kube: invert branches * CI: system log test: use safe names * Update encryption tests to avoid a warning if zstd:chunked is the default * Fix "podman pull and decrypt"/"from local registry" * Use unique image names for the encrypted test images * CI: system tests: instrument to allow failure analysis * Fix outdated comment for the build step win-gvproxy * Add utility to convert VMFile to URL for UNIX sockets * Run codespell on source * fix(deps): update module github.com/docker/docker to v27.1.0+incompatible * chore(deps): update dependency setuptools to ~=71.1.0 * logformatter: tweaks to pass html tidy * More information for podman --remote build and running out of space. * Fix windows installer deleting machine provider config file * Use uploaded .zip for Windows action * pr-should-include-tests: no more CI:DOCS override * Depend on runc unconditionally, not only on SLE 15 (bsc#1239088) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-292=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * podman-remote-5.4.2-slfo.1.1_1.1 * podmansh-5.4.2-slfo.1.1_1.1 * podman-debuginfo-5.4.2-slfo.1.1_1.1 * podman-5.4.2-slfo.1.1_1.1 * podman-remote-debuginfo-5.4.2-slfo.1.1_1.1 * SUSE Linux Micro 6.1 (noarch) * podman-docker-5.4.2-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6032.html * https://bugzilla.suse.com/show_bug.cgi?id=1239088 * https://bugzilla.suse.com/show_bug.cgi?id=1242132 * https://bugzilla.suse.com/show_bug.cgi?id=1245320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:22 -0000 Subject: SUSE-SU-2025:20804-1: moderate: Security update for bluez Message-ID: <176043068291.27771.1112983530130745941@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2025:20804-1 Release Date: 2025-10-01T13:48:02Z Rating: moderate References: * bsc#1217877 Cross-References: * CVE-2023-45866 CVSS scores: * CVE-2023-45866 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2023-45866 ( NVD ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-45866: Fixed unauthorized HID device connections allowing keystroke injection and arbitrary commands execution (bsc#1217877) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-293=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libbluetooth3-5.70-slfo.1.1_2.1 * libbluetooth3-debuginfo-5.70-slfo.1.1_2.1 * bluez-debugsource-5.70-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45866.html * https://bugzilla.suse.com/show_bug.cgi?id=1217877 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:32 -0000 Subject: SUSE-SU-2025:20802-1: important: Security update for curl Message-ID: <176043069216.27771.10124952773197154265@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20802-1 Release Date: 2025-09-26T09:21:50Z Rating: important References: * bsc#1249191 * bsc#1249348 * bsc#1249367 Cross-References: * CVE-2025-10148 * CVE-2025-9086 CVSS scores: * CVE-2025-10148 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-9086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9086 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for curl fixes the following issues: * tool_operate: fix return code when --retry is used but not triggered [bsc#1249367] * Security fixes: * CVE-2025-9086: Fixed Out of bounds read for cookie path (bsc#1249191) * CVE-2025-10148: Fixed predictable WebSocket mask (bsc#1249348) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-286=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * curl-8.14.1-slfo.1.1_2.1 * curl-debuginfo-8.14.1-slfo.1.1_2.1 * curl-debugsource-8.14.1-slfo.1.1_2.1 * libcurl4-debuginfo-8.14.1-slfo.1.1_2.1 * libcurl4-8.14.1-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10148.html * https://www.suse.com/security/cve/CVE-2025-9086.html * https://bugzilla.suse.com/show_bug.cgi?id=1249191 * https://bugzilla.suse.com/show_bug.cgi?id=1249348 * https://bugzilla.suse.com/show_bug.cgi?id=1249367 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 08:31:34 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 08:31:34 -0000 Subject: SUSE-SU-2025:20801-1: important: Security update for udisks2 Message-ID: <176043069449.27771.9080923182704642998@smelt2.prg2.suse.org> # Security update for udisks2 Announcement ID: SUSE-SU-2025:20801-1 Release Date: 2025-09-26T09:12:30Z Rating: important References: * bsc#1248502 Cross-References: * CVE-2025-8067 CVSS scores: * CVE-2025-8067 ( SUSE ): 8.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H * CVE-2025-8067 ( NVD ): 8.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for udisks2 fixes the following issues: * CVE-2025-8067: Fixed missing bounds check that could lead to out-of-bounds read in udisks daemon (bsc#1248502) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-287=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libudisks2-0-2.9.4-slfo.1.1_2.1 * libudisks2-0_btrfs-debuginfo-2.9.4-slfo.1.1_2.1 * libudisks2-0_btrfs-2.9.4-slfo.1.1_2.1 * udisks2-2.9.4-slfo.1.1_2.1 * udisks2-debuginfo-2.9.4-slfo.1.1_2.1 * libudisks2-0_lvm2-debuginfo-2.9.4-slfo.1.1_2.1 * libudisks2-0-debuginfo-2.9.4-slfo.1.1_2.1 * udisks2-debugsource-2.9.4-slfo.1.1_2.1 * libudisks2-0_lvm2-2.9.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8067.html * https://bugzilla.suse.com/show_bug.cgi?id=1248502 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:09 -0000 Subject: SUSE-SU-2025:20842-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Message-ID: <176044500926.27771.9265181863970188107@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_10 Announcement ID: SUSE-SU-2025:20842-1 Release Date: 2025-10-07T15:45:17Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_10 fixes the following issues: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-149=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-34-rt-debuginfo-5-1.1 * kernel-livepatch-6_4_0-34-rt-5-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_10-debugsource-5-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:16 -0000 Subject: SUSE-SU-2025:20841-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Message-ID: <176044501652.27771.12654634853880633856@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_3 Announcement ID: SUSE-SU-2025:20841-1 Release Date: 2025-10-07T15:45:17Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_3 fixes the following issues: * CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072) * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-143=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_3-debugsource-13-1.2 * kernel-livepatch-6_4_0-11-rt-13-1.2 * kernel-livepatch-6_4_0-11-rt-debuginfo-13-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:23 -0000 Subject: SUSE-SU-2025:20840-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Message-ID: <176044502331.27771.3932076543534293525@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_2 Announcement ID: SUSE-SU-2025:20840-1 Release Date: 2025-10-07T15:45:16Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_2 fixes the following issues: * CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072) * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-142=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_2-debugsource-13-1.1 * kernel-livepatch-6_4_0-10-rt-debuginfo-13-1.1 * kernel-livepatch-6_4_0-10-rt-13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:25 -0000 Subject: SUSE-SU-2025:20839-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_9 Message-ID: <176044502568.27771.17017422835071691182@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_9 Announcement ID: SUSE-SU-2025:20839-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1247315 Cross-References: * CVE-2025-38477 CVSS scores: * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_9 fixes the following issues: * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-157=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-31-default-debuginfo-6-1.2 * kernel-livepatch-MICRO-6-0_Update_9-debugsource-6-1.2 * kernel-livepatch-6_4_0-31-default-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:29 -0000 Subject: SUSE-SU-2025:20838-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_8 Message-ID: <176044502902.27771.12047000664011651094@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_8 Announcement ID: SUSE-SU-2025:20838-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_8 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-156=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-30-default-6-1.2 * kernel-livepatch-MICRO-6-0_Update_8-debugsource-6-1.2 * kernel-livepatch-6_4_0-30-default-debuginfo-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:32 -0000 Subject: SUSE-SU-2025:20837-1: moderate: Security update for kernel-livepatch-MICRO-6-0_Update_7 Message-ID: <176044503236.27771.4358365318600111819@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_7 Announcement ID: SUSE-SU-2025:20837-1 Release Date: 2025-10-07T15:38:32Z Rating: moderate References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_7 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-155=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-29-default-6-1.2 * kernel-livepatch-MICRO-6-0_Update_7-debugsource-6-1.2 * kernel-livepatch-6_4_0-29-default-debuginfo-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:35 -0000 Subject: SUSE-SU-2025:20836-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_6 Message-ID: <176044503562.27771.16017732741039883253@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_6 Announcement ID: SUSE-SU-2025:20836-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_6 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-154=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_6-debugsource-7-3.1 * kernel-livepatch-6_4_0-28-default-debuginfo-7-3.1 * kernel-livepatch-6_4_0-28-default-7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:47 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:47 -0000 Subject: SUSE-SU-2025:20835-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_5 Message-ID: <176044504702.27771.586881760010282175@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_5 Announcement ID: SUSE-SU-2025:20835-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_5 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-153=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-25-default-debuginfo-9-1.2 * kernel-livepatch-MICRO-6-0_Update_5-debugsource-9-1.2 * kernel-livepatch-6_4_0-25-default-9-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:30:53 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:30:53 -0000 Subject: SUSE-SU-2025:20834-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_4 Message-ID: <176044505321.27771.3715571420952163054@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_4 Announcement ID: SUSE-SU-2025:20834-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_4 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-152=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-MICRO-6-0_Update_4-debugsource-11-1.2 * kernel-livepatch-6_4_0-24-default-debuginfo-11-1.2 * kernel-livepatch-6_4_0-24-default-11-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:00 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:00 -0000 Subject: SUSE-SU-2025:20833-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_3 Message-ID: <176044506008.27771.13017082007463403022@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_3 Announcement ID: SUSE-SU-2025:20833-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_3 fixes the following issues: * CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072) * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-151=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-20-default-debuginfo-13-1.2 * kernel-livepatch-MICRO-6-0_Update_3-debugsource-13-1.2 * kernel-livepatch-6_4_0-20-default-13-1.2 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:06 -0000 Subject: SUSE-SU-2025:20832-1: important: Security update for kernel-livepatch-MICRO-6-0_Update_2 Message-ID: <176044506697.27771.6529394311055984460@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0_Update_2 Announcement ID: SUSE-SU-2025:20832-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1233072 * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-50154 * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-50154 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50154 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0_Update_2 fixes the following issues: * CVE-2024-50154: tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink() (bsc#1233072) * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-150=1 ## Package List: * SUSE Linux Micro 6.0 (s390x x86_64) * kernel-livepatch-6_4_0-19-default-debuginfo-13-1.1 * kernel-livepatch-MICRO-6-0_Update_2-debugsource-13-1.1 * kernel-livepatch-6_4_0-19-default-13-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50154.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1233072 * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:10 -0000 Subject: SUSE-SU-2025:20831-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Message-ID: <176044507060.27771.12925972255239390831@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_9 Announcement ID: SUSE-SU-2025:20831-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_9 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-148=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-33-rt-debuginfo-5-1.2 * kernel-livepatch-MICRO-6-0-RT_Update_9-debugsource-5-1.2 * kernel-livepatch-6_4_0-33-rt-5-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:14 -0000 Subject: SUSE-SU-2025:20830-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Message-ID: <176044507440.27771.16152856588011173920@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_8 Announcement ID: SUSE-SU-2025:20830-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_8 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-147=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_8-debugsource-6-1.2 * kernel-livepatch-6_4_0-31-rt-6-1.2 * kernel-livepatch-6_4_0-31-rt-debuginfo-6-1.2 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:17 -0000 Subject: SUSE-SU-2025:20829-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Message-ID: <176044507783.27771.14164684032852164647@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_7 Announcement ID: SUSE-SU-2025:20829-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_7 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-146=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_7-debugsource-7-1.3 * kernel-livepatch-6_4_0-30-rt-debuginfo-7-1.3 * kernel-livepatch-6_4_0-30-rt-7-1.3 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:21 -0000 Subject: SUSE-SU-2025:20828-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Message-ID: <176044508171.27771.12064847731610722670@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_6 Announcement ID: SUSE-SU-2025:20828-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_6 fixes the following issues: * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-145=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-28-rt-debuginfo-7-3.1 * kernel-livepatch-MICRO-6-0-RT_Update_6-debugsource-7-3.1 * kernel-livepatch-6_4_0-28-rt-7-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:26 -0000 Subject: SUSE-SU-2025:20827-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Message-ID: <176044508620.27771.16298421528274499944@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_5 Announcement ID: SUSE-SU-2025:20827-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_5 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-144=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-25-rt-debuginfo-9-1.1 * kernel-livepatch-6_4_0-25-rt-9-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_5-debugsource-9-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:32 -0000 Subject: SUSE-SU-2025:20826-1: important: Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Message-ID: <176044509201.27771.16432082233509769522@smelt2.prg2.suse.org> # Security update for kernel-livepatch-MICRO-6-0-RT_Update_4 Announcement ID: SUSE-SU-2025:20826-1 Release Date: 2025-10-07T15:38:32Z Rating: important References: * bsc#1237048 * bsc#1240744 * bsc#1243650 * bsc#1245509 * bsc#1247315 Cross-References: * CVE-2024-53168 * CVE-2025-21692 * CVE-2025-21791 * CVE-2025-38089 * CVE-2025-38477 CVSS scores: * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_4 fixes the following issues: * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237048) * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1240744) * CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1243650) * CVE-2025-38089: sunrpc: handle SVC_GARBAGE during svc auth processing as auth error (bsc#1245509) * CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247315) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-141=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-MICRO-6-0-RT_Update_4-debugsource-10-1.1 * kernel-livepatch-6_4_0-22-rt-debuginfo-10-1.1 * kernel-livepatch-6_4_0-22-rt-10-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://bugzilla.suse.com/show_bug.cgi?id=1237048 * https://bugzilla.suse.com/show_bug.cgi?id=1240744 * https://bugzilla.suse.com/show_bug.cgi?id=1243650 * https://bugzilla.suse.com/show_bug.cgi?id=1245509 * https://bugzilla.suse.com/show_bug.cgi?id=1247315 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:40 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:40 -0000 Subject: SUSE-SU-2025:20825-1: moderate: Security update for net-tools Message-ID: <176044510070.27771.5546765566995850417@smelt2.prg2.suse.org> # Security update for net-tools Announcement ID: SUSE-SU-2025:20825-1 Release Date: 2025-09-26T09:30:58Z Rating: moderate References: * bsc#1243581 * bsc#1248410 * bsc#1248687 * bsc#142461 * bsc#544339 Cross-References: * CVE-2025-46836 CVSS scores: * CVE-2025-46836 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-46836 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-46836 ( NVD ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability and has four fixes can now be installed. ## Description: This update for net-tools fixes the following issues: * Fixed stack buffer overflow in parse_hex, proc_gen_fmt, ax25 and netrom (bsc#1248687) * Fixed stack overflow in ax25 and netrom (bsc#1248687) * CVE-2025-46836: Fixed stack buffer overflow caused by the absence of bound checks (bsc#1243581) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-478=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * net-tools-debuginfo-2.10-4.1 * net-tools-2.10-4.1 * net-tools-debugsource-2.10-4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46836.html * https://bugzilla.suse.com/show_bug.cgi?id=1243581 * https://bugzilla.suse.com/show_bug.cgi?id=1248410 * https://bugzilla.suse.com/show_bug.cgi?id=1248687 * https://bugzilla.suse.com/show_bug.cgi?id=142461 * https://bugzilla.suse.com/show_bug.cgi?id=544339 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Oct 14 12:31:45 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 14 Oct 2025 12:31:45 -0000 Subject: SUSE-SU-2025:20824-1: important: Security update for curl Message-ID: <176044510569.27771.12767392770658696703@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2025:20824-1 Release Date: 2025-09-25T10:50:20Z Rating: important References: * bsc#1246197 * bsc#1249191 * bsc#1249348 * bsc#1249367 * jsc#PED-13055 * jsc#PED-13056 Cross-References: * CVE-2025-10148 * CVE-2025-9086 CVSS scores: * CVE-2025-10148 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-9086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-9086 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities, contains two features and has two fixes can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-9086: Fixed Out of bounds read for cookie path (bsc#1249191) * CVE-2025-10148: Predictable WebSocket mask (bsc#1249348) * Fix the --ftp-pasv option in curl v8.14.1 [bsc#1246197] * tool_operate: fix return code when --retry is used but not triggered [bsc#1249367] * Updated to 8.14.1: [jsc#PED-13055, jsc#PED-13056] * Add _multibuild * Bugfixes: * asyn-thrdd: fix cleanup when RR fails due to OOM * ftp: fix teardown of DATA connection in done * http: fail early when rewind of input failed when following redirects * multi: fix add_handle resizing * tls BIOs: handle BIO_CTRL_EOF correctly * tool_getparam: make --no-anyauth not be accepted * wolfssl: fix sending of early data * ws: handle blocked sends better * ws: tests and fixes * Sync spec file with SLE codestreams: [jsc#PED-13055, jsc#PED-13056] * Add curl-mini.rpmlintrc to avoid rpmlint shlib-policy-name-error when building the curl-mini package in SLE. * Add libssh minimum version requirements. * Use ldconfig_scriptlets when available. * Remove unused option --disable-ntlm-wb. * Update to 8.14.0: * Changes: * mqtt: send ping at upkeep interval * schannel: handle pkcs12 client certificates containing CA certificates * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs * vquic: ngtcp2 + openssl support * wcurl: import v2025.04.20 script + docs * websocket: add option to disable auto-pong reply * Bugfixes: * asny-thrdd: fix detach from running thread * async-threaded resolver: use ref counter * async: DoH improvements * build: enable gcc-12/13+, clang-10+ picky warnings * build: enable gcc-15 picky warnings * certs: drop unused `default_bits` from `.prm` files * cf-https-connect: use the passed in dns struct pointer * cf-socket: fix FTP accept connect * cfilters: remove assert * cmake: fix nghttp3 static linking with `USE_OPENSSL_QUIC=ON` * cmake: prefer `COMPILE_OPTIONS` over `CMAKE_C_FLAGS` for custom C options * cmake: revert `CURL_LTO` behavior for multi-config generators * configure: fix --disable-rt * CONTRIBUTE: add project guidelines for AI use * cpool/cshutdown: force close connections under pressure * curl: fix memory leak when -h is used in config file * curl_get_line: handle lines ending on the buffer boundary * headers: enforce a max number of response header to accept * http: fix HTTP/2 handling of TE request header using "trailers" * lib: include files using known path * lib: unify conversions to/from hex * libssh: add NULL check for Curl_meta_get() * libssh: fix memory leak * mqtt: use conn/easy meta hash * multi: do transfer book keeping using mid * multi: init_do(): check result * netrc: avoid NULL deref on weird input * netrc: avoid strdup NULL * netrc: deal with null token better * openssl-quic: avoid potential `-Wnull-dereference`, add assert * openssl-quic: fix shutdown when stream not open * openssl: enable builds for _both_ engines and providers * openssl: set the cipher string before doing private cert * progress: avoid integer overflow when gathering total transfer size * rand: update comment on Curl_rand_bytes weak random * rustls: make max size of cert and key reasonable * smb: avoid integer overflow on weird input date * urlapi: redirecting to "" is considered fine * Update to 8.13.0: * Changes: * curl: add write-out variable 'tls_earlydata' * curl: make --url support a file with URLs * gnutls: set priority via --ciphers * IMAP: add CURLOPT_UPLOAD_FLAGS and --upload-flags * lib: add CURLFOLLOW_OBEYCODE and CURLFOLLOW_FIRSTONLY * OpenSSL/quictls: add support for TLSv1.3 early data * rustls: add support for CERTINFO * rustls: add support for SSLKEYLOGFILE * rustls: support ECH w/ DoH lookup for config * rustls: support native platform verifier * var: add a '64dec' function that can base64 decode a string * Bugfixes: * conn: fix connection reuse when SSL is optional * hash: use single linked list for entries * http2: detect session being closed on ingress handling * http2: reset stream on response header error * http: remove a HTTP method size restriction * http: version negotiation * httpsrr: fix port detection * libssh: fix freeing of resources in disconnect * libssh: fix scp large file upload for 32-bit size_t systems * openssl-quic: do not iterate over multi handles * openssl: check return value of X509_get0_pubkey * openssl: drop support for old OpenSSL/LibreSSL versions * openssl: fix crash on missing cert password * openssl: fix pkcs11 URI checking for key files. * openssl: remove bad `goto`s into other scope * setopt: illegal CURLOPT_SOCKS5_AUTH should return error * setopt: setting PROXYUSERPWD after PROXYUSERNAME/PASSWORD is fine * sshserver.pl: adjust `AuthorizedKeysFile2` cutoff version * sshserver: fix excluding obsolete client config lines * SSLCERTS: list support for SSL_CERT_FILE and SSL_CERT_DIR * tftpd: prefix TFTP protocol error `E*` constants with `TFTP_` * tool_operate: fail SSH transfers without server auth * url: call protocol handler's disconnect in Curl_conn_free * urlapi: remove percent encoded dot sequences from the URL path * urldata: remove 'hostname' from struct Curl_async * Update to 8.12.1: * Bugfixes: * asyn-thread: fix build with 'CURL_DISABLE_SOCKETPAIR' * asyn-thread: fix HTTPS RR crash * asyn-thread: fix the returned bitmask from Curl_resolver_getsock * asyn-thread: survive a c-ares channel set to NULL * cmake: always reference OpenSSL and ZLIB via imported targets * cmake: respect 'GNUTLS_CFLAGS' when detected via 'pkg-config' * cmake: respect 'GNUTLS_LIBRARY_DIRS' in 'libcurl.pc' and 'curl-config' * content_encoding: #error on too old zlib * imap: TLS upgrade fix * ldap: drop support for legacy Novell LDAP SDK * libssh2: comparison is always true because rc <= -1 * libssh2: raise lowest supported version to 1.2.8 * libssh: drop support for libssh older than 0.9.0 * openssl-quic: ignore ciphers for h3 * pop3: TLS upgrade fix * runtests: fix the disabling of the memory tracking * runtests: quote commands to support paths with spaces * scache: add magic checks * smb: silence '-Warray-bounds' with gcc 13+ * smtp: TLS upgrade fix * tool_cfgable: sort struct fields by size, use bitfields for booleans * tool_getparam: add "TLS required" flag for each such option * vtls: fix multissl-init * wakeup_write: make sure the eventfd write sends eight bytes * Update to 8.12.0: * Changes: * curl: add byte range support to --variable reading from file * curl: make --etag-save acknowledge --create-dirs * getinfo: fix CURLINFO_QUEUE_TIME_T and add 'time_queue' var * getinfo: provide info which auth was used for HTTP and proxy * hyper: drop support * openssl: add support to use keys and certificates from PKCS#11 provider * QUIC: 0RTT for gnutls via CURLSSLOPT_EARLYDATA * vtls: feature ssls-export for SSL session im-/export * Bugfixes: * altsvc: avoid integer overflow in expire calculation * asyn-ares: acknowledge CURLOPT_DNS_SERVERS set to NULL * asyn-ares: fix memory leak * asyn-ares: initial HTTPS resolve support * asyn-thread: use c-ares to resolve HTTPS RR * async-thread: avoid closing eventfd twice * cd2nroff: do not insist on quoted <> within backticks * cd2nroff: support "none" as a TLS backend * conncache: count shutdowns against host and max limits * content_encoding: drop support for zlib before 1.2.0.4 * content_encoding: namespace GZIP flag constants * content_encoding: put the decomp buffers into the writer structs * content_encoding: support use of custom libzstd memory functions * cookie: cap expire times to 400 days * cookie: parse only the exact expire date * curl: return error if etag options are used with multiple URLs * curl_multi_fdset: include the shutdown connections in the set * curl_sha512_256: rename symbols to the curl namespace * curl_url_set.md: adjust the added-in to 7.62.0 * doh: send HTTPS RR requests for all HTTP(S) transfers * easy: allow connect-only handle reuse with easy_perform * easy: make curl_easy_perform() return error if connection still there * easy_lock: use Sleep(1) for thread yield on old Windows * ECH: update APIs to those agreed with OpenSSL maintainers * GnuTLS: fix 'time_appconnect' for early data * HTTP/2: strip TE request header * http2: fix data_pending check * http2: fix value stored to 'result' is never read * http: ignore invalid Retry-After times * http_aws_sigv4: Fix invalid compare function handling zero-length pairs * https-connect: start next immediately on failure * lib: redirect handling by protocol handler * multi: fix curl_multi_waitfds reporting of fd_count * netrc: 'default' with no credentials is not a match * netrc: fix password-only entries * netrc: restore _netrc fallback logic * ngtcp2: fix memory leak on connect failure * openssl: define `HAVE_KEYLOG_CALLBACK` before use * openssl: fix ECH logic * osslq: use SSL_poll to determine writeability of QUIC streams * sectransp: free certificate on error * select: avoid a NULL deref in cwfds_add_sock * src: omit hugehelp and ca-embed from libcurltool * ssl session cache: change cache dimensions * system.h: add 64-bit curl_off_t definitions for NonStop * telnet: handle single-byte input option * TLS: check connection for SSL use, not handler * tool_formparse.c: make curlx_uztoso a static in here * tool_formparse: accept digits in --form type= strings * tool_getparam: ECH param parsing refix * tool_getparam: fail --hostpubsha256 if libssh2 is not used * tool_getparam: fix "Ignored Return Value" * tool_getparam: fix memory leak on error in parse_ech * tool_getparam: fix the ECH parser * tool_operate: make --etag-compare always accept a non-existing file * transfer: fix CURLOPT_CURLU override logic * urlapi: fix redirect to a new fragment or query (only) * vquic: make vquic_send_packets not return without setting psent * vtls: fix default SSL backend as a fallback * vtls: only remember the expiry timestamp in session cache * websocket: fix message send corruption * x509asn1: add parse recursion limit ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-477=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * curl-8.14.1-1.1 * libcurl4-8.14.1-1.1 * curl-debuginfo-8.14.1-1.1 * curl-debugsource-8.14.1-1.1 * libcurl4-debuginfo-8.14.1-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10148.html * https://www.suse.com/security/cve/CVE-2025-9086.html * https://bugzilla.suse.com/show_bug.cgi?id=1246197 * https://bugzilla.suse.com/show_bug.cgi?id=1249191 * https://bugzilla.suse.com/show_bug.cgi?id=1249348 * https://bugzilla.suse.com/show_bug.cgi?id=1249367 * https://jira.suse.com/browse/PED-13055 * https://jira.suse.com/browse/PED-13056 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 08:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 08:30:23 -0000 Subject: SUSE-SU-2025:03595-1: moderate: Security update for libxslt Message-ID: <176051702328.27771.15839310289436759916@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:03595-1 Release Date: 2025-10-14T21:07:57Z Rating: moderate References: * bsc#1250553 Cross-References: * CVE-2025-10911 CVSS scores: * CVE-2025-10911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for libxslt fixes the following issues: * last fix caused a regression, patch was temporary disabled [bsc#1250553] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3595=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3595=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3595=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3595=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libxslt-python-1.1.32-150000.3.25.1 * libxslt-python-debuginfo-1.1.32-150000.3.25.1 * libxslt-python-debugsource-1.1.32-150000.3.25.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.32-150000.3.25.1 * libxslt-debugsource-1.1.32-150000.3.25.1 * libxslt1-1.1.32-150000.3.25.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.32-150000.3.25.1 * libxslt-debugsource-1.1.32-150000.3.25.1 * libxslt1-1.1.32-150000.3.25.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.32-150000.3.25.1 * libxslt-debugsource-1.1.32-150000.3.25.1 * libxslt1-1.1.32-150000.3.25.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10911.html * https://bugzilla.suse.com/show_bug.cgi?id=1250553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:31:43 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:31:43 -0000 Subject: SUSE-SU-2025:03601-1: important: Security update for the Linux Kernel Message-ID: <176054590369.27771.10795696185227648529@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03601-1 Release Date: 2025-10-15T12:57:08Z Rating: important References: * bsc#1212533 * bsc#1216527 * bsc#1218644 * bsc#1227555 * bsc#1230062 * bsc#1236897 * bsc#1237449 * bsc#1237776 * bsc#1238782 * bsc#1240324 * bsc#1241166 * bsc#1241292 * bsc#1241866 * bsc#1243112 * bsc#1245538 * bsc#1245700 * bsc#1245963 * bsc#1246057 * bsc#1246190 * bsc#1246248 * bsc#1246298 * bsc#1246509 * bsc#1246782 * bsc#1247099 * bsc#1247126 * bsc#1247136 * bsc#1247137 * bsc#1247223 * bsc#1247239 * bsc#1247262 * bsc#1247442 * bsc#1247483 * bsc#1247963 * bsc#1248111 * bsc#1248121 * bsc#1248192 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248225 * bsc#1248296 * bsc#1248334 * bsc#1248343 * bsc#1248357 * bsc#1248360 * bsc#1248365 * bsc#1248378 * bsc#1248380 * bsc#1248392 * bsc#1248512 * bsc#1248610 * bsc#1248616 * bsc#1248619 * bsc#1248622 * bsc#1248626 * bsc#1248628 * bsc#1248634 * bsc#1248639 * bsc#1248647 * bsc#1248674 * bsc#1248681 * bsc#1248733 * bsc#1248734 * bsc#1248735 * bsc#1248775 * bsc#1249122 * bsc#1249123 * bsc#1249124 * bsc#1249125 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249163 * bsc#1249172 * bsc#1249176 * bsc#1249183 * bsc#1249186 * bsc#1249193 * bsc#1249199 * bsc#1249201 * bsc#1249202 * bsc#1249206 * bsc#1249258 * bsc#1249262 * bsc#1249274 * bsc#1249284 * bsc#1249290 * bsc#1249295 * bsc#1249300 * bsc#1249303 * bsc#1249305 * bsc#1249306 * bsc#1249315 * bsc#1249333 * bsc#1249334 * bsc#1249374 * bsc#1249481 * bsc#1249482 * bsc#1249488 * bsc#1249494 * bsc#1249504 * bsc#1249508 * bsc#1249510 * bsc#1249513 * bsc#1249516 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249540 * bsc#1249545 * bsc#1249566 * bsc#1249604 * bsc#1249608 * bsc#1249770 * bsc#1249887 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1250002 * bsc#1250021 * bsc#1250025 * bsc#1250057 * bsc#1250179 * bsc#1250251 * bsc#1250267 * bsc#1250294 * bsc#1250334 * bsc#1250336 * bsc#1250344 * bsc#1250365 * bsc#1250407 * bsc#1250522 * bsc#1250530 * bsc#1250574 * bsc#1250655 * bsc#1250722 * bsc#1250952 * jsc#PED-13260 Cross-References: * CVE-2023-53261 * CVE-2023-5633 * CVE-2024-58090 * CVE-2025-22022 * CVE-2025-38119 * CVE-2025-38216 * CVE-2025-38234 * CVE-2025-38255 * CVE-2025-38263 * CVE-2025-38351 * CVE-2025-38402 * CVE-2025-38408 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38456 * CVE-2025-38466 * CVE-2025-38488 * CVE-2025-38514 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38533 * CVE-2025-38544 * CVE-2025-38556 * CVE-2025-38574 * CVE-2025-38584 * CVE-2025-38590 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38605 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38628 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38645 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38664 * CVE-2025-38668 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38684 * CVE-2025-38701 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39691 * CVE-2025-39695 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39707 * CVE-2025-39711 * CVE-2025-39718 * CVE-2025-39738 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39749 * CVE-2025-39754 * CVE-2025-39764 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39773 * CVE-2025-39782 * CVE-2025-39787 * CVE-2025-39797 * CVE-2025-39807 * CVE-2025-39811 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39825 * CVE-2025-39830 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39838 * CVE-2025-39842 * CVE-2025-39857 * CVE-2025-39865 * CVE-2025-39885 * CVE-2025-39890 * CVE-2025-39922 * CVE-2025-40300 CVSS scores: * CVE-2023-53261 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53261 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-5633 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5633 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5633 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22022 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22022 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves 96 vulnerabilities, contains one feature and has 41 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3601=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3601=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3601=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2025-3601=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-3601=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2025-3601=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * Basesystem Module 15-SP7 (aarch64 nosrc) * kernel-64kb-6.4.0-150700.53.19.1 * Basesystem Module 15-SP7 (aarch64) * kernel-64kb-debugsource-6.4.0-150700.53.19.1 * kernel-64kb-devel-debuginfo-6.4.0-150700.53.19.1 * kernel-64kb-debuginfo-6.4.0-150700.53.19.1 * kernel-64kb-devel-6.4.0-150700.53.19.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150700.53.19.1 * Basesystem Module 15-SP7 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150700.53.19.1.150700.17.13.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150700.53.19.1 * kernel-default-debugsource-6.4.0-150700.53.19.1 * kernel-default-debuginfo-6.4.0-150700.53.19.1 * kernel-default-devel-6.4.0-150700.53.19.1 * Basesystem Module 15-SP7 (noarch) * kernel-macros-6.4.0-150700.53.19.1 * kernel-devel-6.4.0-150700.53.19.1 * Basesystem Module 15-SP7 (nosrc s390x) * kernel-zfcpdump-6.4.0-150700.53.19.1 * Basesystem Module 15-SP7 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150700.53.19.1 * kernel-zfcpdump-debugsource-6.4.0-150700.53.19.1 * Development Tools Module 15-SP7 (noarch nosrc) * kernel-docs-6.4.0-150700.53.19.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.4.0-150700.53.19.1 * kernel-obs-build-debugsource-6.4.0-150700.53.19.1 * kernel-syms-6.4.0-150700.53.19.1 * Development Tools Module 15-SP7 (noarch) * kernel-source-6.4.0-150700.53.19.1 * Legacy Module 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.19.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-6.4.0-150700.53.19.1 * kernel-default-debugsource-6.4.0-150700.53.19.1 * kernel-default-debuginfo-6.4.0-150700.53.19.1 * reiserfs-kmp-default-6.4.0-150700.53.19.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150700.53.19.1 * cluster-md-kmp-default-6.4.0-150700.53.19.1 * ocfs2-kmp-default-debuginfo-6.4.0-150700.53.19.1 * gfs2-kmp-default-debuginfo-6.4.0-150700.53.19.1 * dlm-kmp-default-6.4.0-150700.53.19.1 * gfs2-kmp-default-6.4.0-150700.53.19.1 * dlm-kmp-default-debuginfo-6.4.0-150700.53.19.1 * ocfs2-kmp-default-6.4.0-150700.53.19.1 * cluster-md-kmp-default-debuginfo-6.4.0-150700.53.19.1 * kernel-default-debuginfo-6.4.0-150700.53.19.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.19.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (nosrc) * kernel-default-6.4.0-150700.53.19.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * kernel-default-extra-debuginfo-6.4.0-150700.53.19.1 * kernel-default-extra-6.4.0-150700.53.19.1 * kernel-default-debugsource-6.4.0-150700.53.19.1 * kernel-default-debuginfo-6.4.0-150700.53.19.1 * SUSE Linux Enterprise Live Patching 15-SP7 (nosrc) * kernel-default-6.4.0-150700.53.19.1 * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150700.53.19.1 * kernel-livepatch-6_4_0-150700_53_19-default-1-150700.15.3.1 * kernel-default-livepatch-6.4.0-150700.53.19.1 * kernel-livepatch-SLE15-SP7_Update_5-debugsource-1-150700.15.3.1 * kernel-default-livepatch-devel-6.4.0-150700.53.19.1 * kernel-livepatch-6_4_0-150700_53_19-default-debuginfo-1-150700.15.3.1 * kernel-default-debuginfo-6.4.0-150700.53.19.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53261.html * https://www.suse.com/security/cve/CVE-2023-5633.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2025-22022.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://bugzilla.suse.com/show_bug.cgi?id=1212533 * https://bugzilla.suse.com/show_bug.cgi?id=1216527 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1227555 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237449 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238782 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241292 * https://bugzilla.suse.com/show_bug.cgi?id=1241866 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1245538 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246298 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248733 * https://bugzilla.suse.com/show_bug.cgi?id=1248734 * https://bugzilla.suse.com/show_bug.cgi?id=1248735 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249122 * https://bugzilla.suse.com/show_bug.cgi?id=1249123 * https://bugzilla.suse.com/show_bug.cgi?id=1249124 * https://bugzilla.suse.com/show_bug.cgi?id=1249125 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249183 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249481 * https://bugzilla.suse.com/show_bug.cgi?id=1249482 * https://bugzilla.suse.com/show_bug.cgi?id=1249488 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249770 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250057 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250336 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250530 * https://bugzilla.suse.com/show_bug.cgi?id=1250574 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://jira.suse.com/browse/PED-13260 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:31:57 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:31:57 -0000 Subject: SUSE-SU-2025:03607-1: important: Security update for squid Message-ID: <176054591731.27771.5459979447578672227@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:03607-1 Release Date: 2025-10-15T13:38:41Z Rating: important References: * bsc#1250627 Cross-References: * CVE-2025-59362 CVSS scores: * CVE-2025-59362 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59362 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59362 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-59362: fixed buffer overflow (bsc#1250627) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3607=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3607=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * squid-4.17-4.53.1 * squid-debugsource-4.17-4.53.1 * squid-debuginfo-4.17-4.53.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * squid-4.17-4.53.1 * squid-debugsource-4.17-4.53.1 * squid-debuginfo-4.17-4.53.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59362.html * https://bugzilla.suse.com/show_bug.cgi?id=1250627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:31:59 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:31:59 -0000 Subject: SUSE-SU-2025:03606-1: important: Security update for squid Message-ID: <176054591957.27771.16910325696456487870@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:03606-1 Release Date: 2025-10-15T13:38:30Z Rating: important References: * bsc#1250627 Cross-References: * CVE-2025-59362 CVSS scores: * CVE-2025-59362 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59362 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59362 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-59362: fixed buffer overflow (bsc#1250627) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3606=1 openSUSE-SLE-15.6-2025-3606=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-3606=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-3606=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * squid-debuginfo-6.10-150600.3.9.1 * squid-debugsource-6.10-150600.3.9.1 * squid-6.10-150600.3.9.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-6.10-150600.3.9.1 * squid-debugsource-6.10-150600.3.9.1 * squid-6.10-150600.3.9.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * squid-debuginfo-6.10-150600.3.9.1 * squid-debugsource-6.10-150600.3.9.1 * squid-6.10-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59362.html * https://bugzilla.suse.com/show_bug.cgi?id=1250627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:32:02 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:32:02 -0000 Subject: SUSE-SU-2025:03604-1: critical: Security update for samba Message-ID: <176054592268.27771.9890234569282906801@smelt2.prg2.suse.org> # Security update for samba Announcement ID: SUSE-SU-2025:03604-1 Release Date: 2025-10-15T13:38:02Z Rating: critical References: * bsc#1251279 * bsc#1251280 Cross-References: * CVE-2025-10230 * CVE-2025-9640 CVSS scores: * CVE-2025-10230 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-9640 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-9640 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * SUSE Linux Enterprise High Availability Extension 12 SP5 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279). * CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2025-3604=1 * SUSE Linux Enterprise High Availability Extension 12 SP5 zypper in -t patch SUSE-SLE-HA-12-SP5-2025-3604=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3604=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3604=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64) * ctdb-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debugsource-4.15.13+git.664.e8416d8d213-3.99.1 * ctdb-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x x86_64) * ctdb-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debugsource-4.15.13+git.664.e8416d8d213-3.99.1 * ctdb-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * samba-libs-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-python3-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy-python3-devel-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debugsource-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-4.15.13+git.664.e8416d8d213-3.99.1 * samba-python3-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-4.15.13+git.664.e8416d8d213-3.99.1 * samba-ldb-ldap-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-4.15.13+git.664.e8416d8d213-3.99.1 * samba-ldb-ldap-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-tool-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy-devel-4.15.13+git.664.e8416d8d213-3.99.1 * samba-devel-4.15.13+git.664.e8416d8d213-3.99.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * samba-doc-4.15.13+git.664.e8416d8d213-3.99.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * samba-winbind-libs-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-devel-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * samba-libs-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-python3-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-devel-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-libs-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy-python3-devel-4.15.13+git.664.e8416d8d213-3.99.1 * samba-debugsource-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-4.15.13+git.664.e8416d8d213-3.99.1 * samba-python3-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-4.15.13+git.664.e8416d8d213-3.99.1 * samba-ldb-ldap-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-4.15.13+git.664.e8416d8d213-3.99.1 * samba-ldb-ldap-4.15.13+git.664.e8416d8d213-3.99.1 * samba-winbind-libs-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-4.15.13+git.664.e8416d8d213-3.99.1 * samba-libs-python3-debuginfo-4.15.13+git.664.e8416d8d213-3.99.1 * samba-client-debuginfo-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * samba-tool-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy0-python3-32bit-4.15.13+git.664.e8416d8d213-3.99.1 * libsamba-policy-devel-4.15.13+git.664.e8416d8d213-3.99.1 * samba-devel-4.15.13+git.664.e8416d8d213-3.99.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * samba-doc-4.15.13+git.664.e8416d8d213-3.99.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10230.html * https://www.suse.com/security/cve/CVE-2025-9640.html * https://bugzilla.suse.com/show_bug.cgi?id=1251279 * https://bugzilla.suse.com/show_bug.cgi?id=1251280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:32:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:32:06 -0000 Subject: SUSE-SU-2025:03603-1: critical: Security update for samba Message-ID: <176054592675.27771.12078951568697719957@smelt2.prg2.suse.org> # Security update for samba Announcement ID: SUSE-SU-2025:03603-1 Release Date: 2025-10-15T13:37:45Z Rating: critical References: * bsc#1251279 * bsc#1251280 Cross-References: * CVE-2025-10230 * CVE-2025-9640 CVSS scores: * CVE-2025-10230 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-9640 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-9640 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279). * CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3603=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3603=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-3603=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3603=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3603=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3603=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3603=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * samba-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * ctdb-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-4.17.12+git.510.0efaadf376b-150500.3.34.1 * ctdb-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * ctdb-pcp-pmda-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-tool-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-gpupdate-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-test-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * ctdb-pcp-pmda-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-test-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-python3-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * openSUSE Leap 15.5 (x86_64) * samba-winbind-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-devel-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * openSUSE Leap 15.5 (noarch) * samba-doc-4.17.12+git.510.0efaadf376b-150500.3.34.1 * openSUSE Leap 15.5 (aarch64 x86_64) * samba-ceph-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-4.17.12+git.510.0efaadf376b-150500.3.34.1 * openSUSE Leap 15.5 (aarch64_ilp32) * samba-devel-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-64bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-64bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-64bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-64bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-64bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-64bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-64bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * ctdb-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * ctdb-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * samba-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-tool-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-gpupdate-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-python3-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * samba-winbind-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * samba-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-tool-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-gpupdate-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-python3-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * samba-winbind-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * samba-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-tool-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-gpupdate-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-python3-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64) * samba-ceph-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * samba-winbind-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * samba-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-tool-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-gpupdate-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ldb-ldap-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-dcerpc-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy0-python3-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * libsamba-policy-python3-devel-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-debugsource-4.17.12+git.510.0efaadf376b-150500.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * samba-winbind-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-ceph-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-client-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-winbind-libs-32bit-debuginfo-4.17.12+git.510.0efaadf376b-150500.3.34.1 * samba-libs-32bit-4.17.12+git.510.0efaadf376b-150500.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10230.html * https://www.suse.com/security/cve/CVE-2025-9640.html * https://bugzilla.suse.com/show_bug.cgi?id=1251279 * https://bugzilla.suse.com/show_bug.cgi?id=1251280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:34:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:34:24 -0000 Subject: SUSE-SU-2025:03602-1: important: Security update for the Linux Kernel Message-ID: <176054606474.27771.18217477314677915068@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03602-1 Release Date: 2025-10-15T12:57:25Z Rating: important References: * bsc#1012628 * bsc#1213545 * bsc#1215199 * bsc#1221858 * bsc#1222323 * bsc#1230557 * bsc#1230708 * bsc#1233120 * bsc#1234156 * bsc#1236897 * bsc#1240708 * bsc#1240890 * bsc#1241166 * bsc#1241292 * bsc#1241353 * bsc#1241866 * bsc#1242034 * bsc#1242754 * bsc#1242960 * bsc#1244734 * bsc#1244930 * bsc#1245663 * bsc#1245710 * bsc#1245767 * bsc#1245780 * bsc#1245815 * bsc#1245956 * bsc#1245973 * bsc#1245977 * bsc#1246005 * bsc#1246012 * bsc#1246181 * bsc#1246190 * bsc#1246193 * bsc#1246248 * bsc#1246509 * bsc#1247057 * bsc#1247078 * bsc#1247099 * bsc#1247112 * bsc#1247116 * bsc#1247119 * bsc#1247126 * bsc#1247136 * bsc#1247137 * bsc#1247155 * bsc#1247162 * bsc#1247167 * bsc#1247223 * bsc#1247229 * bsc#1247239 * bsc#1247262 * bsc#1247280 * bsc#1247313 * bsc#1247442 * bsc#1247976 * bsc#1248088 * bsc#1248108 * bsc#1248111 * bsc#1248121 * bsc#1248164 * bsc#1248166 * bsc#1248178 * bsc#1248179 * bsc#1248180 * bsc#1248183 * bsc#1248186 * bsc#1248192 * bsc#1248194 * bsc#1248196 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248223 * bsc#1248225 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248240 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248360 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248614 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248626 * bsc#1248628 * bsc#1248634 * bsc#1248636 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248733 * bsc#1248734 * bsc#1248735 * bsc#1248746 * bsc#1248748 * bsc#1248775 * bsc#1249022 * bsc#1249122 * bsc#1249123 * bsc#1249124 * bsc#1249125 * bsc#1249126 * bsc#1249143 * bsc#1249163 * bsc#1249172 * bsc#1249176 * bsc#1249186 * bsc#1249199 * bsc#1249202 * bsc#1249206 * bsc#1249258 * bsc#1249262 * bsc#1249284 * bsc#1249290 * bsc#1249295 * bsc#1249305 * bsc#1249315 * bsc#1249334 * bsc#1249346 * bsc#1249374 * bsc#1249481 * bsc#1249482 * bsc#1249488 * bsc#1249504 * bsc#1249516 * bsc#1249526 * bsc#1249604 * bsc#1250057 * bsc#1250336 * jsc#PED-13343 * jsc#PED-13345 Cross-References: * CVE-2023-3867 * CVE-2023-4130 * CVE-2023-4515 * CVE-2024-26661 * CVE-2024-46733 * CVE-2024-53125 * CVE-2024-58238 * CVE-2024-58239 * CVE-2025-22022 * CVE-2025-37885 * CVE-2025-38006 * CVE-2025-38075 * CVE-2025-38103 * CVE-2025-38125 * CVE-2025-38146 * CVE-2025-38160 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38190 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38245 * CVE-2025-38251 * CVE-2025-38255 * CVE-2025-38263 * CVE-2025-38360 * CVE-2025-38402 * CVE-2025-38408 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38439 * CVE-2025-38441 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38456 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38464 * CVE-2025-38466 * CVE-2025-38472 * CVE-2025-38488 * CVE-2025-38491 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38510 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38514 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38544 * CVE-2025-38546 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38553 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38585 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38590 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38630 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38645 * CVE-2025-38646 * CVE-2025-38650 * CVE-2025-38656 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38663 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38701 * CVE-2025-38705 * CVE-2025-38709 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-39678 * CVE-2025-39682 * CVE-2025-39691 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39718 * CVE-2025-39746 * CVE-2025-39773 * CVE-2025-39782 CVSS scores: * CVE-2023-4130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-4130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4515 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-4515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46733 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58238 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22022 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22022 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Confidential Computing Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 149 vulnerabilities, contains two features and has 36 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Confidential Computing kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516). * CVE-2025-39718: vsock/virtio: Validate length in packet header before skb_put() (bsc#1249305). * CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39678: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non- NULL (bsc#1249290). * CVE-2025-38732: netfilter: nf_reject: do not leak dst refcount for loopback packets (bsc#1249262). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38722: habanalabs: fix UAF in export_dmabuf() (bsc#1249163). * CVE-2025-38721: netfilter: ctnetlink: fix refcount leak on table dump (bsc#1249176). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38679: media: venus: Fix OOB read due to missing payload bound check (bsc#1249202). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38668: regulator: core: fix NULL dereference on unbind due to stale coupling data (bsc#1248647). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38645: net/mlx5: Check device memory pointer before usage (bsc#1248626). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38605: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (bsc#1248334). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38595: xen: fix UAF in dmabuf_exp_from_pages() (bsc#1248380). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38591: bpf: Reject narrower access to pointer ctx fields (bsc#1248363). * CVE-2025-38590: net/mlx5e: Remove skb secpath if xfrm state is not found (bsc#1248360). * CVE-2025-38585: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (bsc#1248355). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38531: iio: common: st_sensors: Fix use of uninitialize device structs (bsc#1248205). * CVE-2025-38528: bpf: Reject %p% format string in bprintf-like helpers (bsc#1248198). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38520: drm/amdkfd: Do not call mmput from MMU notifier callback (bsc#1248217). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38506: KVM: Allow CPU to reschedule while setting per-page memory attributes (bsc#1248186). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38466: perf: Revert to requiring CAP_SYS_ADMIN for uprobes (bsc#1247442). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't postable (bsc#1242960). * CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-46733: btrfs: fix qgroup reserve leaks in cow_file_range (bsc#1230708). The following non-security bugs were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup (stable- fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: compute LE flow credits based on recvbuf space (git-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: qca: fix invalid device address check (git-fixes). * Bluetooth: qca: fix wcn3991 device address check (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: mcp2221: Do not set bus speed on every transfer (stable-fixes). * HID: mcp2221: Handle reads greater than 60 bytes (stable-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250336). * Limit patch filenames to 100 characters (bsc#1249604). * Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI: Add ACS quirk for Loongson PCIe (git-fixes). * PCI: Drop PCI patches that broke kdump capture boot (bsc#1246509) * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: apple: Fix missing OF node reference in apple_pcie_setup_port (git- fixes). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RAS/AMD/FMPM: Use atl internal.h for INVALID_SPA (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1 (git- fixes) * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64: Add support for HIP09 Spectre-BHB mitigation (git-fixes) * arm64: Drop arm64 patches that may lead to module load failure (bsc#1250057) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma with Haikou (git-fixes). * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: libata-scsi: Fix CDL control (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * bpf, bpftool: Fix incorrect disasm pc (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Fix iter/task tid filtering (git-fixes). * bpf: Fix link info netfilter flags to populate defrag flag (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Properly test iter/task tid filtering (git-fixes). * bpf: bpftool: Setting error code in do_loader() (git-fixes). * bpf: fix kfunc btf caching for modules (git-fixes). * bpf: use kvzmalloc to allocate BPF verifier environment (git-fixes). * bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure (git-fixes). * bpftool: Fix readlink usage in get_fd_type (git-fixes). * bpftool: Mount bpffs when pinmaps path not under the bpffs (git-fixes). * bpftool: fix potential NULL pointer dereferencing in prog_dump() (git- fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add cancellation points to trim loops (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: always update fstrim_range on failure in FITRIM ioctl (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: fix adding block group to a reclaim list and the unused list during reclaim (git-fixes). * btrfs: fix bitmap leak when loading free space cache on duplicate entry (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix the length of reserved qgroup to free (bsc#1240708) * btrfs: make found_logical_ret parameter mandatory for function queue_scrub_stripe() (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: retry block group reclaim without infinite loop (git-fixes). * btrfs: return accurate error code on open failure in open_fs_devices() (bsc#1233120) * btrfs: run delayed iputs when flushing delalloc (git-fixes). * btrfs: scrub: avoid unnecessary csum tree search preparing stripes (git- fixes). * btrfs: scrub: avoid unnecessary extent tree search preparing stripes (git- fixes). * btrfs: scrub: fix grouping of read IO (git-fixes). * btrfs: scrub: remove scrub_ctx::csum_list member (git-fixes). * btrfs: split remaining space to discard in chunks (git-fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: update target inode's ctime on unlink (git-fixes). * btrfs: use SECTOR_SHIFT to convert physical offset to LBA (git-fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * ceph: fix possible integer overflow in ceph_zero_objects() (git-fixes). * ceph: validate snapdirname option length when mounting (git-fixes). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Use the fixed and coherent frequency for scaling capacity (stable- fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * drivers/base/node: optimize memory block registration to reduce boot time (bsc#1241866). * drivers/base/node: remove register_mem_block_under_node_early() (bsc#1241866). * drivers/base/node: remove register_memory_blocks_under_node() function call from register_one_node (bsc#1241866). * drivers/base/node: rename __register_one_node() to register_one_node() (bsc#1241866). * drivers/base/node: rename register_memory_blocks_under_node() and remove context argument (bsc#1241866). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * et131x: Add missing check after DMA map (stable-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/mnt_idmapping.c: Return -EINVAL when no map is written (bsc#1233120) * fs/orangefs: use snprintf() instead of sprintf() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * hfs: fix not erasing deleted b-tree node issue (git-fixes). * hfs: fix slab-out-of-bounds in hfs_bnode_read() (git-fixes). * hfsplus: do not use BUG_ON() in hfsplus_create_attributes_file() (git- fixes). * hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() (git-fixes). * hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hypfs_create_cpu_files(): add missing check for hypfs_mkdir() failure (git- fixes bsc#1249122). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * jfs: Regular file corruption check (git-fixes). * jfs: truncate good inode pages when hard link is 0 (git-fixes). * jfs: upper bound check of tree index in dbAllocAG (git-fixes). * kABI fix for "netfilter: nf_tables: Audit log rule reset" (git-fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: adjust new field on ip_ct_sctp struct (git-fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: make nft_trans_gc_catchall() public again (git-fixes). * kABI: netfilter flowtable move gc operation to bottom (git-fixes). * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kselftest/arm64: Fix check for setting new VLs in sve-ptrace (git-fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * md/md-cluster: handle REMOVE message earlier (bsc#1247057). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mm/hwpoison: do not send SIGBUS to processes with recovered clean pages (git-fixes). * mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn (git-fixes). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mmc: core: Use GFP_NOIO in ACMD22 (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fallback when MPTCP opts are dropped after 1st data (git-fixes). * mptcp: reset when MPTCP opts are dropped after join (git-fixes). * mtd: nand: raw: atmel: Fix comment in timings preparation (stable-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * netfilter: conntrack: fix extension size table (git-fixes). * netfilter: flowtable: GC pushes back packets to classic path (git-fixes). * netfilter: handle the connecting collision properly in nf_conntrack_proto_sctp (git-fixes). * netfilter: nat: fix ipv6 nat redirect with mapped and scoped addresses (git- fixes). * netfilter: nf_conntrack_bridge: initialize err to 0 (git-fixes). * netfilter: nf_tables: A better name for nft_obj_filter (git-fixes). * netfilter: nf_tables: Audit log rule reset (git-fixes). * netfilter: nf_tables: Carry reset boolean in nft_obj_dump_ctx (git-fixes). * netfilter: nf_tables: Carry s_idx in nft_obj_dump_ctx (git-fixes). * netfilter: nf_tables: Deduplicate nft_register_obj audit logs (git-fixes). * netfilter: nf_tables: Drop pointless memset in nf_tables_dump_obj (git- fixes). * netfilter: nf_tables: Drop pointless memset when dumping rules (git-fixes). * netfilter: nf_tables: Fix entries val in rule reset audit log (git-fixes). * netfilter: nf_tables: Introduce nf_tables_getrule_single() (git-fixes). * netfilter: nf_tables: Open-code audit log call in nf_tables_getrule() (git- fixes). * netfilter: nf_tables: Unbreak audit log reset (git-fixes). * netfilter: nf_tables: Unconditionally allocate nft_obj_filter (git-fixes). * netfilter: nf_tables: audit log object reset once per table (git-fixes). * netfilter: nf_tables: bogus ENOENT when destroying element which does not exist (git-fixes). * netfilter: nf_tables: disallow element removal on anonymous sets (git- fixes). * netfilter: nf_tables: do not remove elements if set backend implements .abort (git-fixes). * netfilter: nf_tables: nft_obj_filter fits into cb->ctx (git-fixes). * netfilter: nf_tables: remove catchall element in GC sync path (git-fixes). * netfilter: nf_tables: revert do not remove elements if set backend implements .abort (git-fixes). * netfilter: nf_tables: split async and sync catchall in two functions (git- fixes). * netfilter: nfnetlink_log: silence bogus compiler warning (git-fixes). * netfilter: nft_payload: fix wrong mac header matching (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync() in catchall GC (git-fixes). * netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation fails (git-fixes). * netfilter: nft_set_rbtree: prefer sync gc to async worker (git-fixes). * netfilter: nft_set_rbtree: rename gc deactivate+erase function (git-fixes). * netfilter: xt_recent: fix (increase) ipv6 literal buffer length (git-fixes). * nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* (git- fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-pci: try function level reset on init failure (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * pcmcia: Add error handling for add_interval() in do_validate_mem() (git- fixes). * pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() (git- fixes). * pcmcia: omap: Add missing check for platform_get_resource (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86: dell-wmi-sysman: Fix class device unregistration (git-fixes). * platform/x86: think-lmi: Fix class device unregistration (git-fixes). * platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches (git- fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/eeh: Rely on dev->link_active_reporting (bsc#1215199). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * rpm: Configure KABI checkingness macro (bsc#1249186). * rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186). * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249481). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (git-fixes bsc#1248733 LTC#214881). * s390/hypfs: Enable limited access during lockdown (git-fixes bsc#1248733 LTC#214881). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1248735). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249482). * s390/pci: Allow automatic recovery with minimal driver support (git-fixes bsc#1248734 LTC#214880). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249123). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249124). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249125). * s390/vfio-ap: Fix no AP queue sharing allowed message written to kernel log (git-fixes bsc#1249488). * samples/bpf: Fix compilation errors with cf-protection option (git-fixes). * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * selftests/bpf: Add asserts for netfilter link info (git-fixes). * selftests/bpf: Add cmp_map_pointer_with_const test (git-fixes). * selftests/bpf: Add test cases with CONST_PTR_TO_MAP null checks (git-fixes). * selftests/bpf: adapt one more case in test_lru_map to the new target_free (git-fixes). * selftests/bpf: fexit_sleep: Fix stack allocation for arm64 (git-fixes). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: Fix errno checking in syscall_user_dispatch test (git-fixes). * selftests: rtnetlink.sh: remove esp4_offload after test (git-fixes). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * struct cdc_ncm_ctx: hide new member filtering_supported (git-fixes). * struct l2cap_chan: shift new member rx_avail to end (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: mark hyperv_drm as external * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: core: Fix system suspend on TI AM62 platforms (git-fixes). * usb: dwc3: fix fault at system suspend if device was already runtime suspended (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * vfs: Add a sysctl for automated deletion of dentry (bsc#1240890). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: remove cfg80211_inform_single_bss_frame_data() (git-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtw89: Disable deep power saving for USB/SDIO (stable-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn() (git- fixes). * x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR fails (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/amd_nb: Restrict init function to AMD-based systems (git-fixes). * x86/cpu: Add model number for Intel Clearwater Forest processor (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Confidential Computing Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Confidential-Computing-15-SP6-2025-3602=1 ## Package List: * Confidential Computing Module 15-SP6 (nosrc x86_64) * kernel-coco-6.4.0-15061.32.coco15sp6.1 * kernel-coco_debug-6.4.0-15061.32.coco15sp6.1 * Confidential Computing Module 15-SP6 (x86_64) * kernel-coco_debug-devel-debuginfo-6.4.0-15061.32.coco15sp6.1 * kernel-coco_debug-devel-6.4.0-15061.32.coco15sp6.1 * kernel-syms-coco-6.4.0-15061.32.coco15sp6.1 * kernel-coco-debugsource-6.4.0-15061.32.coco15sp6.1 * reiserfs-kmp-coco-6.4.0-15061.32.coco15sp6.1 * kernel-coco_debug-debugsource-6.4.0-15061.32.coco15sp6.1 * kernel-coco-vdso-debuginfo-6.4.0-15061.32.coco15sp6.1 * kernel-coco-debuginfo-6.4.0-15061.32.coco15sp6.1 * kernel-coco_debug-debuginfo-6.4.0-15061.32.coco15sp6.1 * kernel-coco-devel-6.4.0-15061.32.coco15sp6.1 * reiserfs-kmp-coco-debuginfo-6.4.0-15061.32.coco15sp6.1 * Confidential Computing Module 15-SP6 (noarch) * kernel-devel-coco-6.4.0-15061.32.coco15sp6.1 * kernel-source-coco-6.4.0-15061.32.coco15sp6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3867.html * https://www.suse.com/security/cve/CVE-2023-4130.html * https://www.suse.com/security/cve/CVE-2023-4515.html * https://www.suse.com/security/cve/CVE-2024-26661.html * https://www.suse.com/security/cve/CVE-2024-46733.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-58238.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-22022.html * https://www.suse.com/security/cve/CVE-2025-37885.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38650.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38663.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1213545 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222323 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230708 * https://bugzilla.suse.com/show_bug.cgi?id=1233120 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240890 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241292 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241866 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242754 * https://bugzilla.suse.com/show_bug.cgi?id=1242960 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1247057 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248164 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248180 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248240 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248614 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248636 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248733 * https://bugzilla.suse.com/show_bug.cgi?id=1248734 * https://bugzilla.suse.com/show_bug.cgi?id=1248735 * https://bugzilla.suse.com/show_bug.cgi?id=1248746 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249122 * https://bugzilla.suse.com/show_bug.cgi?id=1249123 * https://bugzilla.suse.com/show_bug.cgi?id=1249124 * https://bugzilla.suse.com/show_bug.cgi?id=1249125 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249481 * https://bugzilla.suse.com/show_bug.cgi?id=1249482 * https://bugzilla.suse.com/show_bug.cgi?id=1249488 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1250057 * https://bugzilla.suse.com/show_bug.cgi?id=1250336 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:39:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:39:12 -0000 Subject: SUSE-SU-2025:03600-1: important: Security update for the Linux Kernel Message-ID: <176054635272.27771.12589670423450032313@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03600-1 Release Date: 2025-10-15T12:55:31Z Rating: important References: * bsc#1012628 * bsc#1194869 * bsc#1213061 * bsc#1213666 * bsc#1214073 * bsc#1214928 * bsc#1214953 * bsc#1215150 * bsc#1215696 * bsc#1216436 * bsc#1216976 * bsc#1218644 * bsc#1220186 * bsc#1220419 * bsc#1229165 * bsc#1230062 * bsc#1236897 * bsc#1237449 * bsc#1237776 * bsc#1240324 * bsc#1241166 * bsc#1241292 * bsc#1241866 * bsc#1243100 * bsc#1243112 * bsc#1245193 * bsc#1245260 * bsc#1245700 * bsc#1246057 * bsc#1246125 * bsc#1246190 * bsc#1246248 * bsc#1246298 * bsc#1246509 * bsc#1246782 * bsc#1247099 * bsc#1247118 * bsc#1247126 * bsc#1247136 * bsc#1247137 * bsc#1247223 * bsc#1247239 * bsc#1247262 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247963 * bsc#1248111 * bsc#1248121 * bsc#1248192 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248225 * bsc#1248296 * bsc#1248334 * bsc#1248343 * bsc#1248357 * bsc#1248360 * bsc#1248365 * bsc#1248378 * bsc#1248380 * bsc#1248392 * bsc#1248512 * bsc#1248610 * bsc#1248619 * bsc#1248622 * bsc#1248626 * bsc#1248628 * bsc#1248634 * bsc#1248639 * bsc#1248647 * bsc#1248674 * bsc#1248681 * bsc#1248733 * bsc#1248734 * bsc#1248735 * bsc#1248775 * bsc#1248847 * bsc#1249122 * bsc#1249123 * bsc#1249124 * bsc#1249125 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249186 * bsc#1249190 * bsc#1249194 * bsc#1249195 * bsc#1249196 * bsc#1249199 * bsc#1249200 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249255 * bsc#1249257 * bsc#1249258 * bsc#1249260 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249299 * bsc#1249300 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249308 * bsc#1249312 * bsc#1249315 * bsc#1249318 * bsc#1249321 * bsc#1249323 * bsc#1249324 * bsc#1249334 * bsc#1249338 * bsc#1249374 * bsc#1249413 * bsc#1249479 * bsc#1249482 * bsc#1249486 * bsc#1249488 * bsc#1249489 * bsc#1249490 * bsc#1249494 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249548 * bsc#1249554 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249640 * bsc#1249641 * bsc#1249642 * bsc#1249658 * bsc#1249662 * bsc#1249672 * bsc#1249673 * bsc#1249677 * bsc#1249678 * bsc#1249679 * bsc#1249682 * bsc#1249687 * bsc#1249698 * bsc#1249707 * bsc#1249712 * bsc#1249730 * bsc#1249756 * bsc#1249758 * bsc#1249761 * bsc#1249762 * bsc#1249768 * bsc#1249770 * bsc#1249774 * bsc#1249779 * bsc#1249780 * bsc#1249785 * bsc#1249787 * bsc#1249795 * bsc#1249815 * bsc#1249820 * bsc#1249823 * bsc#1249824 * bsc#1249825 * bsc#1249826 * bsc#1249833 * bsc#1249842 * bsc#1249845 * bsc#1249849 * bsc#1249850 * bsc#1249853 * bsc#1249856 * bsc#1249861 * bsc#1249863 * bsc#1249864 * bsc#1249865 * bsc#1249866 * bsc#1249869 * bsc#1249870 * bsc#1249880 * bsc#1249883 * bsc#1249888 * bsc#1249894 * bsc#1249896 * bsc#1249897 * bsc#1249901 * bsc#1249911 * bsc#1249917 * bsc#1249919 * bsc#1249923 * bsc#1249926 * bsc#1249938 * bsc#1249949 * bsc#1249950 * bsc#1249952 * bsc#1249975 * bsc#1249979 * bsc#1249984 * bsc#1249988 * bsc#1249990 * bsc#1249993 * bsc#1249994 * bsc#1249997 * bsc#1250002 * bsc#1250004 * bsc#1250007 * bsc#1250012 * bsc#1250022 * bsc#1250024 * bsc#1250025 * bsc#1250028 * bsc#1250029 * bsc#1250035 * bsc#1250049 * bsc#1250055 * bsc#1250057 * bsc#1250058 * bsc#1250062 * bsc#1250063 * bsc#1250065 * bsc#1250066 * bsc#1250067 * bsc#1250069 * bsc#1250070 * bsc#1250073 * bsc#1250074 * bsc#1250088 * bsc#1250089 * bsc#1250106 * bsc#1250112 * bsc#1250117 * bsc#1250120 * bsc#1250125 * bsc#1250127 * bsc#1250128 * bsc#1250145 * bsc#1250150 * bsc#1250156 * bsc#1250157 * bsc#1250161 * bsc#1250163 * bsc#1250166 * bsc#1250167 * bsc#1250171 * bsc#1250177 * bsc#1250179 * bsc#1250180 * bsc#1250186 * bsc#1250196 * bsc#1250198 * bsc#1250199 * bsc#1250201 * bsc#1250203 * bsc#1250204 * bsc#1250206 * bsc#1250208 * bsc#1250241 * bsc#1250242 * bsc#1250243 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250262 * bsc#1250263 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250290 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250297 * bsc#1250298 * bsc#1250313 * bsc#1250319 * bsc#1250323 * bsc#1250325 * bsc#1250329 * bsc#1250336 * bsc#1250337 * bsc#1250344 * bsc#1250358 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250384 * bsc#1250389 * bsc#1250395 * bsc#1250397 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250426 * bsc#1250450 * bsc#1250459 * bsc#1250519 * bsc#1250522 * bsc#1250530 * bsc#1250655 * bsc#1250712 * bsc#1250713 * bsc#1250732 * bsc#1250736 * bsc#1250741 * bsc#1250759 * bsc#1250763 * bsc#1250765 * bsc#1250807 * bsc#1250808 * bsc#1250809 * bsc#1250812 * bsc#1250813 * bsc#1250815 * bsc#1250816 * bsc#1250820 * bsc#1250823 * bsc#1250825 * bsc#1250827 * bsc#1250830 * bsc#1250831 * bsc#1250837 * bsc#1250841 * bsc#1250861 * bsc#1250863 * bsc#1250867 * bsc#1250872 * bsc#1250873 * bsc#1250878 * bsc#1250905 * bsc#1250907 * bsc#1250917 * bsc#1250918 * bsc#1250923 * bsc#1250926 * bsc#1250928 * bsc#1250929 * bsc#1250930 * bsc#1250931 * bsc#1250941 * bsc#1250942 * bsc#1250949 * bsc#1250952 * bsc#1250957 * bsc#1250964 Cross-References: * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-42753 * CVE-2023-53147 * CVE-2023-53148 * CVE-2023-53150 * CVE-2023-53151 * CVE-2023-53152 * CVE-2023-53165 * CVE-2023-53167 * CVE-2023-53170 * CVE-2023-53174 * CVE-2023-53175 * CVE-2023-53177 * CVE-2023-53179 * CVE-2023-53180 * CVE-2023-53181 * CVE-2023-53183 * CVE-2023-53184 * CVE-2023-53185 * CVE-2023-53187 * CVE-2023-53189 * CVE-2023-53192 * CVE-2023-53195 * CVE-2023-53196 * CVE-2023-53201 * CVE-2023-53204 * CVE-2023-53205 * CVE-2023-53206 * CVE-2023-53207 * CVE-2023-53208 * CVE-2023-53209 * CVE-2023-53210 * CVE-2023-53215 * CVE-2023-53217 * CVE-2023-53220 * CVE-2023-53221 * CVE-2023-53222 * CVE-2023-53226 * CVE-2023-53230 * CVE-2023-53231 * CVE-2023-53235 * CVE-2023-53238 * CVE-2023-53243 * CVE-2023-53245 * CVE-2023-53247 * CVE-2023-53248 * CVE-2023-53249 * CVE-2023-53251 * CVE-2023-53252 * CVE-2023-53255 * CVE-2023-53257 * CVE-2023-53258 * CVE-2023-53260 * CVE-2023-53261 * CVE-2023-53263 * CVE-2023-53264 * CVE-2023-53272 * CVE-2023-53274 * CVE-2023-53275 * CVE-2023-53280 * CVE-2023-53286 * CVE-2023-53287 * CVE-2023-53288 * CVE-2023-53291 * CVE-2023-53292 * CVE-2023-53303 * CVE-2023-53304 * CVE-2023-53305 * CVE-2023-53309 * CVE-2023-53311 * CVE-2023-53312 * CVE-2023-53313 * CVE-2023-53314 * CVE-2023-53316 * CVE-2023-53319 * CVE-2023-53321 * CVE-2023-53322 * CVE-2023-53323 * CVE-2023-53324 * CVE-2023-53325 * CVE-2023-53328 * CVE-2023-53331 * CVE-2023-53333 * CVE-2023-53336 * CVE-2023-53338 * CVE-2023-53339 * CVE-2023-53342 * CVE-2023-53343 * CVE-2023-53350 * CVE-2023-53352 * CVE-2023-53354 * CVE-2023-53356 * CVE-2023-53357 * CVE-2023-53360 * CVE-2023-53362 * CVE-2023-53364 * CVE-2023-53365 * CVE-2023-53367 * CVE-2023-53368 * CVE-2023-53369 * CVE-2023-53370 * CVE-2023-53371 * CVE-2023-53374 * CVE-2023-53377 * CVE-2023-53379 * CVE-2023-53380 * CVE-2023-53384 * CVE-2023-53385 * CVE-2023-53386 * CVE-2023-53391 * CVE-2023-53394 * CVE-2023-53395 * CVE-2023-53397 * CVE-2023-53401 * CVE-2023-53420 * CVE-2023-53421 * CVE-2023-53424 * CVE-2023-53425 * CVE-2023-53426 * CVE-2023-53428 * CVE-2023-53429 * CVE-2023-53432 * CVE-2023-53436 * CVE-2023-53438 * CVE-2023-53441 * CVE-2023-53442 * CVE-2023-53444 * CVE-2023-53446 * CVE-2023-53447 * CVE-2023-53448 * CVE-2023-53451 * CVE-2023-53454 * CVE-2023-53456 * CVE-2023-53457 * CVE-2023-53461 * CVE-2023-53462 * CVE-2023-53463 * CVE-2023-53465 * CVE-2023-53472 * CVE-2023-53479 * CVE-2023-53480 * CVE-2023-53485 * CVE-2023-53487 * CVE-2023-53488 * CVE-2023-53490 * CVE-2023-53491 * CVE-2023-53492 * CVE-2023-53493 * CVE-2023-53495 * CVE-2023-53496 * CVE-2023-53500 * CVE-2023-53501 * CVE-2023-53504 * CVE-2023-53505 * CVE-2023-53507 * CVE-2023-53508 * CVE-2023-53510 * CVE-2023-53515 * CVE-2023-53516 * CVE-2023-53518 * CVE-2023-53519 * CVE-2023-53520 * CVE-2023-53523 * CVE-2023-53526 * CVE-2023-53527 * CVE-2023-53528 * CVE-2023-53530 * CVE-2023-53531 * CVE-2024-26584 * CVE-2024-58090 * CVE-2024-58240 * CVE-2025-22022 * CVE-2025-38119 * CVE-2025-38234 * CVE-2025-38255 * CVE-2025-38263 * CVE-2025-38351 * CVE-2025-38402 * CVE-2025-38408 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38456 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38488 * CVE-2025-38514 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38533 * CVE-2025-38544 * CVE-2025-38556 * CVE-2025-38574 * CVE-2025-38584 * CVE-2025-38590 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38605 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38645 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38664 * CVE-2025-38668 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38697 * CVE-2025-38698 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38712 * CVE-2025-38713 * CVE-2025-38714 * CVE-2025-38715 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39743 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39790 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39835 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39846 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39882 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39891 * CVE-2025-39907 * CVE-2025-39920 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-40300 CVSS scores: * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53148 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53150 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53183 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53195 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53196 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53209 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53209 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53215 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53215 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53222 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53243 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53243 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53247 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53249 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53255 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53255 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53257 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53257 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53260 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53261 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53261 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53263 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53263 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53264 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53264 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53272 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53272 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53274 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53280 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53280 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53292 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53292 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53311 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53311 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53314 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53316 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53316 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53323 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53324 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53324 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53336 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53338 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53338 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53339 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53357 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53385 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53425 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53432 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53442 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53442 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53454 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53454 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53461 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53462 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53462 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53480 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53485 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53485 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53491 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53491 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53496 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53507 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53507 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53508 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53508 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53510 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53510 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53515 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53515 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53518 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53518 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53519 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53519 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53520 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53520 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53523 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53523 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53526 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53527 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53527 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53528 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53531 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53531 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22022 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22022 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38697 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38698 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38698 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38714 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38714 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39743 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39743 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves 346 vulnerabilities and has 47 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3600=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-3600=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-3600=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-3600=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3600=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3600=1 openSUSE-SLE-15.6-2025-3600=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3600=1 ## Package List: * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.73.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-6.4.0-150600.23.73.1 * kernel-syms-6.4.0-150600.23.73.1 * kernel-obs-build-6.4.0-150600.23.73.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.73.1 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.73.1 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150600.23.73.1 * kernel-default-debugsource-6.4.0-150600.23.73.1 * reiserfs-kmp-default-6.4.0-150600.23.73.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.73.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.4.0-150600.23.73.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.73.1 * cluster-md-kmp-default-6.4.0-150600.23.73.1 * ocfs2-kmp-default-6.4.0-150600.23.73.1 * kernel-default-debuginfo-6.4.0-150600.23.73.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.73.1 * dlm-kmp-default-6.4.0-150600.23.73.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.73.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.73.1 * gfs2-kmp-default-6.4.0-150600.23.73.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.73.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.73.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-extra-debuginfo-6.4.0-150600.23.73.1 * kernel-default-debuginfo-6.4.0-150600.23.73.1 * kernel-default-debugsource-6.4.0-150600.23.73.1 * kernel-default-extra-6.4.0-150600.23.73.1 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.73.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-1-150600.13.3.1 * kernel-default-debuginfo-6.4.0-150600.23.73.1 * kernel-livepatch-SLE15-SP6_Update_16-debugsource-1-150600.13.3.1 * kernel-default-livepatch-6.4.0-150600.23.73.1 * kernel-default-livepatch-devel-6.4.0-150600.23.73.1 * kernel-livepatch-6_4_0-150600_23_73-default-1-150600.13.3.1 * kernel-default-debugsource-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (noarch) * kernel-source-6.4.0-150600.23.73.1 * kernel-docs-html-6.4.0-150600.23.73.1 * kernel-macros-6.4.0-150600.23.73.1 * kernel-source-vanilla-6.4.0-150600.23.73.1 * kernel-devel-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-debuginfo-6.4.0-150600.23.73.1 * kernel-debug-devel-6.4.0-150600.23.73.1 * kernel-debug-devel-debuginfo-6.4.0-150600.23.73.1 * kernel-debug-debugsource-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (x86_64) * kernel-kvmsmall-vdso-6.4.0-150600.23.73.1 * kernel-debug-vdso-6.4.0-150600.23.73.1 * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.73.1 * kernel-default-vdso-debuginfo-6.4.0-150600.23.73.1 * kernel-default-vdso-6.4.0-150600.23.73.1 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-default-base-rebuild-6.4.0-150600.23.73.1.150600.12.32.1 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.73.1 * kernel-default-base-6.4.0-150600.23.73.1.150600.12.32.1 * kernel-kvmsmall-debugsource-6.4.0-150600.23.73.1 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.73.1 * kernel-kvmsmall-devel-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kernel-default-optional-6.4.0-150600.23.73.1 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.73.1 * reiserfs-kmp-default-6.4.0-150600.23.73.1 * kernel-default-devel-6.4.0-150600.23.73.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.73.1 * kernel-default-livepatch-6.4.0-150600.23.73.1 * kernel-default-optional-debuginfo-6.4.0-150600.23.73.1 * kernel-syms-6.4.0-150600.23.73.1 * kernel-default-extra-6.4.0-150600.23.73.1 * kselftests-kmp-default-6.4.0-150600.23.73.1 * gfs2-kmp-default-6.4.0-150600.23.73.1 * kernel-obs-build-6.4.0-150600.23.73.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.73.1 * kernel-obs-qa-6.4.0-150600.23.73.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.73.1 * kernel-default-debuginfo-6.4.0-150600.23.73.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.73.1 * kernel-obs-build-debugsource-6.4.0-150600.23.73.1 * kernel-default-debugsource-6.4.0-150600.23.73.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.73.1 * cluster-md-kmp-default-6.4.0-150600.23.73.1 * ocfs2-kmp-default-6.4.0-150600.23.73.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.73.1 * dlm-kmp-default-6.4.0-150600.23.73.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_16-debugsource-1-150600.13.3.1 * kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-1-150600.13.3.1 * kernel-default-livepatch-devel-6.4.0-150600.23.73.1 * kernel-livepatch-6_4_0-150600_23_73-default-1-150600.13.3.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.73.1 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (aarch64) * dtb-amlogic-6.4.0-150600.23.73.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.73.1 * dtb-arm-6.4.0-150600.23.73.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.73.1 * kernel-64kb-debuginfo-6.4.0-150600.23.73.1 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.73.1 * dtb-freescale-6.4.0-150600.23.73.1 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.73.1 * dtb-mediatek-6.4.0-150600.23.73.1 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.73.1 * kernel-64kb-debugsource-6.4.0-150600.23.73.1 * dtb-allwinner-6.4.0-150600.23.73.1 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.73.1 * dtb-socionext-6.4.0-150600.23.73.1 * reiserfs-kmp-64kb-6.4.0-150600.23.73.1 * dtb-amd-6.4.0-150600.23.73.1 * dtb-altera-6.4.0-150600.23.73.1 * kernel-64kb-optional-6.4.0-150600.23.73.1 * dtb-nvidia-6.4.0-150600.23.73.1 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.73.1 * dtb-apple-6.4.0-150600.23.73.1 * dtb-xilinx-6.4.0-150600.23.73.1 * dtb-cavium-6.4.0-150600.23.73.1 * dtb-sprd-6.4.0-150600.23.73.1 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.73.1 * cluster-md-kmp-64kb-6.4.0-150600.23.73.1 * kernel-64kb-devel-6.4.0-150600.23.73.1 * dtb-lg-6.4.0-150600.23.73.1 * gfs2-kmp-64kb-6.4.0-150600.23.73.1 * dtb-renesas-6.4.0-150600.23.73.1 * dlm-kmp-64kb-6.4.0-150600.23.73.1 * dtb-amazon-6.4.0-150600.23.73.1 * dtb-hisilicon-6.4.0-150600.23.73.1 * dtb-qcom-6.4.0-150600.23.73.1 * dtb-rockchip-6.4.0-150600.23.73.1 * dtb-broadcom-6.4.0-150600.23.73.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.73.1 * dtb-exynos-6.4.0-150600.23.73.1 * ocfs2-kmp-64kb-6.4.0-150600.23.73.1 * dtb-apm-6.4.0-150600.23.73.1 * dtb-marvell-6.4.0-150600.23.73.1 * kernel-64kb-extra-6.4.0-150600.23.73.1 * kselftests-kmp-64kb-6.4.0-150600.23.73.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-devel-debuginfo-6.4.0-150600.23.73.1 * kernel-64kb-debuginfo-6.4.0-150600.23.73.1 * kernel-64kb-debugsource-6.4.0-150600.23.73.1 * kernel-64kb-devel-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.73.1.150600.12.32.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150600.23.73.1 * kernel-default-devel-6.4.0-150600.23.73.1 * kernel-default-debuginfo-6.4.0-150600.23.73.1 * kernel-default-debugsource-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (noarch) * kernel-macros-6.4.0-150600.23.73.1 * kernel-devel-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.73.1 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.73.1 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.73.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53148.html * https://www.suse.com/security/cve/CVE-2023-53150.html * https://www.suse.com/security/cve/CVE-2023-53151.html * https://www.suse.com/security/cve/CVE-2023-53152.html * https://www.suse.com/security/cve/CVE-2023-53165.html * https://www.suse.com/security/cve/CVE-2023-53167.html * https://www.suse.com/security/cve/CVE-2023-53170.html * https://www.suse.com/security/cve/CVE-2023-53174.html * https://www.suse.com/security/cve/CVE-2023-53175.html * https://www.suse.com/security/cve/CVE-2023-53177.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53180.html * https://www.suse.com/security/cve/CVE-2023-53181.html * https://www.suse.com/security/cve/CVE-2023-53183.html * https://www.suse.com/security/cve/CVE-2023-53184.html * https://www.suse.com/security/cve/CVE-2023-53185.html * https://www.suse.com/security/cve/CVE-2023-53187.html * https://www.suse.com/security/cve/CVE-2023-53189.html * https://www.suse.com/security/cve/CVE-2023-53192.html * https://www.suse.com/security/cve/CVE-2023-53195.html * https://www.suse.com/security/cve/CVE-2023-53196.html * https://www.suse.com/security/cve/CVE-2023-53201.html * https://www.suse.com/security/cve/CVE-2023-53204.html * https://www.suse.com/security/cve/CVE-2023-53205.html * https://www.suse.com/security/cve/CVE-2023-53206.html * https://www.suse.com/security/cve/CVE-2023-53207.html * https://www.suse.com/security/cve/CVE-2023-53208.html * https://www.suse.com/security/cve/CVE-2023-53209.html * https://www.suse.com/security/cve/CVE-2023-53210.html * https://www.suse.com/security/cve/CVE-2023-53215.html * https://www.suse.com/security/cve/CVE-2023-53217.html * https://www.suse.com/security/cve/CVE-2023-53220.html * https://www.suse.com/security/cve/CVE-2023-53221.html * https://www.suse.com/security/cve/CVE-2023-53222.html * https://www.suse.com/security/cve/CVE-2023-53226.html * https://www.suse.com/security/cve/CVE-2023-53230.html * https://www.suse.com/security/cve/CVE-2023-53231.html * https://www.suse.com/security/cve/CVE-2023-53235.html * https://www.suse.com/security/cve/CVE-2023-53238.html * https://www.suse.com/security/cve/CVE-2023-53243.html * https://www.suse.com/security/cve/CVE-2023-53245.html * https://www.suse.com/security/cve/CVE-2023-53247.html * https://www.suse.com/security/cve/CVE-2023-53248.html * https://www.suse.com/security/cve/CVE-2023-53249.html * https://www.suse.com/security/cve/CVE-2023-53251.html * https://www.suse.com/security/cve/CVE-2023-53252.html * https://www.suse.com/security/cve/CVE-2023-53255.html * https://www.suse.com/security/cve/CVE-2023-53257.html * https://www.suse.com/security/cve/CVE-2023-53258.html * https://www.suse.com/security/cve/CVE-2023-53260.html * https://www.suse.com/security/cve/CVE-2023-53261.html * https://www.suse.com/security/cve/CVE-2023-53263.html * https://www.suse.com/security/cve/CVE-2023-53264.html * https://www.suse.com/security/cve/CVE-2023-53272.html * https://www.suse.com/security/cve/CVE-2023-53274.html * https://www.suse.com/security/cve/CVE-2023-53275.html * https://www.suse.com/security/cve/CVE-2023-53280.html * https://www.suse.com/security/cve/CVE-2023-53286.html * https://www.suse.com/security/cve/CVE-2023-53287.html * https://www.suse.com/security/cve/CVE-2023-53288.html * https://www.suse.com/security/cve/CVE-2023-53291.html * https://www.suse.com/security/cve/CVE-2023-53292.html * https://www.suse.com/security/cve/CVE-2023-53303.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53305.html * https://www.suse.com/security/cve/CVE-2023-53309.html * https://www.suse.com/security/cve/CVE-2023-53311.html * https://www.suse.com/security/cve/CVE-2023-53312.html * https://www.suse.com/security/cve/CVE-2023-53313.html * https://www.suse.com/security/cve/CVE-2023-53314.html * https://www.suse.com/security/cve/CVE-2023-53316.html * https://www.suse.com/security/cve/CVE-2023-53319.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53323.html * https://www.suse.com/security/cve/CVE-2023-53324.html * https://www.suse.com/security/cve/CVE-2023-53325.html * https://www.suse.com/security/cve/CVE-2023-53328.html * https://www.suse.com/security/cve/CVE-2023-53331.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53336.html * https://www.suse.com/security/cve/CVE-2023-53338.html * https://www.suse.com/security/cve/CVE-2023-53339.html * https://www.suse.com/security/cve/CVE-2023-53342.html * https://www.suse.com/security/cve/CVE-2023-53343.html * https://www.suse.com/security/cve/CVE-2023-53350.html * https://www.suse.com/security/cve/CVE-2023-53352.html * https://www.suse.com/security/cve/CVE-2023-53354.html * https://www.suse.com/security/cve/CVE-2023-53356.html * https://www.suse.com/security/cve/CVE-2023-53357.html * https://www.suse.com/security/cve/CVE-2023-53360.html * https://www.suse.com/security/cve/CVE-2023-53362.html * https://www.suse.com/security/cve/CVE-2023-53364.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53367.html * https://www.suse.com/security/cve/CVE-2023-53368.html * https://www.suse.com/security/cve/CVE-2023-53369.html * https://www.suse.com/security/cve/CVE-2023-53370.html * https://www.suse.com/security/cve/CVE-2023-53371.html * https://www.suse.com/security/cve/CVE-2023-53374.html * https://www.suse.com/security/cve/CVE-2023-53377.html * https://www.suse.com/security/cve/CVE-2023-53379.html * https://www.suse.com/security/cve/CVE-2023-53380.html * https://www.suse.com/security/cve/CVE-2023-53384.html * https://www.suse.com/security/cve/CVE-2023-53385.html * https://www.suse.com/security/cve/CVE-2023-53386.html * https://www.suse.com/security/cve/CVE-2023-53391.html * https://www.suse.com/security/cve/CVE-2023-53394.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53397.html * https://www.suse.com/security/cve/CVE-2023-53401.html * https://www.suse.com/security/cve/CVE-2023-53420.html * https://www.suse.com/security/cve/CVE-2023-53421.html * https://www.suse.com/security/cve/CVE-2023-53424.html * https://www.suse.com/security/cve/CVE-2023-53425.html * https://www.suse.com/security/cve/CVE-2023-53426.html * https://www.suse.com/security/cve/CVE-2023-53428.html * https://www.suse.com/security/cve/CVE-2023-53429.html * https://www.suse.com/security/cve/CVE-2023-53432.html * https://www.suse.com/security/cve/CVE-2023-53436.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53441.html * https://www.suse.com/security/cve/CVE-2023-53442.html * https://www.suse.com/security/cve/CVE-2023-53444.html * https://www.suse.com/security/cve/CVE-2023-53446.html * https://www.suse.com/security/cve/CVE-2023-53447.html * https://www.suse.com/security/cve/CVE-2023-53448.html * https://www.suse.com/security/cve/CVE-2023-53451.html * https://www.suse.com/security/cve/CVE-2023-53454.html * https://www.suse.com/security/cve/CVE-2023-53456.html * https://www.suse.com/security/cve/CVE-2023-53457.html * https://www.suse.com/security/cve/CVE-2023-53461.html * https://www.suse.com/security/cve/CVE-2023-53462.html * https://www.suse.com/security/cve/CVE-2023-53463.html * https://www.suse.com/security/cve/CVE-2023-53465.html * https://www.suse.com/security/cve/CVE-2023-53472.html * https://www.suse.com/security/cve/CVE-2023-53479.html * https://www.suse.com/security/cve/CVE-2023-53480.html * https://www.suse.com/security/cve/CVE-2023-53485.html * https://www.suse.com/security/cve/CVE-2023-53487.html * https://www.suse.com/security/cve/CVE-2023-53488.html * https://www.suse.com/security/cve/CVE-2023-53490.html * https://www.suse.com/security/cve/CVE-2023-53491.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2023-53493.html * https://www.suse.com/security/cve/CVE-2023-53495.html * https://www.suse.com/security/cve/CVE-2023-53496.html * https://www.suse.com/security/cve/CVE-2023-53500.html * https://www.suse.com/security/cve/CVE-2023-53501.html * https://www.suse.com/security/cve/CVE-2023-53504.html * https://www.suse.com/security/cve/CVE-2023-53505.html * https://www.suse.com/security/cve/CVE-2023-53507.html * https://www.suse.com/security/cve/CVE-2023-53508.html * https://www.suse.com/security/cve/CVE-2023-53510.html * https://www.suse.com/security/cve/CVE-2023-53515.html * https://www.suse.com/security/cve/CVE-2023-53516.html * https://www.suse.com/security/cve/CVE-2023-53518.html * https://www.suse.com/security/cve/CVE-2023-53519.html * https://www.suse.com/security/cve/CVE-2023-53520.html * https://www.suse.com/security/cve/CVE-2023-53523.html * https://www.suse.com/security/cve/CVE-2023-53526.html * https://www.suse.com/security/cve/CVE-2023-53527.html * https://www.suse.com/security/cve/CVE-2023-53528.html * https://www.suse.com/security/cve/CVE-2023-53530.html * https://www.suse.com/security/cve/CVE-2023-53531.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-22022.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38697.html * https://www.suse.com/security/cve/CVE-2025-38698.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38712.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-38714.html * https://www.suse.com/security/cve/CVE-2025-38715.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39743.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39846.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39920.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1214073 * https://bugzilla.suse.com/show_bug.cgi?id=1214928 * https://bugzilla.suse.com/show_bug.cgi?id=1214953 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1216436 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237449 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241292 * https://bugzilla.suse.com/show_bug.cgi?id=1241866 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246298 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248733 * https://bugzilla.suse.com/show_bug.cgi?id=1248734 * https://bugzilla.suse.com/show_bug.cgi?id=1248735 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249122 * https://bugzilla.suse.com/show_bug.cgi?id=1249123 * https://bugzilla.suse.com/show_bug.cgi?id=1249124 * https://bugzilla.suse.com/show_bug.cgi?id=1249125 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249194 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249196 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249255 * https://bugzilla.suse.com/show_bug.cgi?id=1249257 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249260 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249482 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249488 * https://bugzilla.suse.com/show_bug.cgi?id=1249489 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249640 * https://bugzilla.suse.com/show_bug.cgi?id=1249641 * https://bugzilla.suse.com/show_bug.cgi?id=1249642 * https://bugzilla.suse.com/show_bug.cgi?id=1249658 * https://bugzilla.suse.com/show_bug.cgi?id=1249662 * https://bugzilla.suse.com/show_bug.cgi?id=1249672 * https://bugzilla.suse.com/show_bug.cgi?id=1249673 * https://bugzilla.suse.com/show_bug.cgi?id=1249677 * https://bugzilla.suse.com/show_bug.cgi?id=1249678 * https://bugzilla.suse.com/show_bug.cgi?id=1249679 * https://bugzilla.suse.com/show_bug.cgi?id=1249682 * https://bugzilla.suse.com/show_bug.cgi?id=1249687 * https://bugzilla.suse.com/show_bug.cgi?id=1249698 * https://bugzilla.suse.com/show_bug.cgi?id=1249707 * https://bugzilla.suse.com/show_bug.cgi?id=1249712 * https://bugzilla.suse.com/show_bug.cgi?id=1249730 * https://bugzilla.suse.com/show_bug.cgi?id=1249756 * https://bugzilla.suse.com/show_bug.cgi?id=1249758 * https://bugzilla.suse.com/show_bug.cgi?id=1249761 * https://bugzilla.suse.com/show_bug.cgi?id=1249762 * https://bugzilla.suse.com/show_bug.cgi?id=1249768 * https://bugzilla.suse.com/show_bug.cgi?id=1249770 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249779 * https://bugzilla.suse.com/show_bug.cgi?id=1249780 * https://bugzilla.suse.com/show_bug.cgi?id=1249785 * https://bugzilla.suse.com/show_bug.cgi?id=1249787 * https://bugzilla.suse.com/show_bug.cgi?id=1249795 * https://bugzilla.suse.com/show_bug.cgi?id=1249815 * https://bugzilla.suse.com/show_bug.cgi?id=1249820 * https://bugzilla.suse.com/show_bug.cgi?id=1249823 * https://bugzilla.suse.com/show_bug.cgi?id=1249824 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249826 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249842 * https://bugzilla.suse.com/show_bug.cgi?id=1249845 * https://bugzilla.suse.com/show_bug.cgi?id=1249849 * https://bugzilla.suse.com/show_bug.cgi?id=1249850 * https://bugzilla.suse.com/show_bug.cgi?id=1249853 * https://bugzilla.suse.com/show_bug.cgi?id=1249856 * https://bugzilla.suse.com/show_bug.cgi?id=1249861 * https://bugzilla.suse.com/show_bug.cgi?id=1249863 * https://bugzilla.suse.com/show_bug.cgi?id=1249864 * https://bugzilla.suse.com/show_bug.cgi?id=1249865 * https://bugzilla.suse.com/show_bug.cgi?id=1249866 * https://bugzilla.suse.com/show_bug.cgi?id=1249869 * https://bugzilla.suse.com/show_bug.cgi?id=1249870 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249883 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249894 * https://bugzilla.suse.com/show_bug.cgi?id=1249896 * https://bugzilla.suse.com/show_bug.cgi?id=1249897 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249911 * https://bugzilla.suse.com/show_bug.cgi?id=1249917 * https://bugzilla.suse.com/show_bug.cgi?id=1249919 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249926 * https://bugzilla.suse.com/show_bug.cgi?id=1249938 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1249950 * https://bugzilla.suse.com/show_bug.cgi?id=1249952 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1249979 * https://bugzilla.suse.com/show_bug.cgi?id=1249984 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1249990 * https://bugzilla.suse.com/show_bug.cgi?id=1249993 * https://bugzilla.suse.com/show_bug.cgi?id=1249994 * https://bugzilla.suse.com/show_bug.cgi?id=1249997 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250004 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250012 * https://bugzilla.suse.com/show_bug.cgi?id=1250022 * https://bugzilla.suse.com/show_bug.cgi?id=1250024 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250029 * https://bugzilla.suse.com/show_bug.cgi?id=1250035 * https://bugzilla.suse.com/show_bug.cgi?id=1250049 * https://bugzilla.suse.com/show_bug.cgi?id=1250055 * https://bugzilla.suse.com/show_bug.cgi?id=1250057 * https://bugzilla.suse.com/show_bug.cgi?id=1250058 * https://bugzilla.suse.com/show_bug.cgi?id=1250062 * https://bugzilla.suse.com/show_bug.cgi?id=1250063 * https://bugzilla.suse.com/show_bug.cgi?id=1250065 * https://bugzilla.suse.com/show_bug.cgi?id=1250066 * https://bugzilla.suse.com/show_bug.cgi?id=1250067 * https://bugzilla.suse.com/show_bug.cgi?id=1250069 * https://bugzilla.suse.com/show_bug.cgi?id=1250070 * https://bugzilla.suse.com/show_bug.cgi?id=1250073 * https://bugzilla.suse.com/show_bug.cgi?id=1250074 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250089 * https://bugzilla.suse.com/show_bug.cgi?id=1250106 * https://bugzilla.suse.com/show_bug.cgi?id=1250112 * https://bugzilla.suse.com/show_bug.cgi?id=1250117 * https://bugzilla.suse.com/show_bug.cgi?id=1250120 * https://bugzilla.suse.com/show_bug.cgi?id=1250125 * https://bugzilla.suse.com/show_bug.cgi?id=1250127 * https://bugzilla.suse.com/show_bug.cgi?id=1250128 * https://bugzilla.suse.com/show_bug.cgi?id=1250145 * https://bugzilla.suse.com/show_bug.cgi?id=1250150 * https://bugzilla.suse.com/show_bug.cgi?id=1250156 * https://bugzilla.suse.com/show_bug.cgi?id=1250157 * https://bugzilla.suse.com/show_bug.cgi?id=1250161 * https://bugzilla.suse.com/show_bug.cgi?id=1250163 * https://bugzilla.suse.com/show_bug.cgi?id=1250166 * https://bugzilla.suse.com/show_bug.cgi?id=1250167 * https://bugzilla.suse.com/show_bug.cgi?id=1250171 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250186 * https://bugzilla.suse.com/show_bug.cgi?id=1250196 * https://bugzilla.suse.com/show_bug.cgi?id=1250198 * https://bugzilla.suse.com/show_bug.cgi?id=1250199 * https://bugzilla.suse.com/show_bug.cgi?id=1250201 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250206 * https://bugzilla.suse.com/show_bug.cgi?id=1250208 * https://bugzilla.suse.com/show_bug.cgi?id=1250241 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250243 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250263 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250290 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250319 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250325 * https://bugzilla.suse.com/show_bug.cgi?id=1250329 * https://bugzilla.suse.com/show_bug.cgi?id=1250336 * https://bugzilla.suse.com/show_bug.cgi?id=1250337 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250384 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250395 * https://bugzilla.suse.com/show_bug.cgi?id=1250397 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250426 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250459 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250530 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250732 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250759 * https://bugzilla.suse.com/show_bug.cgi?id=1250763 * https://bugzilla.suse.com/show_bug.cgi?id=1250765 * https://bugzilla.suse.com/show_bug.cgi?id=1250807 * https://bugzilla.suse.com/show_bug.cgi?id=1250808 * https://bugzilla.suse.com/show_bug.cgi?id=1250809 * https://bugzilla.suse.com/show_bug.cgi?id=1250812 * https://bugzilla.suse.com/show_bug.cgi?id=1250813 * https://bugzilla.suse.com/show_bug.cgi?id=1250815 * https://bugzilla.suse.com/show_bug.cgi?id=1250816 * https://bugzilla.suse.com/show_bug.cgi?id=1250820 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250825 * https://bugzilla.suse.com/show_bug.cgi?id=1250827 * https://bugzilla.suse.com/show_bug.cgi?id=1250830 * https://bugzilla.suse.com/show_bug.cgi?id=1250831 * https://bugzilla.suse.com/show_bug.cgi?id=1250837 * https://bugzilla.suse.com/show_bug.cgi?id=1250841 * https://bugzilla.suse.com/show_bug.cgi?id=1250861 * https://bugzilla.suse.com/show_bug.cgi?id=1250863 * https://bugzilla.suse.com/show_bug.cgi?id=1250867 * https://bugzilla.suse.com/show_bug.cgi?id=1250872 * https://bugzilla.suse.com/show_bug.cgi?id=1250873 * https://bugzilla.suse.com/show_bug.cgi?id=1250878 * https://bugzilla.suse.com/show_bug.cgi?id=1250905 * https://bugzilla.suse.com/show_bug.cgi?id=1250907 * https://bugzilla.suse.com/show_bug.cgi?id=1250917 * https://bugzilla.suse.com/show_bug.cgi?id=1250918 * https://bugzilla.suse.com/show_bug.cgi?id=1250923 * https://bugzilla.suse.com/show_bug.cgi?id=1250926 * https://bugzilla.suse.com/show_bug.cgi?id=1250928 * https://bugzilla.suse.com/show_bug.cgi?id=1250929 * https://bugzilla.suse.com/show_bug.cgi?id=1250930 * https://bugzilla.suse.com/show_bug.cgi?id=1250931 * https://bugzilla.suse.com/show_bug.cgi?id=1250941 * https://bugzilla.suse.com/show_bug.cgi?id=1250942 * https://bugzilla.suse.com/show_bug.cgi?id=1250949 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1250957 * https://bugzilla.suse.com/show_bug.cgi?id=1250964 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Oct 15 16:39:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 15 Oct 2025 16:39:19 -0000 Subject: SUSE-SU-2025:03599-1: moderate: Security update for qt6-base Message-ID: <176054635902.27771.11922977410799879900@smelt2.prg2.suse.org> # Security update for qt6-base Announcement ID: SUSE-SU-2025:03599-1 Release Date: 2025-10-15T12:17:26Z Rating: moderate References: * bsc#1239896 * bsc#1243958 Cross-References: * CVE-2025-30348 * CVE-2025-5455 CVSS scores: * CVE-2025-30348 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-30348 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-30348 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-30348 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5455 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-5455 ( NVD ): 8.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:X/RE:M/U:Clear Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for qt6-base fixes the following issues: * CVE-2025-5455: processing of malformed data in `qDecodeDataUrl()` can trigger assertion and cause a crash (bsc#1243958). * CVE-2025-30348: complex algorithm used in `encodeText` in QDom when processing XML data can cause low performance (bsc#1239896). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3599=1 SUSE-2025-3599=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3599=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3599=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3599=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3599=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libQt6Gui6-6.6.3-150600.3.6.1 * qt6-core-devel-6.6.3-150600.3.6.1 * libQt6DBus6-6.6.3-150600.3.6.1 * libQt6Sql6-6.6.3-150600.3.6.1 * libQt6OpenGLWidgets6-6.6.3-150600.3.6.1 * libQt6Xml6-6.6.3-150600.3.6.1 * qt6-platformsupport-private-devel-6.6.3-150600.3.6.1 * qt6-printsupport-cups-debuginfo-6.6.3-150600.3.6.1 * qt6-printsupport-private-devel-6.6.3-150600.3.6.1 * qt6-sql-devel-6.6.3-150600.3.6.1 * qt6-sql-mysql-6.6.3-150600.3.6.1 * libQt6OpenGL6-debuginfo-6.6.3-150600.3.6.1 * qt6-test-private-devel-6.6.3-150600.3.6.1 * qt6-exampleicons-devel-static-6.6.3-150600.3.6.1 * qt6-printsupport-cups-6.6.3-150600.3.6.1 * qt6-network-private-devel-6.6.3-150600.3.6.1 * qt6-sql-postgresql-6.6.3-150600.3.6.1 * libQt6Network6-6.6.3-150600.3.6.1 * qt6-sql-unixODBC-debuginfo-6.6.3-150600.3.6.1 * libQt6Widgets6-debuginfo-6.6.3-150600.3.6.1 * qt6-base-common-devel-debuginfo-6.6.3-150600.3.6.1 * qt6-xml-devel-6.6.3-150600.3.6.1 * qt6-platformtheme-gtk3-debuginfo-6.6.3-150600.3.6.1 * qt6-base-examples-debuginfo-6.6.3-150600.3.6.1 * libQt6Gui6-debuginfo-6.6.3-150600.3.6.1 * libQt6Concurrent6-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-nm-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGL6-6.6.3-150600.3.6.1 * qt6-gui-devel-6.6.3-150600.3.6.1 * qt6-printsupport-devel-6.6.3-150600.3.6.1 * qt6-sql-private-devel-6.6.3-150600.3.6.1 * qt6-widgets-private-devel-6.6.3-150600.3.6.1 * libQt6Test6-debuginfo-6.6.3-150600.3.6.1 * qt6-sql-mysql-debuginfo-6.6.3-150600.3.6.1 * qt6-base-examples-6.6.3-150600.3.6.1 * libQt6Sql6-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGLWidgets6-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-debuginfo-6.6.3-150600.3.6.1 * qt6-platformsupport-devel-static-6.6.3-150600.3.6.1 * qt6-platformtheme-gtk3-6.6.3-150600.3.6.1 * qt6-network-tls-6.6.3-150600.3.6.1 * qt6-sql-unixODBC-6.6.3-150600.3.6.1 * qt6-xml-private-devel-6.6.3-150600.3.6.1 * qt6-gui-private-devel-6.6.3-150600.3.6.1 * libQt6DBus6-debuginfo-6.6.3-150600.3.6.1 * qt6-openglwidgets-devel-6.6.3-150600.3.6.1 * qt6-sql-sqlite-debuginfo-6.6.3-150600.3.6.1 * qt6-base-debugsource-6.6.3-150600.3.6.1 * libQt6Test6-6.6.3-150600.3.6.1 * qt6-test-devel-6.6.3-150600.3.6.1 * qt6-base-common-devel-6.6.3-150600.3.6.1 * qt6-widgets-devel-6.6.3-150600.3.6.1 * qt6-dbus-private-devel-6.6.3-150600.3.6.1 * qt6-opengl-devel-6.6.3-150600.3.6.1 * qt6-core-private-devel-6.6.3-150600.3.6.1 * qt6-base-docs-qch-6.6.3-150600.3.6.1 * qt6-kmssupport-devel-static-6.6.3-150600.3.6.1 * libQt6Widgets6-6.6.3-150600.3.6.1 * qt6-opengl-private-devel-6.6.3-150600.3.6.1 * qt6-sql-postgresql-debuginfo-6.6.3-150600.3.6.1 * qt6-kmssupport-private-devel-6.6.3-150600.3.6.1 * qt6-networkinformation-nm-6.6.3-150600.3.6.1 * qt6-sql-sqlite-6.6.3-150600.3.6.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.6.3-150600.3.6.1 * libQt6Xml6-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-glib-6.6.3-150600.3.6.1 * qt6-platformtheme-xdgdesktopportal-6.6.3-150600.3.6.1 * libQt6Network6-debuginfo-6.6.3-150600.3.6.1 * libQt6Concurrent6-6.6.3-150600.3.6.1 * libQt6PrintSupport6-debuginfo-6.6.3-150600.3.6.1 * libQt6PrintSupport6-6.6.3-150600.3.6.1 * qt6-dbus-devel-6.6.3-150600.3.6.1 * qt6-base-docs-html-6.6.3-150600.3.6.1 * libQt6Core6-6.6.3-150600.3.6.1 * qt6-concurrent-devel-6.6.3-150600.3.6.1 * qt6-network-devel-6.6.3-150600.3.6.1 * qt6-base-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-glib-debuginfo-6.6.3-150600.3.6.1 * libQt6Core6-debuginfo-6.6.3-150600.3.6.1 * openSUSE Leap 15.6 (noarch) * qt6-docs-common-6.6.3-150600.3.6.1 * qt6-base-devel-6.6.3-150600.3.6.1 * qt6-base-private-devel-6.6.3-150600.3.6.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.6.3-150600.3.6.1 * libQt6DBus6-6.6.3-150600.3.6.1 * libQt6Sql6-6.6.3-150600.3.6.1 * libQt6OpenGL6-debuginfo-6.6.3-150600.3.6.1 * libQt6Network6-6.6.3-150600.3.6.1 * libQt6Widgets6-debuginfo-6.6.3-150600.3.6.1 * libQt6Gui6-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-nm-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGL6-6.6.3-150600.3.6.1 * libQt6Test6-debuginfo-6.6.3-150600.3.6.1 * libQt6Sql6-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-6.6.3-150600.3.6.1 * libQt6DBus6-debuginfo-6.6.3-150600.3.6.1 * qt6-base-debugsource-6.6.3-150600.3.6.1 * libQt6Test6-6.6.3-150600.3.6.1 * libQt6Widgets6-6.6.3-150600.3.6.1 * qt6-networkinformation-nm-6.6.3-150600.3.6.1 * qt6-networkinformation-glib-6.6.3-150600.3.6.1 * libQt6Network6-debuginfo-6.6.3-150600.3.6.1 * libQt6Core6-6.6.3-150600.3.6.1 * qt6-base-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-glib-debuginfo-6.6.3-150600.3.6.1 * libQt6Core6-debuginfo-6.6.3-150600.3.6.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.6.3-150600.3.6.1 * libQt6DBus6-6.6.3-150600.3.6.1 * libQt6Sql6-6.6.3-150600.3.6.1 * libQt6OpenGL6-debuginfo-6.6.3-150600.3.6.1 * libQt6Network6-6.6.3-150600.3.6.1 * libQt6Widgets6-debuginfo-6.6.3-150600.3.6.1 * libQt6Gui6-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-nm-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGL6-6.6.3-150600.3.6.1 * libQt6Test6-debuginfo-6.6.3-150600.3.6.1 * libQt6Sql6-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-6.6.3-150600.3.6.1 * libQt6DBus6-debuginfo-6.6.3-150600.3.6.1 * qt6-base-debugsource-6.6.3-150600.3.6.1 * libQt6Test6-6.6.3-150600.3.6.1 * libQt6Widgets6-6.6.3-150600.3.6.1 * qt6-networkinformation-nm-6.6.3-150600.3.6.1 * qt6-networkinformation-glib-6.6.3-150600.3.6.1 * libQt6Network6-debuginfo-6.6.3-150600.3.6.1 * libQt6Core6-6.6.3-150600.3.6.1 * qt6-base-debuginfo-6.6.3-150600.3.6.1 * qt6-networkinformation-glib-debuginfo-6.6.3-150600.3.6.1 * libQt6Core6-debuginfo-6.6.3-150600.3.6.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libQt6Gui6-6.6.3-150600.3.6.1 * qt6-core-devel-6.6.3-150600.3.6.1 * libQt6DBus6-6.6.3-150600.3.6.1 * libQt6Sql6-6.6.3-150600.3.6.1 * libQt6OpenGLWidgets6-6.6.3-150600.3.6.1 * libQt6Xml6-6.6.3-150600.3.6.1 * qt6-platformsupport-private-devel-6.6.3-150600.3.6.1 * qt6-printsupport-cups-debuginfo-6.6.3-150600.3.6.1 * qt6-printsupport-private-devel-6.6.3-150600.3.6.1 * qt6-sql-devel-6.6.3-150600.3.6.1 * qt6-sql-mysql-6.6.3-150600.3.6.1 * libQt6OpenGL6-debuginfo-6.6.3-150600.3.6.1 * qt6-test-private-devel-6.6.3-150600.3.6.1 * qt6-exampleicons-devel-static-6.6.3-150600.3.6.1 * qt6-printsupport-cups-6.6.3-150600.3.6.1 * qt6-network-private-devel-6.6.3-150600.3.6.1 * qt6-sql-postgresql-6.6.3-150600.3.6.1 * libQt6Network6-6.6.3-150600.3.6.1 * qt6-sql-unixODBC-debuginfo-6.6.3-150600.3.6.1 * libQt6Widgets6-debuginfo-6.6.3-150600.3.6.1 * qt6-base-common-devel-debuginfo-6.6.3-150600.3.6.1 * qt6-xml-devel-6.6.3-150600.3.6.1 * qt6-platformtheme-gtk3-debuginfo-6.6.3-150600.3.6.1 * qt6-base-examples-debuginfo-6.6.3-150600.3.6.1 * libQt6Gui6-debuginfo-6.6.3-150600.3.6.1 * libQt6Concurrent6-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGL6-6.6.3-150600.3.6.1 * qt6-gui-devel-6.6.3-150600.3.6.1 * qt6-printsupport-devel-6.6.3-150600.3.6.1 * qt6-sql-private-devel-6.6.3-150600.3.6.1 * qt6-widgets-private-devel-6.6.3-150600.3.6.1 * libQt6Test6-debuginfo-6.6.3-150600.3.6.1 * qt6-sql-mysql-debuginfo-6.6.3-150600.3.6.1 * qt6-base-examples-6.6.3-150600.3.6.1 * libQt6Sql6-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGLWidgets6-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-debuginfo-6.6.3-150600.3.6.1 * qt6-platformsupport-devel-static-6.6.3-150600.3.6.1 * qt6-platformtheme-gtk3-6.6.3-150600.3.6.1 * qt6-network-tls-6.6.3-150600.3.6.1 * qt6-sql-unixODBC-6.6.3-150600.3.6.1 * qt6-xml-private-devel-6.6.3-150600.3.6.1 * qt6-gui-private-devel-6.6.3-150600.3.6.1 * libQt6DBus6-debuginfo-6.6.3-150600.3.6.1 * qt6-openglwidgets-devel-6.6.3-150600.3.6.1 * qt6-sql-sqlite-debuginfo-6.6.3-150600.3.6.1 * qt6-base-debugsource-6.6.3-150600.3.6.1 * libQt6Test6-6.6.3-150600.3.6.1 * qt6-test-devel-6.6.3-150600.3.6.1 * qt6-base-common-devel-6.6.3-150600.3.6.1 * qt6-widgets-devel-6.6.3-150600.3.6.1 * qt6-dbus-private-devel-6.6.3-150600.3.6.1 * qt6-opengl-devel-6.6.3-150600.3.6.1 * qt6-core-private-devel-6.6.3-150600.3.6.1 * qt6-base-docs-qch-6.6.3-150600.3.6.1 * qt6-kmssupport-devel-static-6.6.3-150600.3.6.1 * libQt6Widgets6-6.6.3-150600.3.6.1 * qt6-opengl-private-devel-6.6.3-150600.3.6.1 * qt6-sql-postgresql-debuginfo-6.6.3-150600.3.6.1 * qt6-kmssupport-private-devel-6.6.3-150600.3.6.1 * qt6-sql-sqlite-6.6.3-150600.3.6.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.6.3-150600.3.6.1 * libQt6Xml6-debuginfo-6.6.3-150600.3.6.1 * qt6-platformtheme-xdgdesktopportal-6.6.3-150600.3.6.1 * libQt6Network6-debuginfo-6.6.3-150600.3.6.1 * libQt6Concurrent6-6.6.3-150600.3.6.1 * libQt6PrintSupport6-debuginfo-6.6.3-150600.3.6.1 * libQt6PrintSupport6-6.6.3-150600.3.6.1 * qt6-base-docs-html-6.6.3-150600.3.6.1 * qt6-dbus-devel-6.6.3-150600.3.6.1 * libQt6Core6-6.6.3-150600.3.6.1 * qt6-concurrent-devel-6.6.3-150600.3.6.1 * qt6-network-devel-6.6.3-150600.3.6.1 * qt6-base-debuginfo-6.6.3-150600.3.6.1 * libQt6Core6-debuginfo-6.6.3-150600.3.6.1 * SUSE Package Hub 15 15-SP6 (noarch) * qt6-docs-common-6.6.3-150600.3.6.1 * qt6-base-devel-6.6.3-150600.3.6.1 * qt6-base-private-devel-6.6.3-150600.3.6.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * qt6-core-devel-6.6.3-150600.3.6.1 * qt6-base-debuginfo-6.6.3-150600.3.6.1 * libQt6Xml6-6.6.3-150600.3.6.1 * libQt6OpenGLWidgets6-6.6.3-150600.3.6.1 * qt6-platformsupport-private-devel-6.6.3-150600.3.6.1 * qt6-printsupport-cups-debuginfo-6.6.3-150600.3.6.1 * qt6-printsupport-private-devel-6.6.3-150600.3.6.1 * qt6-sql-devel-6.6.3-150600.3.6.1 * qt6-xml-devel-6.6.3-150600.3.6.1 * qt6-sql-mysql-6.6.3-150600.3.6.1 * qt6-test-private-devel-6.6.3-150600.3.6.1 * qt6-exampleicons-devel-static-6.6.3-150600.3.6.1 * qt6-printsupport-cups-6.6.3-150600.3.6.1 * qt6-network-private-devel-6.6.3-150600.3.6.1 * qt6-sql-postgresql-6.6.3-150600.3.6.1 * qt6-sql-unixODBC-debuginfo-6.6.3-150600.3.6.1 * qt6-base-common-devel-debuginfo-6.6.3-150600.3.6.1 * qt6-platformtheme-gtk3-debuginfo-6.6.3-150600.3.6.1 * qt6-base-examples-debuginfo-6.6.3-150600.3.6.1 * libQt6Concurrent6-debuginfo-6.6.3-150600.3.6.1 * qt6-gui-devel-6.6.3-150600.3.6.1 * qt6-sql-private-devel-6.6.3-150600.3.6.1 * qt6-printsupport-devel-6.6.3-150600.3.6.1 * qt6-widgets-private-devel-6.6.3-150600.3.6.1 * qt6-sql-mysql-debuginfo-6.6.3-150600.3.6.1 * libQt6OpenGLWidgets6-debuginfo-6.6.3-150600.3.6.1 * qt6-network-tls-debuginfo-6.6.3-150600.3.6.1 * qt6-platformsupport-devel-static-6.6.3-150600.3.6.1 * qt6-platformtheme-gtk3-6.6.3-150600.3.6.1 * qt6-network-tls-6.6.3-150600.3.6.1 * qt6-sql-unixODBC-6.6.3-150600.3.6.1 * qt6-xml-private-devel-6.6.3-150600.3.6.1 * qt6-gui-private-devel-6.6.3-150600.3.6.1 * qt6-openglwidgets-devel-6.6.3-150600.3.6.1 * qt6-sql-sqlite-debuginfo-6.6.3-150600.3.6.1 * qt6-base-debugsource-6.6.3-150600.3.6.1 * qt6-test-devel-6.6.3-150600.3.6.1 * qt6-widgets-devel-6.6.3-150600.3.6.1 * qt6-dbus-private-devel-6.6.3-150600.3.6.1 * qt6-opengl-devel-6.6.3-150600.3.6.1 * qt6-core-private-devel-6.6.3-150600.3.6.1 * qt6-base-docs-qch-6.6.3-150600.3.6.1 * qt6-kmssupport-devel-static-6.6.3-150600.3.6.1 * qt6-opengl-private-devel-6.6.3-150600.3.6.1 * qt6-sql-postgresql-debuginfo-6.6.3-150600.3.6.1 * qt6-kmssupport-private-devel-6.6.3-150600.3.6.1 * qt6-sql-sqlite-6.6.3-150600.3.6.1 * qt6-platformtheme-xdgdesktopportal-debuginfo-6.6.3-150600.3.6.1 * libQt6Xml6-debuginfo-6.6.3-150600.3.6.1 * qt6-platformtheme-xdgdesktopportal-6.6.3-150600.3.6.1 * libQt6Concurrent6-6.6.3-150600.3.6.1 * libQt6PrintSupport6-debuginfo-6.6.3-150600.3.6.1 * libQt6PrintSupport6-6.6.3-150600.3.6.1 * qt6-base-docs-html-6.6.3-150600.3.6.1 * qt6-base-common-devel-6.6.3-150600.3.6.1 * qt6-concurrent-devel-6.6.3-150600.3.6.1 * qt6-network-devel-6.6.3-150600.3.6.1 * qt6-base-examples-6.6.3-150600.3.6.1 * qt6-dbus-devel-6.6.3-150600.3.6.1 * SUSE Package Hub 15 15-SP7 (noarch) * qt6-docs-common-6.6.3-150600.3.6.1 * qt6-base-devel-6.6.3-150600.3.6.1 * qt6-base-private-devel-6.6.3-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30348.html * https://www.suse.com/security/cve/CVE-2025-5455.html * https://bugzilla.suse.com/show_bug.cgi?id=1239896 * https://bugzilla.suse.com/show_bug.cgi?id=1243958 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 16 08:32:38 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 16 Oct 2025 08:32:38 -0000 Subject: SUSE-SU-2025:03614-1: important: Security update for the Linux Kernel Message-ID: <176060355851.27718.1308246430151152526@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03614-1 Release Date: 2025-10-16T05:48:20Z Rating: important References: * bsc#1065729 * bsc#1082555 * bsc#1164051 * bsc#1190317 * bsc#1203332 * bsc#1205128 * bsc#1206883 * bsc#1206884 * bsc#1207629 * bsc#1209287 * bsc#1209291 * bsc#1210124 * bsc#1210584 * bsc#1211960 * bsc#1213015 * bsc#1213016 * bsc#1213040 * bsc#1213041 * bsc#1213133 * bsc#1213666 * bsc#1213747 * bsc#1214953 * bsc#1214967 * bsc#1216976 * bsc#1235459 * bsc#1238467 * bsc#1241353 * bsc#1245196 * bsc#1246968 * bsc#1247118 * bsc#1247239 * bsc#1247483 * bsc#1248199 * bsc#1248255 * bsc#1248333 * bsc#1248341 * bsc#1248365 * bsc#1248399 * bsc#1248610 * bsc#1248617 * bsc#1248648 * bsc#1248669 * bsc#1248674 * bsc#1248847 * bsc#1249037 * bsc#1249164 * bsc#1249166 * bsc#1249186 * bsc#1249194 * bsc#1249200 * bsc#1249220 * bsc#1249254 * bsc#1249258 * bsc#1249266 * bsc#1249288 * bsc#1249295 * bsc#1249300 * bsc#1249334 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249504 * bsc#1249513 * bsc#1249515 * bsc#1249524 * bsc#1249526 * bsc#1249538 * bsc#1249545 * bsc#1249598 * bsc#1249604 * bsc#1249615 * bsc#1249641 * bsc#1249647 * bsc#1249658 * bsc#1249667 * bsc#1249683 * bsc#1249687 * bsc#1249696 * bsc#1249700 * bsc#1249706 * bsc#1249715 * bsc#1249716 * bsc#1249720 * bsc#1249725 * bsc#1249727 * bsc#1249734 * bsc#1249739 * bsc#1249740 * bsc#1249743 * bsc#1249744 * bsc#1249779 * bsc#1249798 * bsc#1249799 * bsc#1249802 * bsc#1249803 * bsc#1249808 * bsc#1249810 * bsc#1249827 * bsc#1249842 * bsc#1249846 * bsc#1249853 * bsc#1249865 * bsc#1249867 * bsc#1249871 * bsc#1249872 * bsc#1249877 * bsc#1249880 * bsc#1249882 * bsc#1249894 * bsc#1249908 * bsc#1249911 * bsc#1249912 * bsc#1249917 * bsc#1249918 * bsc#1249920 * bsc#1249922 * bsc#1249925 * bsc#1249927 * bsc#1249936 * bsc#1249938 * bsc#1249944 * bsc#1249947 * bsc#1249949 * bsc#1249950 * bsc#1249951 * bsc#1249958 * bsc#1249979 * bsc#1249981 * bsc#1249988 * bsc#1249991 * bsc#1249994 * bsc#1250007 * bsc#1250014 * bsc#1250018 * bsc#1250023 * bsc#1250024 * bsc#1250028 * bsc#1250043 * bsc#1250044 * bsc#1250045 * bsc#1250049 * bsc#1250052 * bsc#1250055 * bsc#1250058 * bsc#1250071 * bsc#1250072 * bsc#1250081 * bsc#1250084 * bsc#1250088 * bsc#1250104 * bsc#1250114 * bsc#1250121 * bsc#1250125 * bsc#1250127 * bsc#1250131 * bsc#1250132 * bsc#1250140 * bsc#1250145 * bsc#1250150 * bsc#1250155 * bsc#1250156 * bsc#1250165 * bsc#1250168 * bsc#1250177 * bsc#1250180 * bsc#1250183 * bsc#1250187 * bsc#1250198 * bsc#1250247 * bsc#1250250 * bsc#1250257 * bsc#1250269 * bsc#1250275 * bsc#1250281 * bsc#1250292 * bsc#1250294 * bsc#1250301 * bsc#1250313 * bsc#1250323 * bsc#1250324 * bsc#1250328 * bsc#1250358 * bsc#1250363 * bsc#1250365 * bsc#1250391 * bsc#1250392 * bsc#1250393 * bsc#1250394 * bsc#1250395 * bsc#1250397 * bsc#1250406 * bsc#1250407 * bsc#1250522 * bsc#1250765 * bsc#1250774 * bsc#1250792 * bsc#1250799 * bsc#1250818 * bsc#1250831 * bsc#1250851 * bsc#1250853 * bsc#1250856 * bsc#1250879 * bsc#1250915 * bsc#1250928 * bsc#1250949 * bsc#1250963 * bsc#1250965 Cross-References: * CVE-2022-36280 * CVE-2022-43945 * CVE-2022-49975 * CVE-2022-50233 * CVE-2022-50235 * CVE-2022-50242 * CVE-2022-50244 * CVE-2022-50252 * CVE-2022-50253 * CVE-2022-50257 * CVE-2022-50258 * CVE-2022-50265 * CVE-2022-50266 * CVE-2022-50271 * CVE-2022-50272 * CVE-2022-50278 * CVE-2022-50282 * CVE-2022-50285 * CVE-2022-50288 * CVE-2022-50289 * CVE-2022-50291 * CVE-2022-50294 * CVE-2022-50297 * CVE-2022-50299 * CVE-2022-50304 * CVE-2022-50311 * CVE-2022-50312 * CVE-2022-50321 * CVE-2022-50330 * CVE-2022-50344 * CVE-2022-50346 * CVE-2022-50349 * CVE-2022-50351 * CVE-2022-50352 * CVE-2022-50359 * CVE-2022-50365 * CVE-2022-50372 * CVE-2022-50375 * CVE-2022-50381 * CVE-2022-50385 * CVE-2022-50386 * CVE-2022-50389 * CVE-2022-50396 * CVE-2022-50401 * CVE-2022-50402 * CVE-2022-50405 * CVE-2022-50406 * CVE-2022-50408 * CVE-2022-50409 * CVE-2022-50410 * CVE-2022-50411 * CVE-2022-50414 * CVE-2022-50419 * CVE-2022-50422 * CVE-2022-50432 * CVE-2022-50434 * CVE-2022-50435 * CVE-2022-50440 * CVE-2022-50456 * CVE-2022-50460 * CVE-2023-1380 * CVE-2023-28328 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-53147 * CVE-2023-53148 * CVE-2023-53149 * CVE-2023-53150 * CVE-2023-53151 * CVE-2023-53153 * CVE-2023-53165 * CVE-2023-53174 * CVE-2023-53176 * CVE-2023-53178 * CVE-2023-53189 * CVE-2023-53199 * CVE-2023-53201 * CVE-2023-53213 * CVE-2023-53215 * CVE-2023-53226 * CVE-2023-53245 * CVE-2023-53246 * CVE-2023-53248 * CVE-2023-53250 * CVE-2023-53254 * CVE-2023-53265 * CVE-2023-53270 * CVE-2023-53272 * CVE-2023-53277 * CVE-2023-53280 * CVE-2023-53288 * CVE-2023-53295 * CVE-2023-53298 * CVE-2023-53299 * CVE-2023-53302 * CVE-2023-53305 * CVE-2023-53307 * CVE-2023-53308 * CVE-2023-53309 * CVE-2023-53313 * CVE-2023-53317 * CVE-2023-53321 * CVE-2023-53322 * CVE-2023-53326 * CVE-2023-53331 * CVE-2023-53332 * CVE-2023-53333 * CVE-2023-53335 * CVE-2023-53344 * CVE-2023-53348 * CVE-2023-53357 * CVE-2023-53365 * CVE-2023-53368 * CVE-2023-53380 * CVE-2023-53384 * CVE-2023-53393 * CVE-2023-53395 * CVE-2023-53397 * CVE-2023-53400 * CVE-2023-53427 * CVE-2023-53436 * CVE-2023-53438 * CVE-2023-53441 * CVE-2023-53446 * CVE-2023-53451 * CVE-2023-53456 * CVE-2023-53499 * CVE-2023-53506 * CVE-2023-53512 * CVE-2023-53521 * CVE-2023-53526 * CVE-2023-53530 * CVE-2024-53194 * CVE-2024-58240 * CVE-2025-38465 * CVE-2025-38488 * CVE-2025-38527 * CVE-2025-38553 * CVE-2025-38572 * CVE-2025-38574 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38632 * CVE-2025-38639 * CVE-2025-38665 * CVE-2025-38685 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38705 * CVE-2025-38712 * CVE-2025-38713 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38735 * CVE-2025-39677 * CVE-2025-39691 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39726 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39760 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39773 * CVE-2025-39782 * CVE-2025-39787 * CVE-2025-39800 * CVE-2025-39808 * CVE-2025-39824 * CVE-2025-39833 * CVE-2025-39838 * CVE-2025-39847 * CVE-2025-39853 * CVE-2025-39860 * CVE-2025-39863 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39885 * CVE-2025-40300 CVSS scores: * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50235 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50235 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50257 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50266 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50282 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50282 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50289 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50289 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50297 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50297 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50344 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50344 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50346 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50346 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-50349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50372 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50372 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50381 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50381 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50386 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50386 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50389 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50389 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50401 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50401 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50402 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50402 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50405 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50405 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50408 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50408 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50411 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50411 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50414 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50414 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50419 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50419 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50422 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50422 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50432 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50432 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50434 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50434 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50435 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50456 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50460 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50460 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-28328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53148 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53150 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53176 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53215 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53215 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53254 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53270 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53270 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53272 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53272 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53280 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53280 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53295 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53295 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-53298 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53298 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53317 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53317 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53357 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53400 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53506 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53512 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53512 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53521 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53521 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53194 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53194 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53194 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 183 vulnerabilities and has 25 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-3614=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-3614=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-3614=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * kernel-source-4.12.14-122.275.1 * kernel-macros-4.12.14-122.275.1 * kernel-devel-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-4.12.14-122.275.1 * gfs2-kmp-default-debuginfo-4.12.14-122.275.1 * cluster-md-kmp-default-4.12.14-122.275.1 * dlm-kmp-default-4.12.14-122.275.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.275.1 * kernel-default-debuginfo-4.12.14-122.275.1 * gfs2-kmp-default-4.12.14-122.275.1 * kernel-syms-4.12.14-122.275.1 * kernel-default-base-4.12.14-122.275.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.275.1 * kernel-default-devel-4.12.14-122.275.1 * kernel-default-debugsource-4.12.14-122.275.1 * kernel-default-base-debuginfo-4.12.14-122.275.1 * dlm-kmp-default-debuginfo-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x) * kernel-default-man-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * gfs2-kmp-default-debuginfo-4.12.14-122.275.1 * ocfs2-kmp-default-4.12.14-122.275.1 * cluster-md-kmp-default-4.12.14-122.275.1 * dlm-kmp-default-4.12.14-122.275.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.275.1 * kernel-default-devel-debuginfo-4.12.14-122.275.1 * kernel-default-debuginfo-4.12.14-122.275.1 * gfs2-kmp-default-4.12.14-122.275.1 * kernel-default-base-4.12.14-122.275.1 * kernel-default-devel-4.12.14-122.275.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.275.1 * kernel-syms-4.12.14-122.275.1 * kernel-default-debugsource-4.12.14-122.275.1 * kernel-default-base-debuginfo-4.12.14-122.275.1 * dlm-kmp-default-debuginfo-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * kernel-default-4.12.14-122.275.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * kernel-source-4.12.14-122.275.1 * kernel-macros-4.12.14-122.275.1 * kernel-devel-4.12.14-122.275.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.275.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-devel-4.12.14-122.275.1 * kernel-default-debuginfo-4.12.14-122.275.1 * kernel-default-kgraft-4.12.14-122.275.1 * kernel-default-debugsource-4.12.14-122.275.1 * kgraft-patch-4_12_14-122_275-default-1-8.3.1 ## References: * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-49975.html * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50235.html * https://www.suse.com/security/cve/CVE-2022-50242.html * https://www.suse.com/security/cve/CVE-2022-50244.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2022-50257.html * https://www.suse.com/security/cve/CVE-2022-50258.html * https://www.suse.com/security/cve/CVE-2022-50265.html * https://www.suse.com/security/cve/CVE-2022-50266.html * https://www.suse.com/security/cve/CVE-2022-50271.html * https://www.suse.com/security/cve/CVE-2022-50272.html * https://www.suse.com/security/cve/CVE-2022-50278.html * https://www.suse.com/security/cve/CVE-2022-50282.html * https://www.suse.com/security/cve/CVE-2022-50285.html * https://www.suse.com/security/cve/CVE-2022-50288.html * https://www.suse.com/security/cve/CVE-2022-50289.html * https://www.suse.com/security/cve/CVE-2022-50291.html * https://www.suse.com/security/cve/CVE-2022-50294.html * https://www.suse.com/security/cve/CVE-2022-50297.html * https://www.suse.com/security/cve/CVE-2022-50299.html * https://www.suse.com/security/cve/CVE-2022-50304.html * https://www.suse.com/security/cve/CVE-2022-50311.html * https://www.suse.com/security/cve/CVE-2022-50312.html * https://www.suse.com/security/cve/CVE-2022-50321.html * https://www.suse.com/security/cve/CVE-2022-50330.html * https://www.suse.com/security/cve/CVE-2022-50344.html * https://www.suse.com/security/cve/CVE-2022-50346.html * https://www.suse.com/security/cve/CVE-2022-50349.html * https://www.suse.com/security/cve/CVE-2022-50351.html * https://www.suse.com/security/cve/CVE-2022-50352.html * https://www.suse.com/security/cve/CVE-2022-50359.html * https://www.suse.com/security/cve/CVE-2022-50365.html * https://www.suse.com/security/cve/CVE-2022-50372.html * https://www.suse.com/security/cve/CVE-2022-50375.html * https://www.suse.com/security/cve/CVE-2022-50381.html * https://www.suse.com/security/cve/CVE-2022-50385.html * https://www.suse.com/security/cve/CVE-2022-50386.html * https://www.suse.com/security/cve/CVE-2022-50389.html * https://www.suse.com/security/cve/CVE-2022-50396.html * https://www.suse.com/security/cve/CVE-2022-50401.html * https://www.suse.com/security/cve/CVE-2022-50402.html * https://www.suse.com/security/cve/CVE-2022-50405.html * https://www.suse.com/security/cve/CVE-2022-50406.html * https://www.suse.com/security/cve/CVE-2022-50408.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50410.html * https://www.suse.com/security/cve/CVE-2022-50411.html * https://www.suse.com/security/cve/CVE-2022-50414.html * https://www.suse.com/security/cve/CVE-2022-50419.html * https://www.suse.com/security/cve/CVE-2022-50422.html * https://www.suse.com/security/cve/CVE-2022-50432.html * https://www.suse.com/security/cve/CVE-2022-50434.html * https://www.suse.com/security/cve/CVE-2022-50435.html * https://www.suse.com/security/cve/CVE-2022-50440.html * https://www.suse.com/security/cve/CVE-2022-50456.html * https://www.suse.com/security/cve/CVE-2022-50460.html * https://www.suse.com/security/cve/CVE-2023-1380.html * https://www.suse.com/security/cve/CVE-2023-28328.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53148.html * https://www.suse.com/security/cve/CVE-2023-53149.html * https://www.suse.com/security/cve/CVE-2023-53150.html * https://www.suse.com/security/cve/CVE-2023-53151.html * https://www.suse.com/security/cve/CVE-2023-53153.html * https://www.suse.com/security/cve/CVE-2023-53165.html * https://www.suse.com/security/cve/CVE-2023-53174.html * https://www.suse.com/security/cve/CVE-2023-53176.html * https://www.suse.com/security/cve/CVE-2023-53178.html * https://www.suse.com/security/cve/CVE-2023-53189.html * https://www.suse.com/security/cve/CVE-2023-53199.html * https://www.suse.com/security/cve/CVE-2023-53201.html * https://www.suse.com/security/cve/CVE-2023-53213.html * https://www.suse.com/security/cve/CVE-2023-53215.html * https://www.suse.com/security/cve/CVE-2023-53226.html * https://www.suse.com/security/cve/CVE-2023-53245.html * https://www.suse.com/security/cve/CVE-2023-53246.html * https://www.suse.com/security/cve/CVE-2023-53248.html * https://www.suse.com/security/cve/CVE-2023-53250.html * https://www.suse.com/security/cve/CVE-2023-53254.html * https://www.suse.com/security/cve/CVE-2023-53265.html * https://www.suse.com/security/cve/CVE-2023-53270.html * https://www.suse.com/security/cve/CVE-2023-53272.html * https://www.suse.com/security/cve/CVE-2023-53277.html * https://www.suse.com/security/cve/CVE-2023-53280.html * https://www.suse.com/security/cve/CVE-2023-53288.html * https://www.suse.com/security/cve/CVE-2023-53295.html * https://www.suse.com/security/cve/CVE-2023-53298.html * https://www.suse.com/security/cve/CVE-2023-53299.html * https://www.suse.com/security/cve/CVE-2023-53302.html * https://www.suse.com/security/cve/CVE-2023-53305.html * https://www.suse.com/security/cve/CVE-2023-53307.html * https://www.suse.com/security/cve/CVE-2023-53308.html * https://www.suse.com/security/cve/CVE-2023-53309.html * https://www.suse.com/security/cve/CVE-2023-53313.html * https://www.suse.com/security/cve/CVE-2023-53317.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53326.html * https://www.suse.com/security/cve/CVE-2023-53331.html * https://www.suse.com/security/cve/CVE-2023-53332.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53335.html * https://www.suse.com/security/cve/CVE-2023-53344.html * https://www.suse.com/security/cve/CVE-2023-53348.html * https://www.suse.com/security/cve/CVE-2023-53357.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53368.html * https://www.suse.com/security/cve/CVE-2023-53380.html * https://www.suse.com/security/cve/CVE-2023-53384.html * https://www.suse.com/security/cve/CVE-2023-53393.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53397.html * https://www.suse.com/security/cve/CVE-2023-53400.html * https://www.suse.com/security/cve/CVE-2023-53427.html * https://www.suse.com/security/cve/CVE-2023-53436.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53441.html * https://www.suse.com/security/cve/CVE-2023-53446.html * https://www.suse.com/security/cve/CVE-2023-53451.html * https://www.suse.com/security/cve/CVE-2023-53456.html * https://www.suse.com/security/cve/CVE-2023-53499.html * https://www.suse.com/security/cve/CVE-2023-53506.html * https://www.suse.com/security/cve/CVE-2023-53512.html * https://www.suse.com/security/cve/CVE-2023-53521.html * https://www.suse.com/security/cve/CVE-2023-53526.html * https://www.suse.com/security/cve/CVE-2023-53530.html * https://www.suse.com/security/cve/CVE-2024-53194.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38712.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1082555 * https://bugzilla.suse.com/show_bug.cgi?id=1164051 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1207629 * https://bugzilla.suse.com/show_bug.cgi?id=1209287 * https://bugzilla.suse.com/show_bug.cgi?id=1209291 * https://bugzilla.suse.com/show_bug.cgi?id=1210124 * https://bugzilla.suse.com/show_bug.cgi?id=1210584 * https://bugzilla.suse.com/show_bug.cgi?id=1211960 * https://bugzilla.suse.com/show_bug.cgi?id=1213015 * https://bugzilla.suse.com/show_bug.cgi?id=1213016 * https://bugzilla.suse.com/show_bug.cgi?id=1213040 * https://bugzilla.suse.com/show_bug.cgi?id=1213041 * https://bugzilla.suse.com/show_bug.cgi?id=1213133 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1214953 * https://bugzilla.suse.com/show_bug.cgi?id=1214967 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1235459 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1245196 * https://bugzilla.suse.com/show_bug.cgi?id=1246968 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249037 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249194 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249641 * https://bugzilla.suse.com/show_bug.cgi?id=1249647 * https://bugzilla.suse.com/show_bug.cgi?id=1249658 * https://bugzilla.suse.com/show_bug.cgi?id=1249667 * https://bugzilla.suse.com/show_bug.cgi?id=1249683 * https://bugzilla.suse.com/show_bug.cgi?id=1249687 * https://bugzilla.suse.com/show_bug.cgi?id=1249696 * https://bugzilla.suse.com/show_bug.cgi?id=1249700 * https://bugzilla.suse.com/show_bug.cgi?id=1249706 * https://bugzilla.suse.com/show_bug.cgi?id=1249715 * https://bugzilla.suse.com/show_bug.cgi?id=1249716 * https://bugzilla.suse.com/show_bug.cgi?id=1249720 * https://bugzilla.suse.com/show_bug.cgi?id=1249725 * https://bugzilla.suse.com/show_bug.cgi?id=1249727 * https://bugzilla.suse.com/show_bug.cgi?id=1249734 * https://bugzilla.suse.com/show_bug.cgi?id=1249739 * https://bugzilla.suse.com/show_bug.cgi?id=1249740 * https://bugzilla.suse.com/show_bug.cgi?id=1249743 * https://bugzilla.suse.com/show_bug.cgi?id=1249744 * https://bugzilla.suse.com/show_bug.cgi?id=1249779 * https://bugzilla.suse.com/show_bug.cgi?id=1249798 * https://bugzilla.suse.com/show_bug.cgi?id=1249799 * https://bugzilla.suse.com/show_bug.cgi?id=1249802 * https://bugzilla.suse.com/show_bug.cgi?id=1249803 * https://bugzilla.suse.com/show_bug.cgi?id=1249808 * https://bugzilla.suse.com/show_bug.cgi?id=1249810 * https://bugzilla.suse.com/show_bug.cgi?id=1249827 * https://bugzilla.suse.com/show_bug.cgi?id=1249842 * https://bugzilla.suse.com/show_bug.cgi?id=1249846 * https://bugzilla.suse.com/show_bug.cgi?id=1249853 * https://bugzilla.suse.com/show_bug.cgi?id=1249865 * https://bugzilla.suse.com/show_bug.cgi?id=1249867 * https://bugzilla.suse.com/show_bug.cgi?id=1249871 * https://bugzilla.suse.com/show_bug.cgi?id=1249872 * https://bugzilla.suse.com/show_bug.cgi?id=1249877 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249882 * https://bugzilla.suse.com/show_bug.cgi?id=1249894 * https://bugzilla.suse.com/show_bug.cgi?id=1249908 * https://bugzilla.suse.com/show_bug.cgi?id=1249911 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249917 * https://bugzilla.suse.com/show_bug.cgi?id=1249918 * https://bugzilla.suse.com/show_bug.cgi?id=1249920 * https://bugzilla.suse.com/show_bug.cgi?id=1249922 * https://bugzilla.suse.com/show_bug.cgi?id=1249925 * https://bugzilla.suse.com/show_bug.cgi?id=1249927 * https://bugzilla.suse.com/show_bug.cgi?id=1249936 * https://bugzilla.suse.com/show_bug.cgi?id=1249938 * https://bugzilla.suse.com/show_bug.cgi?id=1249944 * https://bugzilla.suse.com/show_bug.cgi?id=1249947 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1249950 * https://bugzilla.suse.com/show_bug.cgi?id=1249951 * https://bugzilla.suse.com/show_bug.cgi?id=1249958 * https://bugzilla.suse.com/show_bug.cgi?id=1249979 * https://bugzilla.suse.com/show_bug.cgi?id=1249981 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1249991 * https://bugzilla.suse.com/show_bug.cgi?id=1249994 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250014 * https://bugzilla.suse.com/show_bug.cgi?id=1250018 * https://bugzilla.suse.com/show_bug.cgi?id=1250023 * https://bugzilla.suse.com/show_bug.cgi?id=1250024 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250043 * https://bugzilla.suse.com/show_bug.cgi?id=1250044 * https://bugzilla.suse.com/show_bug.cgi?id=1250045 * https://bugzilla.suse.com/show_bug.cgi?id=1250049 * https://bugzilla.suse.com/show_bug.cgi?id=1250052 * https://bugzilla.suse.com/show_bug.cgi?id=1250055 * https://bugzilla.suse.com/show_bug.cgi?id=1250058 * https://bugzilla.suse.com/show_bug.cgi?id=1250071 * https://bugzilla.suse.com/show_bug.cgi?id=1250072 * https://bugzilla.suse.com/show_bug.cgi?id=1250081 * https://bugzilla.suse.com/show_bug.cgi?id=1250084 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250104 * https://bugzilla.suse.com/show_bug.cgi?id=1250114 * https://bugzilla.suse.com/show_bug.cgi?id=1250121 * https://bugzilla.suse.com/show_bug.cgi?id=1250125 * https://bugzilla.suse.com/show_bug.cgi?id=1250127 * https://bugzilla.suse.com/show_bug.cgi?id=1250131 * https://bugzilla.suse.com/show_bug.cgi?id=1250132 * https://bugzilla.suse.com/show_bug.cgi?id=1250140 * https://bugzilla.suse.com/show_bug.cgi?id=1250145 * https://bugzilla.suse.com/show_bug.cgi?id=1250150 * https://bugzilla.suse.com/show_bug.cgi?id=1250155 * https://bugzilla.suse.com/show_bug.cgi?id=1250156 * https://bugzilla.suse.com/show_bug.cgi?id=1250165 * https://bugzilla.suse.com/show_bug.cgi?id=1250168 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250183 * https://bugzilla.suse.com/show_bug.cgi?id=1250187 * https://bugzilla.suse.com/show_bug.cgi?id=1250198 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250250 * https://bugzilla.suse.com/show_bug.cgi?id=1250257 * https://bugzilla.suse.com/show_bug.cgi?id=1250269 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250301 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250324 * https://bugzilla.suse.com/show_bug.cgi?id=1250328 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250363 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250391 * https://bugzilla.suse.com/show_bug.cgi?id=1250392 * https://bugzilla.suse.com/show_bug.cgi?id=1250393 * https://bugzilla.suse.com/show_bug.cgi?id=1250394 * https://bugzilla.suse.com/show_bug.cgi?id=1250395 * https://bugzilla.suse.com/show_bug.cgi?id=1250397 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250765 * https://bugzilla.suse.com/show_bug.cgi?id=1250774 * https://bugzilla.suse.com/show_bug.cgi?id=1250792 * https://bugzilla.suse.com/show_bug.cgi?id=1250799 * https://bugzilla.suse.com/show_bug.cgi?id=1250818 * https://bugzilla.suse.com/show_bug.cgi?id=1250831 * https://bugzilla.suse.com/show_bug.cgi?id=1250851 * https://bugzilla.suse.com/show_bug.cgi?id=1250853 * https://bugzilla.suse.com/show_bug.cgi?id=1250856 * https://bugzilla.suse.com/show_bug.cgi?id=1250879 * https://bugzilla.suse.com/show_bug.cgi?id=1250915 * https://bugzilla.suse.com/show_bug.cgi?id=1250928 * https://bugzilla.suse.com/show_bug.cgi?id=1250949 * https://bugzilla.suse.com/show_bug.cgi?id=1250963 * https://bugzilla.suse.com/show_bug.cgi?id=1250965 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 16 08:32:42 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 16 Oct 2025 08:32:42 -0000 Subject: SUSE-SU-2025:03618-1: critical: Security update for samba Message-ID: <176060356254.27718.14435467767806871919@smelt2.prg2.suse.org> # Security update for samba Announcement ID: SUSE-SU-2025:03618-1 Release Date: 2025-10-16T07:37:34Z Rating: critical References: * bsc#1251279 * bsc#1251280 Cross-References: * CVE-2025-10230 * CVE-2025-9640 CVSS scores: * CVE-2025-10230 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-9640 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-9640 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279). * CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3618=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3618=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3618=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3618=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3618=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3618=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-3618=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3618=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3618=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3618=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3618=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3618=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3618=1 ## Package List: * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Manager Server 4.3 LTS (x86_64) * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * ctdb-pcp-pmda-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * ctdb-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * ctdb-pcp-pmda-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-test-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-test-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * ctdb-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * openSUSE Leap 15.4 (x86_64) * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * openSUSE Leap 15.4 (noarch) * samba-doc-4.15.13+git.736.b791be993ba-150400.3.40.1 * openSUSE Leap 15.4 (aarch64 x86_64) * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * openSUSE Leap 15.4 (aarch64_ilp32) * samba-client-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-64bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-64bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * ctdb-4.15.13+git.736.b791be993ba-150400.3.40.1 * ctdb-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * samba-client-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-tool-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-dsdb-modules-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-python3-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-python3-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-32bit-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ceph-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-debugsource-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ldb-ldap-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-32bit-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-gpupdate-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy-devel-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-ad-dc-libs-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-winbind-libs-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * libsamba-policy0-python3-debuginfo-4.15.13+git.736.b791be993ba-150400.3.40.1 * samba-client-4.15.13+git.736.b791be993ba-150400.3.40.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10230.html * https://www.suse.com/security/cve/CVE-2025-9640.html * https://bugzilla.suse.com/show_bug.cgi?id=1251279 * https://bugzilla.suse.com/show_bug.cgi?id=1251280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 16 08:32:47 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 16 Oct 2025 08:32:47 -0000 Subject: SUSE-SU-2025:03616-1: moderate: Security update for ImageMagick Message-ID: <176060356799.27718.7355129106871585038@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:03616-1 Release Date: 2025-10-16T05:49:33Z Rating: moderate References: * bsc#1249362 Cross-References: * CVE-2025-57807 CVSS scores: * CVE-2025-57807 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-57807 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-57807 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L * CVE-2025-57807 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-57807: heap out-of-bounds write can lead to memory corruption (bsc#1249362). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3616=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3616=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3616=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * ImageMagick-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-devel-7.1.0.9-150400.6.43.1 * ImageMagick-extra-7.1.0.9-150400.6.43.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.43.1 * ImageMagick-debugsource-7.1.0.9-150400.6.43.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.43.1 * ImageMagick-7.1.0.9-150400.6.43.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-extra-debuginfo-7.1.0.9-150400.6.43.1 * perl-PerlMagick-7.1.0.9-150400.6.43.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.43.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.43.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.43.1 * libMagick++-devel-7.1.0.9-150400.6.43.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.43.1 * openSUSE Leap 15.4 (x86_64) * libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.43.1 * libMagick++-devel-32bit-7.1.0.9-150400.6.43.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.43.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.0.9-150400.6.43.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-devel-32bit-7.1.0.9-150400.6.43.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.43.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.43.1 * openSUSE Leap 15.4 (noarch) * ImageMagick-doc-7.1.0.9-150400.6.43.1 * openSUSE Leap 15.4 (aarch64_ilp32) * ImageMagick-devel-64bit-7.1.0.9-150400.6.43.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.0.9-150400.6.43.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.0.9-150400.6.43.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.43.1 * libMagick++-7_Q16HDRI5-64bit-7.1.0.9-150400.6.43.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.43.1 * libMagick++-devel-64bit-7.1.0.9-150400.6.43.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.0.9-150400.6.43.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ImageMagick-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-debugsource-7.1.0.9-150400.6.43.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.43.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-debuginfo-7.1.0.9-150400.6.43.1 * ImageMagick-debugsource-7.1.0.9-150400.6.43.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.43.1 ## References: * https://www.suse.com/security/cve/CVE-2025-57807.html * https://bugzilla.suse.com/show_bug.cgi?id=1249362 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 16 08:38:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 16 Oct 2025 08:38:09 -0000 Subject: SUSE-SU-2025:03615-1: important: Security update for the Linux Kernel Message-ID: <176060388918.27718.14927916251754773331@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03615-1 Release Date: 2025-10-16T05:49:16Z Rating: important References: * bsc#1065729 * bsc#1164051 * bsc#1193629 * bsc#1194869 * bsc#1202700 * bsc#1203063 * bsc#1203332 * bsc#1204228 * bsc#1205128 * bsc#1205205 * bsc#1206451 * bsc#1206456 * bsc#1206468 * bsc#1206843 * bsc#1206883 * bsc#1206884 * bsc#1207158 * bsc#1207361 * bsc#1207621 * bsc#1207624 * bsc#1207625 * bsc#1207628 * bsc#1207629 * bsc#1207631 * bsc#1207645 * bsc#1207651 * bsc#1208607 * bsc#1209287 * bsc#1209291 * bsc#1209980 * bsc#1210584 * bsc#1211960 * bsc#1212603 * bsc#1213015 * bsc#1213016 * bsc#1213040 * bsc#1213041 * bsc#1213061 * bsc#1213099 * bsc#1213104 * bsc#1213533 * bsc#1213666 * bsc#1213747 * bsc#1214073 * bsc#1214953 * bsc#1214967 * bsc#1215150 * bsc#1215696 * bsc#1215911 * bsc#1216976 * bsc#1217790 * bsc#1220185 * bsc#1220186 * bsc#1223959 * bsc#1234639 * bsc#1236104 * bsc#1237449 * bsc#1238160 * bsc#1241353 * bsc#1242846 * bsc#1243539 * bsc#1244337 * bsc#1244732 * bsc#1245666 * bsc#1246879 * bsc#1246968 * bsc#1247028 * bsc#1247172 * bsc#1247239 * bsc#1248108 * bsc#1248111 * bsc#1248255 * bsc#1248399 * bsc#1248628 * bsc#1248639 * bsc#1248847 * bsc#1249126 * bsc#1249158 * bsc#1249159 * bsc#1249186 * bsc#1249195 * bsc#1249200 * bsc#1249220 * bsc#1249266 * bsc#1249315 * bsc#1249324 * bsc#1249346 * bsc#1249374 * bsc#1249516 * bsc#1249538 * bsc#1249548 * bsc#1249604 * bsc#1249638 * bsc#1249639 * bsc#1249641 * bsc#1249642 * bsc#1249648 * bsc#1249650 * bsc#1249651 * bsc#1249658 * bsc#1249661 * bsc#1249664 * bsc#1249667 * bsc#1249669 * bsc#1249673 * bsc#1249677 * bsc#1249681 * bsc#1249683 * bsc#1249685 * bsc#1249687 * bsc#1249695 * bsc#1249696 * bsc#1249699 * bsc#1249700 * bsc#1249701 * bsc#1249704 * bsc#1249705 * bsc#1249706 * bsc#1249707 * bsc#1249708 * bsc#1249709 * bsc#1249712 * bsc#1249713 * bsc#1249715 * bsc#1249716 * bsc#1249718 * bsc#1249722 * bsc#1249727 * bsc#1249730 * bsc#1249733 * bsc#1249734 * bsc#1249739 * bsc#1249740 * bsc#1249741 * bsc#1249742 * bsc#1249743 * bsc#1249745 * bsc#1249746 * bsc#1249747 * bsc#1249749 * bsc#1249750 * bsc#1249751 * bsc#1249753 * bsc#1249756 * bsc#1249757 * bsc#1249758 * bsc#1249762 * bsc#1249767 * bsc#1249777 * bsc#1249780 * bsc#1249781 * bsc#1249782 * bsc#1249784 * bsc#1249791 * bsc#1249799 * bsc#1249800 * bsc#1249802 * bsc#1249808 * bsc#1249810 * bsc#1249816 * bsc#1249820 * bsc#1249824 * bsc#1249825 * bsc#1249827 * bsc#1249836 * bsc#1249840 * bsc#1249844 * bsc#1249846 * bsc#1249853 * bsc#1249858 * bsc#1249860 * bsc#1249861 * bsc#1249864 * bsc#1249865 * bsc#1249866 * bsc#1249867 * bsc#1249868 * bsc#1249869 * bsc#1249872 * bsc#1249874 * bsc#1249877 * bsc#1249880 * bsc#1249882 * bsc#1249883 * bsc#1249884 * bsc#1249885 * bsc#1249890 * bsc#1249892 * bsc#1249894 * bsc#1249908 * bsc#1249910 * bsc#1249911 * bsc#1249913 * bsc#1249914 * bsc#1249917 * bsc#1249918 * bsc#1249920 * bsc#1249923 * bsc#1249924 * bsc#1249925 * bsc#1249927 * bsc#1249928 * bsc#1249930 * bsc#1249933 * bsc#1249934 * bsc#1249936 * bsc#1249938 * bsc#1249939 * bsc#1249940 * bsc#1249944 * bsc#1249947 * bsc#1249949 * bsc#1249950 * bsc#1249951 * bsc#1249954 * bsc#1249958 * bsc#1249979 * bsc#1249981 * bsc#1249991 * bsc#1249994 * bsc#1249997 * bsc#1250002 * bsc#1250006 * bsc#1250007 * bsc#1250009 * bsc#1250010 * bsc#1250011 * bsc#1250014 * bsc#1250015 * bsc#1250017 * bsc#1250023 * bsc#1250024 * bsc#1250026 * bsc#1250037 * bsc#1250039 * bsc#1250040 * bsc#1250041 * bsc#1250042 * bsc#1250044 * bsc#1250047 * bsc#1250049 * bsc#1250052 * bsc#1250055 * bsc#1250058 * bsc#1250060 * bsc#1250062 * bsc#1250065 * bsc#1250066 * bsc#1250068 * bsc#1250070 * bsc#1250071 * bsc#1250072 * bsc#1250075 * bsc#1250077 * bsc#1250080 * bsc#1250081 * bsc#1250083 * bsc#1250089 * bsc#1250103 * bsc#1250104 * bsc#1250105 * bsc#1250106 * bsc#1250107 * bsc#1250108 * bsc#1250112 * bsc#1250114 * bsc#1250117 * bsc#1250118 * bsc#1250121 * bsc#1250127 * bsc#1250128 * bsc#1250130 * bsc#1250131 * bsc#1250132 * bsc#1250134 * bsc#1250137 * bsc#1250138 * bsc#1250140 * bsc#1250144 * bsc#1250145 * bsc#1250151 * bsc#1250153 * bsc#1250156 * bsc#1250157 * bsc#1250159 * bsc#1250161 * bsc#1250165 * bsc#1250168 * bsc#1250178 * bsc#1250180 * bsc#1250181 * bsc#1250182 * bsc#1250183 * bsc#1250184 * bsc#1250187 * bsc#1250189 * bsc#1250191 * bsc#1250197 * bsc#1250198 * bsc#1250200 * bsc#1250201 * bsc#1250208 * bsc#1250209 * bsc#1250211 * bsc#1250215 * bsc#1250245 * bsc#1250247 * bsc#1250250 * bsc#1250257 * bsc#1250264 * bsc#1250269 * bsc#1250277 * bsc#1250278 * bsc#1250285 * bsc#1250287 * bsc#1250293 * bsc#1250301 * bsc#1250303 * bsc#1250306 * bsc#1250309 * bsc#1250311 * bsc#1250313 * bsc#1250315 * bsc#1250316 * bsc#1250322 * bsc#1250323 * bsc#1250324 * bsc#1250325 * bsc#1250327 * bsc#1250328 * bsc#1250331 * bsc#1250358 * bsc#1250362 * bsc#1250363 * bsc#1250370 * bsc#1250374 * bsc#1250391 * bsc#1250392 * bsc#1250393 * bsc#1250394 * bsc#1250395 * bsc#1250397 * bsc#1250406 * bsc#1250412 * bsc#1250418 * bsc#1250425 * bsc#1250428 * bsc#1250453 * bsc#1250454 * bsc#1250457 * bsc#1250459 * bsc#1250522 * bsc#1250759 * bsc#1250761 * bsc#1250762 * bsc#1250763 * bsc#1250765 * bsc#1250767 * bsc#1250768 * bsc#1250771 * bsc#1250774 * bsc#1250781 * bsc#1250784 * bsc#1250786 * bsc#1250787 * bsc#1250790 * bsc#1250791 * bsc#1250792 * bsc#1250793 * bsc#1250797 * bsc#1250799 * bsc#1250807 * bsc#1250810 * bsc#1250811 * bsc#1250814 * bsc#1250818 * bsc#1250819 * bsc#1250822 * bsc#1250823 * bsc#1250824 * bsc#1250825 * bsc#1250829 * bsc#1250830 * bsc#1250831 * bsc#1250832 * bsc#1250839 * bsc#1250841 * bsc#1250842 * bsc#1250843 * bsc#1250846 * bsc#1250847 * bsc#1250848 * bsc#1250849 * bsc#1250850 * bsc#1250851 * bsc#1250853 * bsc#1250856 * bsc#1250861 * bsc#1250862 * bsc#1250863 * bsc#1250864 * bsc#1250866 * bsc#1250867 * bsc#1250868 * bsc#1250872 * bsc#1250873 * bsc#1250874 * bsc#1250875 * bsc#1250877 * bsc#1250879 * bsc#1250881 * bsc#1250883 * bsc#1250887 * bsc#1250888 * bsc#1250889 * bsc#1250890 * bsc#1250891 * bsc#1250905 * bsc#1250913 * bsc#1250915 * bsc#1250917 * bsc#1250923 * bsc#1250927 * bsc#1250928 * bsc#1250931 * bsc#1250932 * bsc#1250948 * bsc#1250949 * bsc#1250953 * bsc#1250963 * bsc#1250964 * bsc#1250965 Cross-References: * CVE-2022-2602 * CVE-2022-2978 * CVE-2022-36280 * CVE-2022-43945 * CVE-2022-49138 * CVE-2022-50233 * CVE-2022-50234 * CVE-2022-50235 * CVE-2022-50239 * CVE-2022-50241 * CVE-2022-50242 * CVE-2022-50246 * CVE-2022-50247 * CVE-2022-50248 * CVE-2022-50249 * CVE-2022-50250 * CVE-2022-50251 * CVE-2022-50252 * CVE-2022-50255 * CVE-2022-50257 * CVE-2022-50258 * CVE-2022-50260 * CVE-2022-50261 * CVE-2022-50264 * CVE-2022-50266 * CVE-2022-50267 * CVE-2022-50268 * CVE-2022-50269 * CVE-2022-50271 * CVE-2022-50272 * CVE-2022-50275 * CVE-2022-50276 * CVE-2022-50277 * CVE-2022-50278 * CVE-2022-50279 * CVE-2022-50282 * CVE-2022-50286 * CVE-2022-50287 * CVE-2022-50288 * CVE-2022-50289 * CVE-2022-50292 * CVE-2022-50294 * CVE-2022-50297 * CVE-2022-50298 * CVE-2022-50299 * CVE-2022-50301 * CVE-2022-50303 * CVE-2022-50308 * CVE-2022-50309 * CVE-2022-50312 * CVE-2022-50317 * CVE-2022-50318 * CVE-2022-50320 * CVE-2022-50321 * CVE-2022-50323 * CVE-2022-50324 * CVE-2022-50325 * CVE-2022-50328 * CVE-2022-50329 * CVE-2022-50330 * CVE-2022-50331 * CVE-2022-50333 * CVE-2022-50339 * CVE-2022-50340 * CVE-2022-50342 * CVE-2022-50344 * CVE-2022-50346 * CVE-2022-50347 * CVE-2022-50348 * CVE-2022-50349 * CVE-2022-50351 * CVE-2022-50353 * CVE-2022-50354 * CVE-2022-50355 * CVE-2022-50356 * CVE-2022-50357 * CVE-2022-50358 * CVE-2022-50359 * CVE-2022-50360 * CVE-2022-50362 * CVE-2022-50364 * CVE-2022-50367 * CVE-2022-50368 * CVE-2022-50369 * CVE-2022-50370 * CVE-2022-50372 * CVE-2022-50373 * CVE-2022-50374 * CVE-2022-50375 * CVE-2022-50376 * CVE-2022-50378 * CVE-2022-50379 * CVE-2022-50381 * CVE-2022-50385 * CVE-2022-50386 * CVE-2022-50388 * CVE-2022-50389 * CVE-2022-50390 * CVE-2022-50391 * CVE-2022-50392 * CVE-2022-50393 * CVE-2022-50394 * CVE-2022-50395 * CVE-2022-50396 * CVE-2022-50398 * CVE-2022-50399 * CVE-2022-50401 * CVE-2022-50402 * CVE-2022-50404 * CVE-2022-50406 * CVE-2022-50408 * CVE-2022-50409 * CVE-2022-50410 * CVE-2022-50411 * CVE-2022-50412 * CVE-2022-50414 * CVE-2022-50417 * CVE-2022-50418 * CVE-2022-50419 * CVE-2022-50422 * CVE-2022-50423 * CVE-2022-50425 * CVE-2022-50427 * CVE-2022-50428 * CVE-2022-50429 * CVE-2022-50430 * CVE-2022-50431 * CVE-2022-50432 * CVE-2022-50433 * CVE-2022-50434 * CVE-2022-50435 * CVE-2022-50436 * CVE-2022-50437 * CVE-2022-50439 * CVE-2022-50440 * CVE-2022-50441 * CVE-2022-50443 * CVE-2022-50444 * CVE-2022-50447 * CVE-2022-50449 * CVE-2022-50452 * CVE-2022-50453 * CVE-2022-50454 * CVE-2022-50456 * CVE-2022-50458 * CVE-2022-50459 * CVE-2022-50460 * CVE-2022-50464 * CVE-2022-50465 * CVE-2022-50466 * CVE-2022-50467 * CVE-2022-50468 * CVE-2022-50469 * CVE-2023-1380 * CVE-2023-28328 * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-42753 * CVE-2023-52923 * CVE-2023-53147 * CVE-2023-53149 * CVE-2023-53150 * CVE-2023-53151 * CVE-2023-53152 * CVE-2023-53153 * CVE-2023-53165 * CVE-2023-53167 * CVE-2023-53168 * CVE-2023-53171 * CVE-2023-53174 * CVE-2023-53176 * CVE-2023-53178 * CVE-2023-53179 * CVE-2023-53181 * CVE-2023-53182 * CVE-2023-53185 * CVE-2023-53189 * CVE-2023-53193 * CVE-2023-53196 * CVE-2023-53197 * CVE-2023-53199 * CVE-2023-53201 * CVE-2023-53205 * CVE-2023-53210 * CVE-2023-53213 * CVE-2023-53215 * CVE-2023-53216 * CVE-2023-53219 * CVE-2023-53222 * CVE-2023-53223 * CVE-2023-53226 * CVE-2023-53229 * CVE-2023-53230 * CVE-2023-53232 * CVE-2023-53234 * CVE-2023-53237 * CVE-2023-53238 * CVE-2023-53239 * CVE-2023-53241 * CVE-2023-53242 * CVE-2023-53244 * CVE-2023-53245 * CVE-2023-53246 * CVE-2023-53249 * CVE-2023-53250 * CVE-2023-53251 * CVE-2023-53252 * CVE-2023-53255 * CVE-2023-53257 * CVE-2023-53258 * CVE-2023-53259 * CVE-2023-53263 * CVE-2023-53265 * CVE-2023-53268 * CVE-2023-53270 * CVE-2023-53272 * CVE-2023-53273 * CVE-2023-53275 * CVE-2023-53276 * CVE-2023-53277 * CVE-2023-53280 * CVE-2023-53281 * CVE-2023-53282 * CVE-2023-53284 * CVE-2023-53286 * CVE-2023-53287 * CVE-2023-53288 * CVE-2023-53295 * CVE-2023-53297 * CVE-2023-53298 * CVE-2023-53299 * CVE-2023-53302 * CVE-2023-53304 * CVE-2023-53305 * CVE-2023-53309 * CVE-2023-53311 * CVE-2023-53313 * CVE-2023-53314 * CVE-2023-53315 * CVE-2023-53316 * CVE-2023-53317 * CVE-2023-53320 * CVE-2023-53321 * CVE-2023-53322 * CVE-2023-53324 * CVE-2023-53326 * CVE-2023-53330 * CVE-2023-53331 * CVE-2023-53332 * CVE-2023-53333 * CVE-2023-53334 * CVE-2023-53335 * CVE-2023-53337 * CVE-2023-53340 * CVE-2023-53344 * CVE-2023-53347 * CVE-2023-53349 * CVE-2023-53352 * CVE-2023-53356 * CVE-2023-53357 * CVE-2023-53359 * CVE-2023-53368 * CVE-2023-53370 * CVE-2023-53371 * CVE-2023-53373 * CVE-2023-53375 * CVE-2023-53377 * CVE-2023-53378 * CVE-2023-53379 * CVE-2023-53380 * CVE-2023-53381 * CVE-2023-53383 * CVE-2023-53384 * CVE-2023-53386 * CVE-2023-53388 * CVE-2023-53390 * CVE-2023-53391 * CVE-2023-53393 * CVE-2023-53395 * CVE-2023-53396 * CVE-2023-53398 * CVE-2023-53400 * CVE-2023-53404 * CVE-2023-53405 * CVE-2023-53406 * CVE-2023-53409 * CVE-2023-53413 * CVE-2023-53414 * CVE-2023-53415 * CVE-2023-53416 * CVE-2023-53422 * CVE-2023-53427 * CVE-2023-53431 * CVE-2023-53435 * CVE-2023-53436 * CVE-2023-53437 * CVE-2023-53438 * CVE-2023-53440 * CVE-2023-53442 * CVE-2023-53443 * CVE-2023-53444 * CVE-2023-53446 * CVE-2023-53448 * CVE-2023-53449 * CVE-2023-53451 * CVE-2023-53452 * CVE-2023-53453 * CVE-2023-53454 * CVE-2023-53456 * CVE-2023-53457 * CVE-2023-53458 * CVE-2023-53463 * CVE-2023-53464 * CVE-2023-53465 * CVE-2023-53466 * CVE-2023-53468 * CVE-2023-53471 * CVE-2023-53472 * CVE-2023-53473 * CVE-2023-53474 * CVE-2023-53475 * CVE-2023-53476 * CVE-2023-53480 * CVE-2023-53482 * CVE-2023-53485 * CVE-2023-53487 * CVE-2023-53488 * CVE-2023-53489 * CVE-2023-53492 * CVE-2023-53494 * CVE-2023-53496 * CVE-2023-53498 * CVE-2023-53499 * CVE-2023-53505 * CVE-2023-53506 * CVE-2023-53509 * CVE-2023-53511 * CVE-2023-53512 * CVE-2023-53515 * CVE-2023-53518 * CVE-2023-53519 * CVE-2023-53521 * CVE-2023-53524 * CVE-2023-53525 * CVE-2023-53526 * CVE-2023-53530 * CVE-2023-53531 * CVE-2023-53532 * CVE-2024-26583 * CVE-2024-26584 * CVE-2024-58240 * CVE-2025-37738 * CVE-2025-37958 * CVE-2025-38014 * CVE-2025-38111 * CVE-2025-38380 * CVE-2025-38488 * CVE-2025-38553 * CVE-2025-38572 * CVE-2025-38659 * CVE-2025-38664 * CVE-2025-38678 * CVE-2025-38683 * CVE-2025-38685 * CVE-2025-38706 * CVE-2025-38713 * CVE-2025-38734 * CVE-2025-39691 * CVE-2025-39703 * CVE-2025-39726 * CVE-2025-39746 * CVE-2025-39751 * CVE-2025-39790 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39860 * CVE-2025-39869 CVSS scores: * CVE-2022-2602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2602 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49138 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49138 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49138 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50235 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50235 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50246 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50246 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50247 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50257 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50261 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50264 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50266 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50267 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50268 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50268 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50275 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50275 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50277 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50277 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50279 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50279 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50282 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50282 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50289 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50289 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50297 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50297 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50320 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50320 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50328 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50333 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50333 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50342 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50344 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50344 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50346 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50346 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-50347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50355 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50358 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50358 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2022-50368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-50369 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50372 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50372 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50373 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50373 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-50374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50376 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50378 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50381 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50381 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50386 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50386 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50388 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50388 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50389 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50389 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50401 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50401 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50402 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50402 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50404 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50404 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50408 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50408 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50411 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50411 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50414 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50414 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50419 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50419 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50422 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50422 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50423 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50423 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50425 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50427 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50427 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50428 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50428 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50431 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50432 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50432 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50434 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50434 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50435 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50436 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50437 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50437 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50441 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50443 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50443 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-50444 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50444 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-50447 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50449 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50449 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50452 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50452 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50456 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50460 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50460 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50467 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50469 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-28328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53150 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53176 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53196 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53215 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53215 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53222 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53223 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53241 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53241 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53242 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53249 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53255 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53255 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53257 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53257 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53259 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53263 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53263 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53268 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53270 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53270 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53272 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53272 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53280 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53280 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53281 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53281 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53282 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53282 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53284 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53295 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53295 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-53297 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53298 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53298 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53311 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53311 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53314 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53316 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53316 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53317 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53317 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53320 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53320 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53324 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53324 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53334 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53334 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53340 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53357 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53383 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53383 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53390 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53390 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53396 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53396 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53400 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53404 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53409 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53413 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53414 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53415 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53416 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53437 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53437 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53442 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53442 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53443 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53452 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53452 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-53453 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53453 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53454 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53454 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53471 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53473 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53480 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53485 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53485 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53496 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53506 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53509 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53509 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53511 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53511 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53512 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53512 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53515 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53515 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53518 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53518 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53519 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53519 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53521 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53521 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53524 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53524 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53525 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53525 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53526 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53531 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53531 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53532 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53532 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37738 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38014 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 378 vulnerabilities and has 54 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-3615=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3615=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3615=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3615=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3615=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3615=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-3615=1 ## Package List: * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (noarch) * kernel-source-vanilla-5.14.21-150500.55.124.1 * kernel-devel-5.14.21-150500.55.124.1 * kernel-macros-5.14.21-150500.55.124.1 * kernel-docs-html-5.14.21-150500.55.124.1 * kernel-source-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-default-base-rebuild-5.14.21-150500.55.124.1.150500.6.59.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.124.1 * kernel-kvmsmall-debugsource-5.14.21-150500.55.124.1 * kernel-default-base-5.14.21-150500.55.124.1.150500.6.59.1 * kernel-kvmsmall-debuginfo-5.14.21-150500.55.124.1 * kernel-kvmsmall-devel-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kernel-default-extra-5.14.21-150500.55.124.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.124.1 * kernel-default-debugsource-5.14.21-150500.55.124.1 * ocfs2-kmp-default-5.14.21-150500.55.124.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-debugsource-5.14.21-150500.55.124.1 * cluster-md-kmp-default-5.14.21-150500.55.124.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-qa-5.14.21-150500.55.124.1 * gfs2-kmp-default-5.14.21-150500.55.124.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.124.1 * kernel-default-optional-5.14.21-150500.55.124.1 * kernel-obs-build-5.14.21-150500.55.124.1 * kernel-default-devel-5.14.21-150500.55.124.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.124.1 * reiserfs-kmp-default-5.14.21-150500.55.124.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.124.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.124.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.124.1 * kselftests-kmp-default-5.14.21-150500.55.124.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.124.1 * dlm-kmp-default-5.14.21-150500.55.124.1 * kernel-syms-5.14.21-150500.55.124.1 * kernel-default-livepatch-5.14.21-150500.55.124.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_31-debugsource-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-5_14_21-150500_55_124-default-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (x86_64) * kernel-kvmsmall-vdso-5.14.21-150500.55.124.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.124.1 * kernel-default-vdso-debuginfo-5.14.21-150500.55.124.1 * kernel-default-vdso-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.124.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (aarch64) * dtb-amlogic-5.14.21-150500.55.124.1 * dtb-altera-5.14.21-150500.55.124.1 * dtb-cavium-5.14.21-150500.55.124.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.124.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.124.1 * kselftests-kmp-64kb-5.14.21-150500.55.124.1 * kernel-64kb-optional-5.14.21-150500.55.124.1 * kernel-64kb-debugsource-5.14.21-150500.55.124.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.124.1 * dtb-freescale-5.14.21-150500.55.124.1 * dtb-renesas-5.14.21-150500.55.124.1 * dtb-arm-5.14.21-150500.55.124.1 * dtb-mediatek-5.14.21-150500.55.124.1 * dtb-sprd-5.14.21-150500.55.124.1 * kernel-64kb-devel-5.14.21-150500.55.124.1 * gfs2-kmp-64kb-5.14.21-150500.55.124.1 * dtb-hisilicon-5.14.21-150500.55.124.1 * reiserfs-kmp-64kb-5.14.21-150500.55.124.1 * dtb-apple-5.14.21-150500.55.124.1 * dtb-marvell-5.14.21-150500.55.124.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.124.1 * dtb-rockchip-5.14.21-150500.55.124.1 * kernel-64kb-extra-5.14.21-150500.55.124.1 * dtb-lg-5.14.21-150500.55.124.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.124.1 * dtb-nvidia-5.14.21-150500.55.124.1 * dtb-socionext-5.14.21-150500.55.124.1 * cluster-md-kmp-64kb-5.14.21-150500.55.124.1 * dlm-kmp-64kb-5.14.21-150500.55.124.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.124.1 * dtb-apm-5.14.21-150500.55.124.1 * ocfs2-kmp-64kb-5.14.21-150500.55.124.1 * dtb-qcom-5.14.21-150500.55.124.1 * dtb-xilinx-5.14.21-150500.55.124.1 * dtb-amd-5.14.21-150500.55.124.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.124.1 * dtb-allwinner-5.14.21-150500.55.124.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.124.1 * dtb-amazon-5.14.21-150500.55.124.1 * dtb-broadcom-5.14.21-150500.55.124.1 * kernel-64kb-debuginfo-5.14.21-150500.55.124.1 * dtb-exynos-5.14.21-150500.55.124.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.124.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.124.1.150500.6.59.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.124.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-macros-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * cluster-md-kmp-default-5.14.21-150500.55.124.1 * gfs2-kmp-default-5.14.21-150500.55.124.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.124.1 * dlm-kmp-default-5.14.21-150500.55.124.1 * kernel-syms-5.14.21-150500.55.124.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-5.14.21-150500.55.124.1 * kernel-default-base-5.14.21-150500.55.124.1.150500.6.59.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-debugsource-5.14.21-150500.55.124.1 * kernel-default-debugsource-5.14.21-150500.55.124.1 * ocfs2-kmp-default-5.14.21-150500.55.124.1 * kernel-default-devel-5.14.21-150500.55.124.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.124.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.124.1 * kernel-64kb-devel-5.14.21-150500.55.124.1 * kernel-64kb-debugsource-5.14.21-150500.55.124.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * kernel-devel-5.14.21-150500.55.124.1 * kernel-macros-5.14.21-150500.55.124.1 * kernel-source-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * cluster-md-kmp-default-5.14.21-150500.55.124.1 * gfs2-kmp-default-5.14.21-150500.55.124.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.124.1 * dlm-kmp-default-5.14.21-150500.55.124.1 * kernel-syms-5.14.21-150500.55.124.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-5.14.21-150500.55.124.1 * kernel-default-base-5.14.21-150500.55.124.1.150500.6.59.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-debugsource-5.14.21-150500.55.124.1 * kernel-default-debugsource-5.14.21-150500.55.124.1 * ocfs2-kmp-default-5.14.21-150500.55.124.1 * kernel-default-devel-5.14.21-150500.55.124.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.124.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.124.1 * kernel-64kb-devel-5.14.21-150500.55.124.1 * kernel-64kb-debugsource-5.14.21-150500.55.124.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * kernel-devel-5.14.21-150500.55.124.1 * kernel-macros-5.14.21-150500.55.124.1 * kernel-source-5.14.21-150500.55.124.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.124.1 * cluster-md-kmp-default-5.14.21-150500.55.124.1 * gfs2-kmp-default-5.14.21-150500.55.124.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.124.1 * dlm-kmp-default-5.14.21-150500.55.124.1 * kernel-syms-5.14.21-150500.55.124.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.124.1 * reiserfs-kmp-default-5.14.21-150500.55.124.1 * kernel-obs-build-5.14.21-150500.55.124.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-debugsource-5.14.21-150500.55.124.1 * kernel-default-debugsource-5.14.21-150500.55.124.1 * ocfs2-kmp-default-5.14.21-150500.55.124.1 * kernel-default-devel-5.14.21-150500.55.124.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.124.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.124.1 * kernel-64kb-devel-5.14.21-150500.55.124.1 * kernel-64kb-debugsource-5.14.21-150500.55.124.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.124.1.150500.6.59.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * kernel-devel-5.14.21-150500.55.124.1 * kernel-macros-5.14.21-150500.55.124.1 * kernel-source-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) * kernel-docs-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.124.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.124.1 * cluster-md-kmp-default-5.14.21-150500.55.124.1 * gfs2-kmp-default-5.14.21-150500.55.124.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.124.1 * dlm-kmp-default-5.14.21-150500.55.124.1 * kernel-syms-5.14.21-150500.55.124.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.124.1 * reiserfs-kmp-default-5.14.21-150500.55.124.1 * kernel-obs-build-5.14.21-150500.55.124.1 * kernel-default-base-5.14.21-150500.55.124.1.150500.6.59.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * kernel-obs-build-debugsource-5.14.21-150500.55.124.1 * kernel-default-debugsource-5.14.21-150500.55.124.1 * ocfs2-kmp-default-5.14.21-150500.55.124.1 * kernel-default-devel-5.14.21-150500.55.124.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.124.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * kernel-devel-5.14.21-150500.55.124.1 * kernel-macros-5.14.21-150500.55.124.1 * kernel-source-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.124.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_124-default-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.124.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5_Update_31-debugsource-1-150500.11.3.1 * kernel-default-debuginfo-5.14.21-150500.55.124.1 * kernel-default-livepatch-5.14.21-150500.55.124.1 * kernel-default-debugsource-5.14.21-150500.55.124.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2602.html * https://www.suse.com/security/cve/CVE-2022-2978.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-49138.html * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50234.html * https://www.suse.com/security/cve/CVE-2022-50235.html * https://www.suse.com/security/cve/CVE-2022-50239.html * https://www.suse.com/security/cve/CVE-2022-50241.html * https://www.suse.com/security/cve/CVE-2022-50242.html * https://www.suse.com/security/cve/CVE-2022-50246.html * https://www.suse.com/security/cve/CVE-2022-50247.html * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50249.html * https://www.suse.com/security/cve/CVE-2022-50250.html * https://www.suse.com/security/cve/CVE-2022-50251.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2022-50255.html * https://www.suse.com/security/cve/CVE-2022-50257.html * https://www.suse.com/security/cve/CVE-2022-50258.html * https://www.suse.com/security/cve/CVE-2022-50260.html * https://www.suse.com/security/cve/CVE-2022-50261.html * https://www.suse.com/security/cve/CVE-2022-50264.html * https://www.suse.com/security/cve/CVE-2022-50266.html * https://www.suse.com/security/cve/CVE-2022-50267.html * https://www.suse.com/security/cve/CVE-2022-50268.html * https://www.suse.com/security/cve/CVE-2022-50269.html * https://www.suse.com/security/cve/CVE-2022-50271.html * https://www.suse.com/security/cve/CVE-2022-50272.html * https://www.suse.com/security/cve/CVE-2022-50275.html * https://www.suse.com/security/cve/CVE-2022-50276.html * https://www.suse.com/security/cve/CVE-2022-50277.html * https://www.suse.com/security/cve/CVE-2022-50278.html * https://www.suse.com/security/cve/CVE-2022-50279.html * https://www.suse.com/security/cve/CVE-2022-50282.html * https://www.suse.com/security/cve/CVE-2022-50286.html * https://www.suse.com/security/cve/CVE-2022-50287.html * https://www.suse.com/security/cve/CVE-2022-50288.html * https://www.suse.com/security/cve/CVE-2022-50289.html * https://www.suse.com/security/cve/CVE-2022-50292.html * https://www.suse.com/security/cve/CVE-2022-50294.html * https://www.suse.com/security/cve/CVE-2022-50297.html * https://www.suse.com/security/cve/CVE-2022-50298.html * https://www.suse.com/security/cve/CVE-2022-50299.html * https://www.suse.com/security/cve/CVE-2022-50301.html * https://www.suse.com/security/cve/CVE-2022-50303.html * https://www.suse.com/security/cve/CVE-2022-50308.html * https://www.suse.com/security/cve/CVE-2022-50309.html * https://www.suse.com/security/cve/CVE-2022-50312.html * https://www.suse.com/security/cve/CVE-2022-50317.html * https://www.suse.com/security/cve/CVE-2022-50318.html * https://www.suse.com/security/cve/CVE-2022-50320.html * https://www.suse.com/security/cve/CVE-2022-50321.html * https://www.suse.com/security/cve/CVE-2022-50323.html * https://www.suse.com/security/cve/CVE-2022-50324.html * https://www.suse.com/security/cve/CVE-2022-50325.html * https://www.suse.com/security/cve/CVE-2022-50328.html * https://www.suse.com/security/cve/CVE-2022-50329.html * https://www.suse.com/security/cve/CVE-2022-50330.html * https://www.suse.com/security/cve/CVE-2022-50331.html * https://www.suse.com/security/cve/CVE-2022-50333.html * https://www.suse.com/security/cve/CVE-2022-50339.html * https://www.suse.com/security/cve/CVE-2022-50340.html * https://www.suse.com/security/cve/CVE-2022-50342.html * https://www.suse.com/security/cve/CVE-2022-50344.html * https://www.suse.com/security/cve/CVE-2022-50346.html * https://www.suse.com/security/cve/CVE-2022-50347.html * https://www.suse.com/security/cve/CVE-2022-50348.html * https://www.suse.com/security/cve/CVE-2022-50349.html * https://www.suse.com/security/cve/CVE-2022-50351.html * https://www.suse.com/security/cve/CVE-2022-50353.html * https://www.suse.com/security/cve/CVE-2022-50354.html * https://www.suse.com/security/cve/CVE-2022-50355.html * https://www.suse.com/security/cve/CVE-2022-50356.html * https://www.suse.com/security/cve/CVE-2022-50357.html * https://www.suse.com/security/cve/CVE-2022-50358.html * https://www.suse.com/security/cve/CVE-2022-50359.html * https://www.suse.com/security/cve/CVE-2022-50360.html * https://www.suse.com/security/cve/CVE-2022-50362.html * https://www.suse.com/security/cve/CVE-2022-50364.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2022-50368.html * https://www.suse.com/security/cve/CVE-2022-50369.html * https://www.suse.com/security/cve/CVE-2022-50370.html * https://www.suse.com/security/cve/CVE-2022-50372.html * https://www.suse.com/security/cve/CVE-2022-50373.html * https://www.suse.com/security/cve/CVE-2022-50374.html * https://www.suse.com/security/cve/CVE-2022-50375.html * https://www.suse.com/security/cve/CVE-2022-50376.html * https://www.suse.com/security/cve/CVE-2022-50378.html * https://www.suse.com/security/cve/CVE-2022-50379.html * https://www.suse.com/security/cve/CVE-2022-50381.html * https://www.suse.com/security/cve/CVE-2022-50385.html * https://www.suse.com/security/cve/CVE-2022-50386.html * https://www.suse.com/security/cve/CVE-2022-50388.html * https://www.suse.com/security/cve/CVE-2022-50389.html * https://www.suse.com/security/cve/CVE-2022-50390.html * https://www.suse.com/security/cve/CVE-2022-50391.html * https://www.suse.com/security/cve/CVE-2022-50392.html * https://www.suse.com/security/cve/CVE-2022-50393.html * https://www.suse.com/security/cve/CVE-2022-50394.html * https://www.suse.com/security/cve/CVE-2022-50395.html * https://www.suse.com/security/cve/CVE-2022-50396.html * https://www.suse.com/security/cve/CVE-2022-50398.html * https://www.suse.com/security/cve/CVE-2022-50399.html * https://www.suse.com/security/cve/CVE-2022-50401.html * https://www.suse.com/security/cve/CVE-2022-50402.html * https://www.suse.com/security/cve/CVE-2022-50404.html * https://www.suse.com/security/cve/CVE-2022-50406.html * https://www.suse.com/security/cve/CVE-2022-50408.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50410.html * https://www.suse.com/security/cve/CVE-2022-50411.html * https://www.suse.com/security/cve/CVE-2022-50412.html * https://www.suse.com/security/cve/CVE-2022-50414.html * https://www.suse.com/security/cve/CVE-2022-50417.html * https://www.suse.com/security/cve/CVE-2022-50418.html * https://www.suse.com/security/cve/CVE-2022-50419.html * https://www.suse.com/security/cve/CVE-2022-50422.html * https://www.suse.com/security/cve/CVE-2022-50423.html * https://www.suse.com/security/cve/CVE-2022-50425.html * https://www.suse.com/security/cve/CVE-2022-50427.html * https://www.suse.com/security/cve/CVE-2022-50428.html * https://www.suse.com/security/cve/CVE-2022-50429.html * https://www.suse.com/security/cve/CVE-2022-50430.html * https://www.suse.com/security/cve/CVE-2022-50431.html * https://www.suse.com/security/cve/CVE-2022-50432.html * https://www.suse.com/security/cve/CVE-2022-50433.html * https://www.suse.com/security/cve/CVE-2022-50434.html * https://www.suse.com/security/cve/CVE-2022-50435.html * https://www.suse.com/security/cve/CVE-2022-50436.html * https://www.suse.com/security/cve/CVE-2022-50437.html * https://www.suse.com/security/cve/CVE-2022-50439.html * https://www.suse.com/security/cve/CVE-2022-50440.html * https://www.suse.com/security/cve/CVE-2022-50441.html * https://www.suse.com/security/cve/CVE-2022-50443.html * https://www.suse.com/security/cve/CVE-2022-50444.html * https://www.suse.com/security/cve/CVE-2022-50447.html * https://www.suse.com/security/cve/CVE-2022-50449.html * https://www.suse.com/security/cve/CVE-2022-50452.html * https://www.suse.com/security/cve/CVE-2022-50453.html * https://www.suse.com/security/cve/CVE-2022-50454.html * https://www.suse.com/security/cve/CVE-2022-50456.html * https://www.suse.com/security/cve/CVE-2022-50458.html * https://www.suse.com/security/cve/CVE-2022-50459.html * https://www.suse.com/security/cve/CVE-2022-50460.html * https://www.suse.com/security/cve/CVE-2022-50464.html * https://www.suse.com/security/cve/CVE-2022-50465.html * https://www.suse.com/security/cve/CVE-2022-50466.html * https://www.suse.com/security/cve/CVE-2022-50467.html * https://www.suse.com/security/cve/CVE-2022-50468.html * https://www.suse.com/security/cve/CVE-2022-50469.html * https://www.suse.com/security/cve/CVE-2023-1380.html * https://www.suse.com/security/cve/CVE-2023-28328.html * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53149.html * https://www.suse.com/security/cve/CVE-2023-53150.html * https://www.suse.com/security/cve/CVE-2023-53151.html * https://www.suse.com/security/cve/CVE-2023-53152.html * https://www.suse.com/security/cve/CVE-2023-53153.html * https://www.suse.com/security/cve/CVE-2023-53165.html * https://www.suse.com/security/cve/CVE-2023-53167.html * https://www.suse.com/security/cve/CVE-2023-53168.html * https://www.suse.com/security/cve/CVE-2023-53171.html * https://www.suse.com/security/cve/CVE-2023-53174.html * https://www.suse.com/security/cve/CVE-2023-53176.html * https://www.suse.com/security/cve/CVE-2023-53178.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53181.html * https://www.suse.com/security/cve/CVE-2023-53182.html * https://www.suse.com/security/cve/CVE-2023-53185.html * https://www.suse.com/security/cve/CVE-2023-53189.html * https://www.suse.com/security/cve/CVE-2023-53193.html * https://www.suse.com/security/cve/CVE-2023-53196.html * https://www.suse.com/security/cve/CVE-2023-53197.html * https://www.suse.com/security/cve/CVE-2023-53199.html * https://www.suse.com/security/cve/CVE-2023-53201.html * https://www.suse.com/security/cve/CVE-2023-53205.html * https://www.suse.com/security/cve/CVE-2023-53210.html * https://www.suse.com/security/cve/CVE-2023-53213.html * https://www.suse.com/security/cve/CVE-2023-53215.html * https://www.suse.com/security/cve/CVE-2023-53216.html * https://www.suse.com/security/cve/CVE-2023-53219.html * https://www.suse.com/security/cve/CVE-2023-53222.html * https://www.suse.com/security/cve/CVE-2023-53223.html * https://www.suse.com/security/cve/CVE-2023-53226.html * https://www.suse.com/security/cve/CVE-2023-53229.html * https://www.suse.com/security/cve/CVE-2023-53230.html * https://www.suse.com/security/cve/CVE-2023-53232.html * https://www.suse.com/security/cve/CVE-2023-53234.html * https://www.suse.com/security/cve/CVE-2023-53237.html * https://www.suse.com/security/cve/CVE-2023-53238.html * https://www.suse.com/security/cve/CVE-2023-53239.html * https://www.suse.com/security/cve/CVE-2023-53241.html * https://www.suse.com/security/cve/CVE-2023-53242.html * https://www.suse.com/security/cve/CVE-2023-53244.html * https://www.suse.com/security/cve/CVE-2023-53245.html * https://www.suse.com/security/cve/CVE-2023-53246.html * https://www.suse.com/security/cve/CVE-2023-53249.html * https://www.suse.com/security/cve/CVE-2023-53250.html * https://www.suse.com/security/cve/CVE-2023-53251.html * https://www.suse.com/security/cve/CVE-2023-53252.html * https://www.suse.com/security/cve/CVE-2023-53255.html * https://www.suse.com/security/cve/CVE-2023-53257.html * https://www.suse.com/security/cve/CVE-2023-53258.html * https://www.suse.com/security/cve/CVE-2023-53259.html * https://www.suse.com/security/cve/CVE-2023-53263.html * https://www.suse.com/security/cve/CVE-2023-53265.html * https://www.suse.com/security/cve/CVE-2023-53268.html * https://www.suse.com/security/cve/CVE-2023-53270.html * https://www.suse.com/security/cve/CVE-2023-53272.html * https://www.suse.com/security/cve/CVE-2023-53273.html * https://www.suse.com/security/cve/CVE-2023-53275.html * https://www.suse.com/security/cve/CVE-2023-53276.html * https://www.suse.com/security/cve/CVE-2023-53277.html * https://www.suse.com/security/cve/CVE-2023-53280.html * https://www.suse.com/security/cve/CVE-2023-53281.html * https://www.suse.com/security/cve/CVE-2023-53282.html * https://www.suse.com/security/cve/CVE-2023-53284.html * https://www.suse.com/security/cve/CVE-2023-53286.html * https://www.suse.com/security/cve/CVE-2023-53287.html * https://www.suse.com/security/cve/CVE-2023-53288.html * https://www.suse.com/security/cve/CVE-2023-53295.html * https://www.suse.com/security/cve/CVE-2023-53297.html * https://www.suse.com/security/cve/CVE-2023-53298.html * https://www.suse.com/security/cve/CVE-2023-53299.html * https://www.suse.com/security/cve/CVE-2023-53302.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53305.html * https://www.suse.com/security/cve/CVE-2023-53309.html * https://www.suse.com/security/cve/CVE-2023-53311.html * https://www.suse.com/security/cve/CVE-2023-53313.html * https://www.suse.com/security/cve/CVE-2023-53314.html * https://www.suse.com/security/cve/CVE-2023-53315.html * https://www.suse.com/security/cve/CVE-2023-53316.html * https://www.suse.com/security/cve/CVE-2023-53317.html * https://www.suse.com/security/cve/CVE-2023-53320.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53324.html * https://www.suse.com/security/cve/CVE-2023-53326.html * https://www.suse.com/security/cve/CVE-2023-53330.html * https://www.suse.com/security/cve/CVE-2023-53331.html * https://www.suse.com/security/cve/CVE-2023-53332.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53334.html * https://www.suse.com/security/cve/CVE-2023-53335.html * https://www.suse.com/security/cve/CVE-2023-53337.html * https://www.suse.com/security/cve/CVE-2023-53340.html * https://www.suse.com/security/cve/CVE-2023-53344.html * https://www.suse.com/security/cve/CVE-2023-53347.html * https://www.suse.com/security/cve/CVE-2023-53349.html * https://www.suse.com/security/cve/CVE-2023-53352.html * https://www.suse.com/security/cve/CVE-2023-53356.html * https://www.suse.com/security/cve/CVE-2023-53357.html * https://www.suse.com/security/cve/CVE-2023-53359.html * https://www.suse.com/security/cve/CVE-2023-53368.html * https://www.suse.com/security/cve/CVE-2023-53370.html * https://www.suse.com/security/cve/CVE-2023-53371.html * https://www.suse.com/security/cve/CVE-2023-53373.html * https://www.suse.com/security/cve/CVE-2023-53375.html * https://www.suse.com/security/cve/CVE-2023-53377.html * https://www.suse.com/security/cve/CVE-2023-53378.html * https://www.suse.com/security/cve/CVE-2023-53379.html * https://www.suse.com/security/cve/CVE-2023-53380.html * https://www.suse.com/security/cve/CVE-2023-53381.html * https://www.suse.com/security/cve/CVE-2023-53383.html * https://www.suse.com/security/cve/CVE-2023-53384.html * https://www.suse.com/security/cve/CVE-2023-53386.html * https://www.suse.com/security/cve/CVE-2023-53388.html * https://www.suse.com/security/cve/CVE-2023-53390.html * https://www.suse.com/security/cve/CVE-2023-53391.html * https://www.suse.com/security/cve/CVE-2023-53393.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53396.html * https://www.suse.com/security/cve/CVE-2023-53398.html * https://www.suse.com/security/cve/CVE-2023-53400.html * https://www.suse.com/security/cve/CVE-2023-53404.html * https://www.suse.com/security/cve/CVE-2023-53405.html * https://www.suse.com/security/cve/CVE-2023-53406.html * https://www.suse.com/security/cve/CVE-2023-53409.html * https://www.suse.com/security/cve/CVE-2023-53413.html * https://www.suse.com/security/cve/CVE-2023-53414.html * https://www.suse.com/security/cve/CVE-2023-53415.html * https://www.suse.com/security/cve/CVE-2023-53416.html * https://www.suse.com/security/cve/CVE-2023-53422.html * https://www.suse.com/security/cve/CVE-2023-53427.html * https://www.suse.com/security/cve/CVE-2023-53431.html * https://www.suse.com/security/cve/CVE-2023-53435.html * https://www.suse.com/security/cve/CVE-2023-53436.html * https://www.suse.com/security/cve/CVE-2023-53437.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53440.html * https://www.suse.com/security/cve/CVE-2023-53442.html * https://www.suse.com/security/cve/CVE-2023-53443.html * https://www.suse.com/security/cve/CVE-2023-53444.html * https://www.suse.com/security/cve/CVE-2023-53446.html * https://www.suse.com/security/cve/CVE-2023-53448.html * https://www.suse.com/security/cve/CVE-2023-53449.html * https://www.suse.com/security/cve/CVE-2023-53451.html * https://www.suse.com/security/cve/CVE-2023-53452.html * https://www.suse.com/security/cve/CVE-2023-53453.html * https://www.suse.com/security/cve/CVE-2023-53454.html * https://www.suse.com/security/cve/CVE-2023-53456.html * https://www.suse.com/security/cve/CVE-2023-53457.html * https://www.suse.com/security/cve/CVE-2023-53458.html * https://www.suse.com/security/cve/CVE-2023-53463.html * https://www.suse.com/security/cve/CVE-2023-53464.html * https://www.suse.com/security/cve/CVE-2023-53465.html * https://www.suse.com/security/cve/CVE-2023-53466.html * https://www.suse.com/security/cve/CVE-2023-53468.html * https://www.suse.com/security/cve/CVE-2023-53471.html * https://www.suse.com/security/cve/CVE-2023-53472.html * https://www.suse.com/security/cve/CVE-2023-53473.html * https://www.suse.com/security/cve/CVE-2023-53474.html * https://www.suse.com/security/cve/CVE-2023-53475.html * https://www.suse.com/security/cve/CVE-2023-53476.html * https://www.suse.com/security/cve/CVE-2023-53480.html * https://www.suse.com/security/cve/CVE-2023-53482.html * https://www.suse.com/security/cve/CVE-2023-53485.html * https://www.suse.com/security/cve/CVE-2023-53487.html * https://www.suse.com/security/cve/CVE-2023-53488.html * https://www.suse.com/security/cve/CVE-2023-53489.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2023-53494.html * https://www.suse.com/security/cve/CVE-2023-53496.html * https://www.suse.com/security/cve/CVE-2023-53498.html * https://www.suse.com/security/cve/CVE-2023-53499.html * https://www.suse.com/security/cve/CVE-2023-53505.html * https://www.suse.com/security/cve/CVE-2023-53506.html * https://www.suse.com/security/cve/CVE-2023-53509.html * https://www.suse.com/security/cve/CVE-2023-53511.html * https://www.suse.com/security/cve/CVE-2023-53512.html * https://www.suse.com/security/cve/CVE-2023-53515.html * https://www.suse.com/security/cve/CVE-2023-53518.html * https://www.suse.com/security/cve/CVE-2023-53519.html * https://www.suse.com/security/cve/CVE-2023-53521.html * https://www.suse.com/security/cve/CVE-2023-53524.html * https://www.suse.com/security/cve/CVE-2023-53525.html * https://www.suse.com/security/cve/CVE-2023-53526.html * https://www.suse.com/security/cve/CVE-2023-53530.html * https://www.suse.com/security/cve/CVE-2023-53531.html * https://www.suse.com/security/cve/CVE-2023-53532.html * https://www.suse.com/security/cve/CVE-2024-26583.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-37738.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-38014.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1164051 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1202700 * https://bugzilla.suse.com/show_bug.cgi?id=1203063 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1204228 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1206451 * https://bugzilla.suse.com/show_bug.cgi?id=1206456 * https://bugzilla.suse.com/show_bug.cgi?id=1206468 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1207158 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207621 * https://bugzilla.suse.com/show_bug.cgi?id=1207624 * https://bugzilla.suse.com/show_bug.cgi?id=1207625 * https://bugzilla.suse.com/show_bug.cgi?id=1207628 * https://bugzilla.suse.com/show_bug.cgi?id=1207629 * https://bugzilla.suse.com/show_bug.cgi?id=1207631 * https://bugzilla.suse.com/show_bug.cgi?id=1207645 * https://bugzilla.suse.com/show_bug.cgi?id=1207651 * https://bugzilla.suse.com/show_bug.cgi?id=1208607 * https://bugzilla.suse.com/show_bug.cgi?id=1209287 * https://bugzilla.suse.com/show_bug.cgi?id=1209291 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210584 * https://bugzilla.suse.com/show_bug.cgi?id=1211960 * https://bugzilla.suse.com/show_bug.cgi?id=1212603 * https://bugzilla.suse.com/show_bug.cgi?id=1213015 * https://bugzilla.suse.com/show_bug.cgi?id=1213016 * https://bugzilla.suse.com/show_bug.cgi?id=1213040 * https://bugzilla.suse.com/show_bug.cgi?id=1213041 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213099 * https://bugzilla.suse.com/show_bug.cgi?id=1213104 * https://bugzilla.suse.com/show_bug.cgi?id=1213533 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1214073 * https://bugzilla.suse.com/show_bug.cgi?id=1214953 * https://bugzilla.suse.com/show_bug.cgi?id=1214967 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215911 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1220185 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1223959 * https://bugzilla.suse.com/show_bug.cgi?id=1234639 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1237449 * https://bugzilla.suse.com/show_bug.cgi?id=1238160 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1242846 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1244337 * https://bugzilla.suse.com/show_bug.cgi?id=1244732 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1246879 * https://bugzilla.suse.com/show_bug.cgi?id=1246968 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247172 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249158 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249638 * https://bugzilla.suse.com/show_bug.cgi?id=1249639 * https://bugzilla.suse.com/show_bug.cgi?id=1249641 * https://bugzilla.suse.com/show_bug.cgi?id=1249642 * https://bugzilla.suse.com/show_bug.cgi?id=1249648 * https://bugzilla.suse.com/show_bug.cgi?id=1249650 * https://bugzilla.suse.com/show_bug.cgi?id=1249651 * https://bugzilla.suse.com/show_bug.cgi?id=1249658 * https://bugzilla.suse.com/show_bug.cgi?id=1249661 * https://bugzilla.suse.com/show_bug.cgi?id=1249664 * https://bugzilla.suse.com/show_bug.cgi?id=1249667 * https://bugzilla.suse.com/show_bug.cgi?id=1249669 * https://bugzilla.suse.com/show_bug.cgi?id=1249673 * https://bugzilla.suse.com/show_bug.cgi?id=1249677 * https://bugzilla.suse.com/show_bug.cgi?id=1249681 * https://bugzilla.suse.com/show_bug.cgi?id=1249683 * https://bugzilla.suse.com/show_bug.cgi?id=1249685 * https://bugzilla.suse.com/show_bug.cgi?id=1249687 * https://bugzilla.suse.com/show_bug.cgi?id=1249695 * https://bugzilla.suse.com/show_bug.cgi?id=1249696 * https://bugzilla.suse.com/show_bug.cgi?id=1249699 * https://bugzilla.suse.com/show_bug.cgi?id=1249700 * https://bugzilla.suse.com/show_bug.cgi?id=1249701 * https://bugzilla.suse.com/show_bug.cgi?id=1249704 * https://bugzilla.suse.com/show_bug.cgi?id=1249705 * https://bugzilla.suse.com/show_bug.cgi?id=1249706 * https://bugzilla.suse.com/show_bug.cgi?id=1249707 * https://bugzilla.suse.com/show_bug.cgi?id=1249708 * https://bugzilla.suse.com/show_bug.cgi?id=1249709 * https://bugzilla.suse.com/show_bug.cgi?id=1249712 * https://bugzilla.suse.com/show_bug.cgi?id=1249713 * https://bugzilla.suse.com/show_bug.cgi?id=1249715 * https://bugzilla.suse.com/show_bug.cgi?id=1249716 * https://bugzilla.suse.com/show_bug.cgi?id=1249718 * https://bugzilla.suse.com/show_bug.cgi?id=1249722 * https://bugzilla.suse.com/show_bug.cgi?id=1249727 * https://bugzilla.suse.com/show_bug.cgi?id=1249730 * https://bugzilla.suse.com/show_bug.cgi?id=1249733 * https://bugzilla.suse.com/show_bug.cgi?id=1249734 * https://bugzilla.suse.com/show_bug.cgi?id=1249739 * https://bugzilla.suse.com/show_bug.cgi?id=1249740 * https://bugzilla.suse.com/show_bug.cgi?id=1249741 * https://bugzilla.suse.com/show_bug.cgi?id=1249742 * https://bugzilla.suse.com/show_bug.cgi?id=1249743 * https://bugzilla.suse.com/show_bug.cgi?id=1249745 * https://bugzilla.suse.com/show_bug.cgi?id=1249746 * https://bugzilla.suse.com/show_bug.cgi?id=1249747 * https://bugzilla.suse.com/show_bug.cgi?id=1249749 * https://bugzilla.suse.com/show_bug.cgi?id=1249750 * https://bugzilla.suse.com/show_bug.cgi?id=1249751 * https://bugzilla.suse.com/show_bug.cgi?id=1249753 * https://bugzilla.suse.com/show_bug.cgi?id=1249756 * https://bugzilla.suse.com/show_bug.cgi?id=1249757 * https://bugzilla.suse.com/show_bug.cgi?id=1249758 * https://bugzilla.suse.com/show_bug.cgi?id=1249762 * https://bugzilla.suse.com/show_bug.cgi?id=1249767 * https://bugzilla.suse.com/show_bug.cgi?id=1249777 * https://bugzilla.suse.com/show_bug.cgi?id=1249780 * https://bugzilla.suse.com/show_bug.cgi?id=1249781 * https://bugzilla.suse.com/show_bug.cgi?id=1249782 * https://bugzilla.suse.com/show_bug.cgi?id=1249784 * https://bugzilla.suse.com/show_bug.cgi?id=1249791 * https://bugzilla.suse.com/show_bug.cgi?id=1249799 * https://bugzilla.suse.com/show_bug.cgi?id=1249800 * https://bugzilla.suse.com/show_bug.cgi?id=1249802 * https://bugzilla.suse.com/show_bug.cgi?id=1249808 * https://bugzilla.suse.com/show_bug.cgi?id=1249810 * https://bugzilla.suse.com/show_bug.cgi?id=1249816 * https://bugzilla.suse.com/show_bug.cgi?id=1249820 * https://bugzilla.suse.com/show_bug.cgi?id=1249824 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249827 * https://bugzilla.suse.com/show_bug.cgi?id=1249836 * https://bugzilla.suse.com/show_bug.cgi?id=1249840 * https://bugzilla.suse.com/show_bug.cgi?id=1249844 * https://bugzilla.suse.com/show_bug.cgi?id=1249846 * https://bugzilla.suse.com/show_bug.cgi?id=1249853 * https://bugzilla.suse.com/show_bug.cgi?id=1249858 * https://bugzilla.suse.com/show_bug.cgi?id=1249860 * https://bugzilla.suse.com/show_bug.cgi?id=1249861 * https://bugzilla.suse.com/show_bug.cgi?id=1249864 * https://bugzilla.suse.com/show_bug.cgi?id=1249865 * https://bugzilla.suse.com/show_bug.cgi?id=1249866 * https://bugzilla.suse.com/show_bug.cgi?id=1249867 * https://bugzilla.suse.com/show_bug.cgi?id=1249868 * https://bugzilla.suse.com/show_bug.cgi?id=1249869 * https://bugzilla.suse.com/show_bug.cgi?id=1249872 * https://bugzilla.suse.com/show_bug.cgi?id=1249874 * https://bugzilla.suse.com/show_bug.cgi?id=1249877 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249882 * https://bugzilla.suse.com/show_bug.cgi?id=1249883 * https://bugzilla.suse.com/show_bug.cgi?id=1249884 * https://bugzilla.suse.com/show_bug.cgi?id=1249885 * https://bugzilla.suse.com/show_bug.cgi?id=1249890 * https://bugzilla.suse.com/show_bug.cgi?id=1249892 * https://bugzilla.suse.com/show_bug.cgi?id=1249894 * https://bugzilla.suse.com/show_bug.cgi?id=1249908 * https://bugzilla.suse.com/show_bug.cgi?id=1249910 * https://bugzilla.suse.com/show_bug.cgi?id=1249911 * https://bugzilla.suse.com/show_bug.cgi?id=1249913 * https://bugzilla.suse.com/show_bug.cgi?id=1249914 * https://bugzilla.suse.com/show_bug.cgi?id=1249917 * https://bugzilla.suse.com/show_bug.cgi?id=1249918 * https://bugzilla.suse.com/show_bug.cgi?id=1249920 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249924 * https://bugzilla.suse.com/show_bug.cgi?id=1249925 * https://bugzilla.suse.com/show_bug.cgi?id=1249927 * https://bugzilla.suse.com/show_bug.cgi?id=1249928 * https://bugzilla.suse.com/show_bug.cgi?id=1249930 * https://bugzilla.suse.com/show_bug.cgi?id=1249933 * https://bugzilla.suse.com/show_bug.cgi?id=1249934 * https://bugzilla.suse.com/show_bug.cgi?id=1249936 * https://bugzilla.suse.com/show_bug.cgi?id=1249938 * https://bugzilla.suse.com/show_bug.cgi?id=1249939 * https://bugzilla.suse.com/show_bug.cgi?id=1249940 * https://bugzilla.suse.com/show_bug.cgi?id=1249944 * https://bugzilla.suse.com/show_bug.cgi?id=1249947 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1249950 * https://bugzilla.suse.com/show_bug.cgi?id=1249951 * https://bugzilla.suse.com/show_bug.cgi?id=1249954 * https://bugzilla.suse.com/show_bug.cgi?id=1249958 * https://bugzilla.suse.com/show_bug.cgi?id=1249979 * https://bugzilla.suse.com/show_bug.cgi?id=1249981 * https://bugzilla.suse.com/show_bug.cgi?id=1249991 * https://bugzilla.suse.com/show_bug.cgi?id=1249994 * https://bugzilla.suse.com/show_bug.cgi?id=1249997 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250006 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250009 * https://bugzilla.suse.com/show_bug.cgi?id=1250010 * https://bugzilla.suse.com/show_bug.cgi?id=1250011 * https://bugzilla.suse.com/show_bug.cgi?id=1250014 * https://bugzilla.suse.com/show_bug.cgi?id=1250015 * https://bugzilla.suse.com/show_bug.cgi?id=1250017 * https://bugzilla.suse.com/show_bug.cgi?id=1250023 * https://bugzilla.suse.com/show_bug.cgi?id=1250024 * https://bugzilla.suse.com/show_bug.cgi?id=1250026 * https://bugzilla.suse.com/show_bug.cgi?id=1250037 * https://bugzilla.suse.com/show_bug.cgi?id=1250039 * https://bugzilla.suse.com/show_bug.cgi?id=1250040 * https://bugzilla.suse.com/show_bug.cgi?id=1250041 * https://bugzilla.suse.com/show_bug.cgi?id=1250042 * https://bugzilla.suse.com/show_bug.cgi?id=1250044 * https://bugzilla.suse.com/show_bug.cgi?id=1250047 * https://bugzilla.suse.com/show_bug.cgi?id=1250049 * https://bugzilla.suse.com/show_bug.cgi?id=1250052 * https://bugzilla.suse.com/show_bug.cgi?id=1250055 * https://bugzilla.suse.com/show_bug.cgi?id=1250058 * https://bugzilla.suse.com/show_bug.cgi?id=1250060 * https://bugzilla.suse.com/show_bug.cgi?id=1250062 * https://bugzilla.suse.com/show_bug.cgi?id=1250065 * https://bugzilla.suse.com/show_bug.cgi?id=1250066 * https://bugzilla.suse.com/show_bug.cgi?id=1250068 * https://bugzilla.suse.com/show_bug.cgi?id=1250070 * https://bugzilla.suse.com/show_bug.cgi?id=1250071 * https://bugzilla.suse.com/show_bug.cgi?id=1250072 * https://bugzilla.suse.com/show_bug.cgi?id=1250075 * https://bugzilla.suse.com/show_bug.cgi?id=1250077 * https://bugzilla.suse.com/show_bug.cgi?id=1250080 * https://bugzilla.suse.com/show_bug.cgi?id=1250081 * https://bugzilla.suse.com/show_bug.cgi?id=1250083 * https://bugzilla.suse.com/show_bug.cgi?id=1250089 * https://bugzilla.suse.com/show_bug.cgi?id=1250103 * https://bugzilla.suse.com/show_bug.cgi?id=1250104 * https://bugzilla.suse.com/show_bug.cgi?id=1250105 * https://bugzilla.suse.com/show_bug.cgi?id=1250106 * https://bugzilla.suse.com/show_bug.cgi?id=1250107 * https://bugzilla.suse.com/show_bug.cgi?id=1250108 * https://bugzilla.suse.com/show_bug.cgi?id=1250112 * https://bugzilla.suse.com/show_bug.cgi?id=1250114 * https://bugzilla.suse.com/show_bug.cgi?id=1250117 * https://bugzilla.suse.com/show_bug.cgi?id=1250118 * https://bugzilla.suse.com/show_bug.cgi?id=1250121 * https://bugzilla.suse.com/show_bug.cgi?id=1250127 * https://bugzilla.suse.com/show_bug.cgi?id=1250128 * https://bugzilla.suse.com/show_bug.cgi?id=1250130 * https://bugzilla.suse.com/show_bug.cgi?id=1250131 * https://bugzilla.suse.com/show_bug.cgi?id=1250132 * https://bugzilla.suse.com/show_bug.cgi?id=1250134 * https://bugzilla.suse.com/show_bug.cgi?id=1250137 * https://bugzilla.suse.com/show_bug.cgi?id=1250138 * https://bugzilla.suse.com/show_bug.cgi?id=1250140 * https://bugzilla.suse.com/show_bug.cgi?id=1250144 * https://bugzilla.suse.com/show_bug.cgi?id=1250145 * https://bugzilla.suse.com/show_bug.cgi?id=1250151 * https://bugzilla.suse.com/show_bug.cgi?id=1250153 * https://bugzilla.suse.com/show_bug.cgi?id=1250156 * https://bugzilla.suse.com/show_bug.cgi?id=1250157 * https://bugzilla.suse.com/show_bug.cgi?id=1250159 * https://bugzilla.suse.com/show_bug.cgi?id=1250161 * https://bugzilla.suse.com/show_bug.cgi?id=1250165 * https://bugzilla.suse.com/show_bug.cgi?id=1250168 * https://bugzilla.suse.com/show_bug.cgi?id=1250178 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250181 * https://bugzilla.suse.com/show_bug.cgi?id=1250182 * https://bugzilla.suse.com/show_bug.cgi?id=1250183 * https://bugzilla.suse.com/show_bug.cgi?id=1250184 * https://bugzilla.suse.com/show_bug.cgi?id=1250187 * https://bugzilla.suse.com/show_bug.cgi?id=1250189 * https://bugzilla.suse.com/show_bug.cgi?id=1250191 * https://bugzilla.suse.com/show_bug.cgi?id=1250197 * https://bugzilla.suse.com/show_bug.cgi?id=1250198 * https://bugzilla.suse.com/show_bug.cgi?id=1250200 * https://bugzilla.suse.com/show_bug.cgi?id=1250201 * https://bugzilla.suse.com/show_bug.cgi?id=1250208 * https://bugzilla.suse.com/show_bug.cgi?id=1250209 * https://bugzilla.suse.com/show_bug.cgi?id=1250211 * https://bugzilla.suse.com/show_bug.cgi?id=1250215 * https://bugzilla.suse.com/show_bug.cgi?id=1250245 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250250 * https://bugzilla.suse.com/show_bug.cgi?id=1250257 * https://bugzilla.suse.com/show_bug.cgi?id=1250264 * https://bugzilla.suse.com/show_bug.cgi?id=1250269 * https://bugzilla.suse.com/show_bug.cgi?id=1250277 * https://bugzilla.suse.com/show_bug.cgi?id=1250278 * https://bugzilla.suse.com/show_bug.cgi?id=1250285 * https://bugzilla.suse.com/show_bug.cgi?id=1250287 * https://bugzilla.suse.com/show_bug.cgi?id=1250293 * https://bugzilla.suse.com/show_bug.cgi?id=1250301 * https://bugzilla.suse.com/show_bug.cgi?id=1250303 * https://bugzilla.suse.com/show_bug.cgi?id=1250306 * https://bugzilla.suse.com/show_bug.cgi?id=1250309 * https://bugzilla.suse.com/show_bug.cgi?id=1250311 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250315 * https://bugzilla.suse.com/show_bug.cgi?id=1250316 * https://bugzilla.suse.com/show_bug.cgi?id=1250322 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250324 * https://bugzilla.suse.com/show_bug.cgi?id=1250325 * https://bugzilla.suse.com/show_bug.cgi?id=1250327 * https://bugzilla.suse.com/show_bug.cgi?id=1250328 * https://bugzilla.suse.com/show_bug.cgi?id=1250331 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250362 * https://bugzilla.suse.com/show_bug.cgi?id=1250363 * https://bugzilla.suse.com/show_bug.cgi?id=1250370 * https://bugzilla.suse.com/show_bug.cgi?id=1250374 * https://bugzilla.suse.com/show_bug.cgi?id=1250391 * https://bugzilla.suse.com/show_bug.cgi?id=1250392 * https://bugzilla.suse.com/show_bug.cgi?id=1250393 * https://bugzilla.suse.com/show_bug.cgi?id=1250394 * https://bugzilla.suse.com/show_bug.cgi?id=1250395 * https://bugzilla.suse.com/show_bug.cgi?id=1250397 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250412 * https://bugzilla.suse.com/show_bug.cgi?id=1250418 * https://bugzilla.suse.com/show_bug.cgi?id=1250425 * https://bugzilla.suse.com/show_bug.cgi?id=1250428 * https://bugzilla.suse.com/show_bug.cgi?id=1250453 * https://bugzilla.suse.com/show_bug.cgi?id=1250454 * https://bugzilla.suse.com/show_bug.cgi?id=1250457 * https://bugzilla.suse.com/show_bug.cgi?id=1250459 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250759 * https://bugzilla.suse.com/show_bug.cgi?id=1250761 * https://bugzilla.suse.com/show_bug.cgi?id=1250762 * https://bugzilla.suse.com/show_bug.cgi?id=1250763 * https://bugzilla.suse.com/show_bug.cgi?id=1250765 * https://bugzilla.suse.com/show_bug.cgi?id=1250767 * https://bugzilla.suse.com/show_bug.cgi?id=1250768 * https://bugzilla.suse.com/show_bug.cgi?id=1250771 * https://bugzilla.suse.com/show_bug.cgi?id=1250774 * https://bugzilla.suse.com/show_bug.cgi?id=1250781 * https://bugzilla.suse.com/show_bug.cgi?id=1250784 * https://bugzilla.suse.com/show_bug.cgi?id=1250786 * https://bugzilla.suse.com/show_bug.cgi?id=1250787 * https://bugzilla.suse.com/show_bug.cgi?id=1250790 * https://bugzilla.suse.com/show_bug.cgi?id=1250791 * https://bugzilla.suse.com/show_bug.cgi?id=1250792 * https://bugzilla.suse.com/show_bug.cgi?id=1250793 * https://bugzilla.suse.com/show_bug.cgi?id=1250797 * https://bugzilla.suse.com/show_bug.cgi?id=1250799 * https://bugzilla.suse.com/show_bug.cgi?id=1250807 * https://bugzilla.suse.com/show_bug.cgi?id=1250810 * https://bugzilla.suse.com/show_bug.cgi?id=1250811 * https://bugzilla.suse.com/show_bug.cgi?id=1250814 * https://bugzilla.suse.com/show_bug.cgi?id=1250818 * https://bugzilla.suse.com/show_bug.cgi?id=1250819 * https://bugzilla.suse.com/show_bug.cgi?id=1250822 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250824 * https://bugzilla.suse.com/show_bug.cgi?id=1250825 * https://bugzilla.suse.com/show_bug.cgi?id=1250829 * https://bugzilla.suse.com/show_bug.cgi?id=1250830 * https://bugzilla.suse.com/show_bug.cgi?id=1250831 * https://bugzilla.suse.com/show_bug.cgi?id=1250832 * https://bugzilla.suse.com/show_bug.cgi?id=1250839 * https://bugzilla.suse.com/show_bug.cgi?id=1250841 * https://bugzilla.suse.com/show_bug.cgi?id=1250842 * https://bugzilla.suse.com/show_bug.cgi?id=1250843 * https://bugzilla.suse.com/show_bug.cgi?id=1250846 * https://bugzilla.suse.com/show_bug.cgi?id=1250847 * https://bugzilla.suse.com/show_bug.cgi?id=1250848 * https://bugzilla.suse.com/show_bug.cgi?id=1250849 * https://bugzilla.suse.com/show_bug.cgi?id=1250850 * https://bugzilla.suse.com/show_bug.cgi?id=1250851 * https://bugzilla.suse.com/show_bug.cgi?id=1250853 * https://bugzilla.suse.com/show_bug.cgi?id=1250856 * https://bugzilla.suse.com/show_bug.cgi?id=1250861 * https://bugzilla.suse.com/show_bug.cgi?id=1250862 * https://bugzilla.suse.com/show_bug.cgi?id=1250863 * https://bugzilla.suse.com/show_bug.cgi?id=1250864 * https://bugzilla.suse.com/show_bug.cgi?id=1250866 * https://bugzilla.suse.com/show_bug.cgi?id=1250867 * https://bugzilla.suse.com/show_bug.cgi?id=1250868 * https://bugzilla.suse.com/show_bug.cgi?id=1250872 * https://bugzilla.suse.com/show_bug.cgi?id=1250873 * https://bugzilla.suse.com/show_bug.cgi?id=1250874 * https://bugzilla.suse.com/show_bug.cgi?id=1250875 * https://bugzilla.suse.com/show_bug.cgi?id=1250877 * https://bugzilla.suse.com/show_bug.cgi?id=1250879 * https://bugzilla.suse.com/show_bug.cgi?id=1250881 * https://bugzilla.suse.com/show_bug.cgi?id=1250883 * https://bugzilla.suse.com/show_bug.cgi?id=1250887 * https://bugzilla.suse.com/show_bug.cgi?id=1250888 * https://bugzilla.suse.com/show_bug.cgi?id=1250889 * https://bugzilla.suse.com/show_bug.cgi?id=1250890 * https://bugzilla.suse.com/show_bug.cgi?id=1250891 * https://bugzilla.suse.com/show_bug.cgi?id=1250905 * https://bugzilla.suse.com/show_bug.cgi?id=1250913 * https://bugzilla.suse.com/show_bug.cgi?id=1250915 * https://bugzilla.suse.com/show_bug.cgi?id=1250917 * https://bugzilla.suse.com/show_bug.cgi?id=1250923 * https://bugzilla.suse.com/show_bug.cgi?id=1250927 * https://bugzilla.suse.com/show_bug.cgi?id=1250928 * https://bugzilla.suse.com/show_bug.cgi?id=1250931 * https://bugzilla.suse.com/show_bug.cgi?id=1250932 * https://bugzilla.suse.com/show_bug.cgi?id=1250948 * https://bugzilla.suse.com/show_bug.cgi?id=1250949 * https://bugzilla.suse.com/show_bug.cgi?id=1250953 * https://bugzilla.suse.com/show_bug.cgi?id=1250963 * https://bugzilla.suse.com/show_bug.cgi?id=1250964 * https://bugzilla.suse.com/show_bug.cgi?id=1250965 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 16 08:39:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 16 Oct 2025 08:39:24 -0000 Subject: SUSE-SU-2025:03613-1: important: Security update for the Linux Kernel Message-ID: <176060396492.27718.11272325294002333110@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03613-1 Release Date: 2025-10-16T05:47:42Z Rating: important References: * bsc#1202700 * bsc#1203063 * bsc#1203332 * bsc#1204228 * bsc#1205128 * bsc#1206883 * bsc#1206884 * bsc#1209287 * bsc#1209291 * bsc#1210124 * bsc#1210584 * bsc#1213061 * bsc#1213666 * bsc#1215150 * bsc#1216976 * bsc#1220185 * bsc#1220186 * bsc#1240784 * bsc#1241353 * bsc#1243278 * bsc#1244337 * bsc#1245110 * bsc#1245956 * bsc#1246879 * bsc#1246968 * bsc#1247172 * bsc#1247239 * bsc#1248108 * bsc#1248255 * bsc#1248399 * bsc#1248628 * bsc#1248847 * bsc#1249186 * bsc#1249200 * bsc#1249220 * bsc#1249346 * bsc#1249538 * bsc#1249604 * bsc#1249664 * bsc#1249667 * bsc#1249700 * bsc#1249713 * bsc#1249716 * bsc#1249718 * bsc#1249734 * bsc#1249740 * bsc#1249743 * bsc#1249747 * bsc#1249808 * bsc#1249825 * bsc#1249827 * bsc#1249840 * bsc#1249846 * bsc#1249880 * bsc#1249885 * bsc#1249908 * bsc#1249918 * bsc#1249923 * bsc#1249930 * bsc#1249947 * bsc#1249949 * bsc#1250002 * bsc#1250009 * bsc#1250014 * bsc#1250041 * bsc#1250131 * bsc#1250132 * bsc#1250140 * bsc#1250180 * bsc#1250183 * bsc#1250187 * bsc#1250257 * bsc#1250269 * bsc#1250277 * bsc#1250301 * bsc#1250313 * bsc#1250391 * bsc#1250392 * bsc#1250394 * bsc#1250522 * bsc#1250764 * bsc#1250767 * bsc#1250774 * bsc#1250787 * bsc#1250790 * bsc#1250797 * bsc#1250799 * bsc#1250823 * bsc#1250847 * bsc#1250850 * bsc#1250853 * bsc#1250868 * bsc#1250890 * bsc#1250891 Cross-References: * CVE-2021-4460 * CVE-2022-2602 * CVE-2022-2978 * CVE-2022-36280 * CVE-2022-43945 * CVE-2022-49980 * CVE-2022-50233 * CVE-2022-50234 * CVE-2022-50235 * CVE-2022-50248 * CVE-2022-50249 * CVE-2022-50252 * CVE-2022-50257 * CVE-2022-50258 * CVE-2022-50260 * CVE-2022-50271 * CVE-2022-50272 * CVE-2022-50299 * CVE-2022-50309 * CVE-2022-50312 * CVE-2022-50317 * CVE-2022-50330 * CVE-2022-50344 * CVE-2022-50355 * CVE-2022-50359 * CVE-2022-50367 * CVE-2022-50368 * CVE-2022-50375 * CVE-2022-50381 * CVE-2022-50385 * CVE-2022-50386 * CVE-2022-50401 * CVE-2022-50408 * CVE-2022-50409 * CVE-2022-50410 * CVE-2022-50414 * CVE-2022-50419 * CVE-2022-50422 * CVE-2022-50427 * CVE-2022-50431 * CVE-2022-50435 * CVE-2022-50437 * CVE-2022-50440 * CVE-2022-50444 * CVE-2022-50454 * CVE-2022-50458 * CVE-2022-50459 * CVE-2022-50467 * CVE-2023-1380 * CVE-2023-28328 * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-42753 * CVE-2023-53147 * CVE-2023-53178 * CVE-2023-53179 * CVE-2023-53213 * CVE-2023-53265 * CVE-2023-53273 * CVE-2023-53304 * CVE-2023-53321 * CVE-2023-53333 * CVE-2023-53438 * CVE-2023-53464 * CVE-2023-53492 * CVE-2024-26583 * CVE-2024-26584 * CVE-2024-58240 * CVE-2025-21969 * CVE-2025-38184 * CVE-2025-38488 * CVE-2025-38553 * CVE-2025-38572 * CVE-2025-38664 * CVE-2025-38685 * CVE-2025-38713 * CVE-2025-39751 * CVE-2025-39823 CVSS scores: * CVE-2021-4460 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2021-4460 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-2602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2602 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49980 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50235 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50235 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50257 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50344 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50344 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50355 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2022-50368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-50375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50381 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50381 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50386 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50386 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50401 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50401 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50408 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50408 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50414 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50414 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50419 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50419 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50422 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50422 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50427 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50427 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50431 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50435 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50437 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50437 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50444 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50444 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-50454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50467 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-28328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 79 vulnerabilities and has 15 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110). * CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name} (bsc#1246968). * CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249840). * CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846). * CVE-2022-50258: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds() (bsc#1249947). * CVE-2022-50381: md: fix a crash in mempool_free (bsc#1250257). * CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250301). * CVE-2022-50401: nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure (bsc#1250140). * CVE-2022-50408: wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit() (bsc#1250391). * CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392). * CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827). * CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313). * CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180). * CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220). * CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200). * CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). The following non-security bugs were fixed: * Limit patch filenames to 100 characters (bsc#1249604). * Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108). * hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes). * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kernel-syms.spec: Drop old rpm release number hack (bsc#1247172). * rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879) * rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337) * rpm: Configure KABI checkingness macro (bsc#1249186) * rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186) * rpm: Link arch-symbols script from scripts directory. * rpm: Link guards script from scripts directory. * use uniform permission checks for all mount propagation changes (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3613=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3613=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3613=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.223.1 * kernel-rt-debugsource-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * kernel-source-rt-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.223.1 * kernel-rt-debugsource-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.223.1 * kernel-rt-debugsource-5.3.18-150300.223.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.223.1 ## References: * https://www.suse.com/security/cve/CVE-2021-4460.html * https://www.suse.com/security/cve/CVE-2022-2602.html * https://www.suse.com/security/cve/CVE-2022-2978.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-49980.html * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50234.html * https://www.suse.com/security/cve/CVE-2022-50235.html * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50249.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2022-50257.html * https://www.suse.com/security/cve/CVE-2022-50258.html * https://www.suse.com/security/cve/CVE-2022-50260.html * https://www.suse.com/security/cve/CVE-2022-50271.html * https://www.suse.com/security/cve/CVE-2022-50272.html * https://www.suse.com/security/cve/CVE-2022-50299.html * https://www.suse.com/security/cve/CVE-2022-50309.html * https://www.suse.com/security/cve/CVE-2022-50312.html * https://www.suse.com/security/cve/CVE-2022-50317.html * https://www.suse.com/security/cve/CVE-2022-50330.html * https://www.suse.com/security/cve/CVE-2022-50344.html * https://www.suse.com/security/cve/CVE-2022-50355.html * https://www.suse.com/security/cve/CVE-2022-50359.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2022-50368.html * https://www.suse.com/security/cve/CVE-2022-50375.html * https://www.suse.com/security/cve/CVE-2022-50381.html * https://www.suse.com/security/cve/CVE-2022-50385.html * https://www.suse.com/security/cve/CVE-2022-50386.html * https://www.suse.com/security/cve/CVE-2022-50401.html * https://www.suse.com/security/cve/CVE-2022-50408.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50410.html * https://www.suse.com/security/cve/CVE-2022-50414.html * https://www.suse.com/security/cve/CVE-2022-50419.html * https://www.suse.com/security/cve/CVE-2022-50422.html * https://www.suse.com/security/cve/CVE-2022-50427.html * https://www.suse.com/security/cve/CVE-2022-50431.html * https://www.suse.com/security/cve/CVE-2022-50435.html * https://www.suse.com/security/cve/CVE-2022-50437.html * https://www.suse.com/security/cve/CVE-2022-50440.html * https://www.suse.com/security/cve/CVE-2022-50444.html * https://www.suse.com/security/cve/CVE-2022-50454.html * https://www.suse.com/security/cve/CVE-2022-50458.html * https://www.suse.com/security/cve/CVE-2022-50459.html * https://www.suse.com/security/cve/CVE-2022-50467.html * https://www.suse.com/security/cve/CVE-2023-1380.html * https://www.suse.com/security/cve/CVE-2023-28328.html * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53178.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53213.html * https://www.suse.com/security/cve/CVE-2023-53265.html * https://www.suse.com/security/cve/CVE-2023-53273.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53464.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2024-26583.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://bugzilla.suse.com/show_bug.cgi?id=1202700 * https://bugzilla.suse.com/show_bug.cgi?id=1203063 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1204228 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1209287 * https://bugzilla.suse.com/show_bug.cgi?id=1209291 * https://bugzilla.suse.com/show_bug.cgi?id=1210124 * https://bugzilla.suse.com/show_bug.cgi?id=1210584 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1220185 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1243278 * https://bugzilla.suse.com/show_bug.cgi?id=1244337 * https://bugzilla.suse.com/show_bug.cgi?id=1245110 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1246879 * https://bugzilla.suse.com/show_bug.cgi?id=1246968 * https://bugzilla.suse.com/show_bug.cgi?id=1247172 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249664 * https://bugzilla.suse.com/show_bug.cgi?id=1249667 * https://bugzilla.suse.com/show_bug.cgi?id=1249700 * https://bugzilla.suse.com/show_bug.cgi?id=1249713 * https://bugzilla.suse.com/show_bug.cgi?id=1249716 * https://bugzilla.suse.com/show_bug.cgi?id=1249718 * https://bugzilla.suse.com/show_bug.cgi?id=1249734 * https://bugzilla.suse.com/show_bug.cgi?id=1249740 * https://bugzilla.suse.com/show_bug.cgi?id=1249743 * https://bugzilla.suse.com/show_bug.cgi?id=1249747 * https://bugzilla.suse.com/show_bug.cgi?id=1249808 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249827 * https://bugzilla.suse.com/show_bug.cgi?id=1249840 * https://bugzilla.suse.com/show_bug.cgi?id=1249846 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249885 * https://bugzilla.suse.com/show_bug.cgi?id=1249908 * https://bugzilla.suse.com/show_bug.cgi?id=1249918 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249930 * https://bugzilla.suse.com/show_bug.cgi?id=1249947 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250009 * https://bugzilla.suse.com/show_bug.cgi?id=1250014 * https://bugzilla.suse.com/show_bug.cgi?id=1250041 * https://bugzilla.suse.com/show_bug.cgi?id=1250131 * https://bugzilla.suse.com/show_bug.cgi?id=1250132 * https://bugzilla.suse.com/show_bug.cgi?id=1250140 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250183 * https://bugzilla.suse.com/show_bug.cgi?id=1250187 * https://bugzilla.suse.com/show_bug.cgi?id=1250257 * https://bugzilla.suse.com/show_bug.cgi?id=1250269 * https://bugzilla.suse.com/show_bug.cgi?id=1250277 * https://bugzilla.suse.com/show_bug.cgi?id=1250301 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250391 * https://bugzilla.suse.com/show_bug.cgi?id=1250392 * https://bugzilla.suse.com/show_bug.cgi?id=1250394 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250764 * https://bugzilla.suse.com/show_bug.cgi?id=1250767 * https://bugzilla.suse.com/show_bug.cgi?id=1250774 * https://bugzilla.suse.com/show_bug.cgi?id=1250787 * https://bugzilla.suse.com/show_bug.cgi?id=1250790 * https://bugzilla.suse.com/show_bug.cgi?id=1250797 * https://bugzilla.suse.com/show_bug.cgi?id=1250799 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250847 * https://bugzilla.suse.com/show_bug.cgi?id=1250850 * https://bugzilla.suse.com/show_bug.cgi?id=1250853 * https://bugzilla.suse.com/show_bug.cgi?id=1250868 * https://bugzilla.suse.com/show_bug.cgi?id=1250890 * https://bugzilla.suse.com/show_bug.cgi?id=1250891 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Oct 16 08:39:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 16 Oct 2025 08:39:29 -0000 Subject: SUSE-SU-2025:03612-1: critical: Security update for samba Message-ID: <176060396936.27718.2729989767235445270@smelt2.prg2.suse.org> # Security update for samba Announcement ID: SUSE-SU-2025:03612-1 Release Date: 2025-10-16T04:04:35Z Rating: critical References: * bsc#1251279 * bsc#1251280 Cross-References: * CVE-2025-10230 * CVE-2025-9640 CVSS scores: * CVE-2025-10230 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-9640 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-9640 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for samba fixes the following issues: * CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279). * CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3612=1 openSUSE-SLE-15.6-2025-3612=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3612=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-3612=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * samba-ldb-ldap-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-test-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * ctdb-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * ctdb-pcp-pmda-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * ctdb-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-tool-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-python3-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-dcerpc-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-dcerpc-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * ctdb-pcp-pmda-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-debugsource-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy-devel-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-python3-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-devel-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-test-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy-python3-devel-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-gpupdate-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-ldb-ldap-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * openSUSE Leap 15.6 (x86_64) * samba-winbind-libs-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-devel-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * openSUSE Leap 15.6 (noarch) * samba-doc-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * openSUSE Leap 15.6 (aarch64 x86_64) * samba-ceph-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-ceph-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * openSUSE Leap 15.6 (aarch64_ilp32) * samba-libs-64bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-64bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-64bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-64bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-64bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-devel-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-64bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-64bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * samba-ldb-ldap-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-python3-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-tool-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-python3-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-dcerpc-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-dcerpc-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-debugsource-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy-devel-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-python3-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy0-python3-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-devel-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * libsamba-policy-python3-devel-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-gpupdate-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-ldb-ldap-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * Basesystem Module 15-SP6 (aarch64 x86_64) * samba-ceph-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-ceph-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * Basesystem Module 15-SP6 (x86_64) * samba-winbind-libs-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-winbind-libs-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-client-libs-32bit-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-libs-32bit-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * ctdb-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * ctdb-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-debuginfo-4.19.8+git.435.78ced6cf30d-150600.3.21.1 * samba-debugsource-4.19.8+git.435.78ced6cf30d-150600.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10230.html * https://www.suse.com/security/cve/CVE-2025-9640.html * https://bugzilla.suse.com/show_bug.cgi?id=1251279 * https://bugzilla.suse.com/show_bug.cgi?id=1251280 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 08:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 08:30:05 -0000 Subject: SUSE-SU-2025:03627-1: important: Security update for squid Message-ID: <176068980521.2571.8053899555950871185@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2025:03627-1 Release Date: 2025-10-17T06:15:17Z Rating: important References: * bsc#1250627 Cross-References: * CVE-2025-59362 CVSS scores: * CVE-2025-59362 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59362 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59362 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves one vulnerability can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-59362: fixed buffer overflow (bsc#1250627) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3627=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3627=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3627=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3627=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3627=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3627=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3627=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3627=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3627=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3627=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3627=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3627=1 ## Package List: * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * squid-debuginfo-5.7-150400.3.35.1 * squid-5.7-150400.3.35.1 * squid-debugsource-5.7-150400.3.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59362.html * https://bugzilla.suse.com/show_bug.cgi?id=1250627 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 08:31:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 08:31:20 -0000 Subject: SUSE-SU-2025:03626-1: important: Security update for the Linux Kernel Message-ID: <176068988083.2571.9871400214802310811@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03626-1 Release Date: 2025-10-17T06:14:18Z Rating: important References: * bsc#1202700 * bsc#1203063 * bsc#1203332 * bsc#1204228 * bsc#1205128 * bsc#1206883 * bsc#1206884 * bsc#1209287 * bsc#1209291 * bsc#1210124 * bsc#1210584 * bsc#1213061 * bsc#1213666 * bsc#1215150 * bsc#1216976 * bsc#1220185 * bsc#1220186 * bsc#1233640 * bsc#1240784 * bsc#1241353 * bsc#1243278 * bsc#1244337 * bsc#1244729 * bsc#1245110 * bsc#1245956 * bsc#1245963 * bsc#1246879 * bsc#1246968 * bsc#1247172 * bsc#1247239 * bsc#1248108 * bsc#1248255 * bsc#1248399 * bsc#1248628 * bsc#1248847 * bsc#1249186 * bsc#1249200 * bsc#1249220 * bsc#1249346 * bsc#1249538 * bsc#1249604 * bsc#1249664 * bsc#1249667 * bsc#1249700 * bsc#1249713 * bsc#1249716 * bsc#1249718 * bsc#1249734 * bsc#1249740 * bsc#1249743 * bsc#1249747 * bsc#1249808 * bsc#1249825 * bsc#1249827 * bsc#1249840 * bsc#1249846 * bsc#1249880 * bsc#1249885 * bsc#1249908 * bsc#1249918 * bsc#1249923 * bsc#1249930 * bsc#1249947 * bsc#1249949 * bsc#1250002 * bsc#1250009 * bsc#1250014 * bsc#1250041 * bsc#1250131 * bsc#1250132 * bsc#1250140 * bsc#1250180 * bsc#1250183 * bsc#1250187 * bsc#1250189 * bsc#1250257 * bsc#1250269 * bsc#1250277 * bsc#1250301 * bsc#1250313 * bsc#1250337 * bsc#1250391 * bsc#1250392 * bsc#1250394 * bsc#1250522 * bsc#1250764 * bsc#1250767 * bsc#1250774 * bsc#1250787 * bsc#1250790 * bsc#1250797 * bsc#1250799 * bsc#1250823 * bsc#1250847 * bsc#1250850 * bsc#1250853 * bsc#1250868 * bsc#1250890 * bsc#1250891 Cross-References: * CVE-2021-4460 * CVE-2022-2602 * CVE-2022-2978 * CVE-2022-36280 * CVE-2022-43945 * CVE-2022-49980 * CVE-2022-50233 * CVE-2022-50234 * CVE-2022-50235 * CVE-2022-50248 * CVE-2022-50249 * CVE-2022-50252 * CVE-2022-50257 * CVE-2022-50258 * CVE-2022-50260 * CVE-2022-50271 * CVE-2022-50272 * CVE-2022-50299 * CVE-2022-50309 * CVE-2022-50312 * CVE-2022-50317 * CVE-2022-50330 * CVE-2022-50344 * CVE-2022-50355 * CVE-2022-50359 * CVE-2022-50367 * CVE-2022-50368 * CVE-2022-50375 * CVE-2022-50381 * CVE-2022-50385 * CVE-2022-50386 * CVE-2022-50401 * CVE-2022-50408 * CVE-2022-50409 * CVE-2022-50410 * CVE-2022-50412 * CVE-2022-50414 * CVE-2022-50419 * CVE-2022-50422 * CVE-2022-50427 * CVE-2022-50431 * CVE-2022-50435 * CVE-2022-50437 * CVE-2022-50440 * CVE-2022-50444 * CVE-2022-50454 * CVE-2022-50458 * CVE-2022-50459 * CVE-2022-50467 * CVE-2023-1380 * CVE-2023-28328 * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-42753 * CVE-2023-53147 * CVE-2023-53178 * CVE-2023-53179 * CVE-2023-53213 * CVE-2023-53220 * CVE-2023-53265 * CVE-2023-53273 * CVE-2023-53304 * CVE-2023-53321 * CVE-2023-53333 * CVE-2023-53438 * CVE-2023-53464 * CVE-2023-53492 * CVE-2024-26583 * CVE-2024-26584 * CVE-2024-53093 * CVE-2024-58240 * CVE-2025-21969 * CVE-2025-38011 * CVE-2025-38184 * CVE-2025-38216 * CVE-2025-38488 * CVE-2025-38553 * CVE-2025-38572 * CVE-2025-38664 * CVE-2025-38685 * CVE-2025-38713 * CVE-2025-39751 * CVE-2025-39823 CVSS scores: * CVE-2021-4460 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2021-4460 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-2602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2602 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49980 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50235 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50235 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50257 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50344 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50344 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50355 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2022-50368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-50375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50381 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50381 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50386 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50386 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50401 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50401 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50408 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50408 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50414 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50414 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50419 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50419 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50422 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50422 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50427 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50427 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50431 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50435 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50437 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50437 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50444 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50444 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-50454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50467 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-28328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 84 vulnerabilities and has 15 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-3626=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-3626=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3626=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3626=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3626=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-3626=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-3626=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3626=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-3626=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3626=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (noarch) * kernel-docs-html-5.3.18-150300.59.221.1 * kernel-source-5.3.18-150300.59.221.1 * kernel-macros-5.3.18-150300.59.221.1 * kernel-devel-5.3.18-150300.59.221.1 * kernel-source-vanilla-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * dlm-kmp-default-5.3.18-150300.59.221.1 * kselftests-kmp-default-5.3.18-150300.59.221.1 * kernel-obs-build-debugsource-5.3.18-150300.59.221.1 * cluster-md-kmp-default-5.3.18-150300.59.221.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.221.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.221.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.221.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.221.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.221.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.221.1 * reiserfs-kmp-default-5.3.18-150300.59.221.1 * kernel-default-optional-5.3.18-150300.59.221.1 * gfs2-kmp-default-5.3.18-150300.59.221.1 * kernel-default-base-rebuild-5.3.18-150300.59.221.1.150300.18.132.1 * kernel-obs-qa-5.3.18-150300.59.221.1 * kernel-default-devel-5.3.18-150300.59.221.1 * kernel-default-extra-5.3.18-150300.59.221.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.221.1 * kernel-obs-build-5.3.18-150300.59.221.1 * kernel-syms-5.3.18-150300.59.221.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.221.1 * ocfs2-kmp-default-5.3.18-150300.59.221.1 * kernel-default-livepatch-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_221-default-debuginfo-1-150300.7.3.1 * kernel-default-livepatch-devel-5.3.18-150300.59.221.1 * kernel-livepatch-SLE15-SP3_Update_62-debugsource-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-kvmsmall-devel-5.3.18-150300.59.221.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.221.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.221.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_221-preempt-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_221-preempt-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.221.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-optional-5.3.18-150300.59.221.1 * reiserfs-kmp-preempt-5.3.18-150300.59.221.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-debugsource-5.3.18-150300.59.221.1 * gfs2-kmp-preempt-5.3.18-150300.59.221.1 * kselftests-kmp-preempt-5.3.18-150300.59.221.1 * dlm-kmp-preempt-5.3.18-150300.59.221.1 * ocfs2-kmp-preempt-5.3.18-150300.59.221.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.221.1 * cluster-md-kmp-preempt-5.3.18-150300.59.221.1 * kernel-preempt-devel-5.3.18-150300.59.221.1 * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.221.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-extra-5.3.18-150300.59.221.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.221.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (aarch64) * dtb-altera-5.3.18-150300.59.221.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.221.1 * dtb-marvell-5.3.18-150300.59.221.1 * dtb-rockchip-5.3.18-150300.59.221.1 * kernel-64kb-optional-5.3.18-150300.59.221.1 * kernel-64kb-debugsource-5.3.18-150300.59.221.1 * dtb-renesas-5.3.18-150300.59.221.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.221.1 * dtb-hisilicon-5.3.18-150300.59.221.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.221.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.221.1 * reiserfs-kmp-64kb-5.3.18-150300.59.221.1 * kernel-64kb-extra-5.3.18-150300.59.221.1 * dtb-amd-5.3.18-150300.59.221.1 * dtb-cavium-5.3.18-150300.59.221.1 * dtb-lg-5.3.18-150300.59.221.1 * dtb-sprd-5.3.18-150300.59.221.1 * dtb-qcom-5.3.18-150300.59.221.1 * dtb-zte-5.3.18-150300.59.221.1 * dtb-apm-5.3.18-150300.59.221.1 * cluster-md-kmp-64kb-5.3.18-150300.59.221.1 * dtb-nvidia-5.3.18-150300.59.221.1 * dtb-socionext-5.3.18-150300.59.221.1 * dtb-exynos-5.3.18-150300.59.221.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-debuginfo-5.3.18-150300.59.221.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.221.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-devel-5.3.18-150300.59.221.1 * dlm-kmp-64kb-5.3.18-150300.59.221.1 * dtb-al-5.3.18-150300.59.221.1 * dtb-arm-5.3.18-150300.59.221.1 * dtb-xilinx-5.3.18-150300.59.221.1 * dtb-mediatek-5.3.18-150300.59.221.1 * gfs2-kmp-64kb-5.3.18-150300.59.221.1 * dtb-amlogic-5.3.18-150300.59.221.1 * ocfs2-kmp-64kb-5.3.18-150300.59.221.1 * dtb-allwinner-5.3.18-150300.59.221.1 * dtb-freescale-5.3.18-150300.59.221.1 * kselftests-kmp-64kb-5.3.18-150300.59.221.1 * dtb-broadcom-5.3.18-150300.59.221.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.3.18-150300.59.221.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * dlm-kmp-default-5.3.18-150300.59.221.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.221.1 * cluster-md-kmp-default-5.3.18-150300.59.221.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.221.1 * gfs2-kmp-default-5.3.18-150300.59.221.1 * ocfs2-kmp-default-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.221.1 * kernel-64kb-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-devel-5.3.18-150300.59.221.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.221.1 * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-default-devel-5.3.18-150300.59.221.1 * kernel-preempt-debugsource-5.3.18-150300.59.221.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-obs-build-5.3.18-150300.59.221.1 * reiserfs-kmp-default-5.3.18-150300.59.221.1 * kernel-syms-5.3.18-150300.59.221.1 * kernel-preempt-devel-5.3.18-150300.59.221.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.221.1 * kernel-obs-build-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-macros-5.3.18-150300.59.221.1 * kernel-source-5.3.18-150300.59.221.1 * kernel-devel-5.3.18-150300.59.221.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.221.1 * kernel-64kb-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-devel-5.3.18-150300.59.221.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.221.1 * kernel-default-devel-5.3.18-150300.59.221.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-obs-build-5.3.18-150300.59.221.1 * reiserfs-kmp-default-5.3.18-150300.59.221.1 * kernel-syms-5.3.18-150300.59.221.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.221.1 * kernel-obs-build-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * kernel-macros-5.3.18-150300.59.221.1 * kernel-source-5.3.18-150300.59.221.1 * kernel-devel-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc) * kernel-docs-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.221.1 * kernel-preempt-devel-5.3.18-150300.59.221.1 * kernel-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (s390x) * kernel-zfcpdump-debugsource-5.3.18-150300.59.221.1 * kernel-zfcpdump-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.221.1 * kernel-default-devel-5.3.18-150300.59.221.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-obs-build-5.3.18-150300.59.221.1 * reiserfs-kmp-default-5.3.18-150300.59.221.1 * kernel-syms-5.3.18-150300.59.221.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.221.1 * kernel-obs-build-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-macros-5.3.18-150300.59.221.1 * kernel-source-5.3.18-150300.59.221.1 * kernel-devel-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-debugsource-5.3.18-150300.59.221.1 * kernel-preempt-devel-5.3.18-150300.59.221.1 * kernel-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.221.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-debugsource-5.3.18-150300.59.221.1 * kernel-64kb-debuginfo-5.3.18-150300.59.221.1 * kernel-64kb-devel-5.3.18-150300.59.221.1 * kernel-64kb-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.221.1 * kernel-default-5.3.18-150300.59.221.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-debuginfo-5.3.18-150300.59.221.1 * kernel-default-devel-5.3.18-150300.59.221.1 * kernel-preempt-debugsource-5.3.18-150300.59.221.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-obs-build-5.3.18-150300.59.221.1 * reiserfs-kmp-default-5.3.18-150300.59.221.1 * kernel-syms-5.3.18-150300.59.221.1 * kernel-preempt-devel-5.3.18-150300.59.221.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.221.1 * kernel-obs-build-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.221.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-macros-5.3.18-150300.59.221.1 * kernel-source-5.3.18-150300.59.221.1 * kernel-devel-5.3.18-150300.59.221.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.221.1.150300.18.132.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.221.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-5.3.18-150300.59.221.1 * kernel-default-debugsource-5.3.18-150300.59.221.1 * kernel-livepatch-5_3_18-150300_59_221-default-1-150300.7.3.1 * kernel-default-livepatch-devel-5.3.18-150300.59.221.1 * kernel-default-debuginfo-5.3.18-150300.59.221.1 ## References: * https://www.suse.com/security/cve/CVE-2021-4460.html * https://www.suse.com/security/cve/CVE-2022-2602.html * https://www.suse.com/security/cve/CVE-2022-2978.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-49980.html * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50234.html * https://www.suse.com/security/cve/CVE-2022-50235.html * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50249.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2022-50257.html * https://www.suse.com/security/cve/CVE-2022-50258.html * https://www.suse.com/security/cve/CVE-2022-50260.html * https://www.suse.com/security/cve/CVE-2022-50271.html * https://www.suse.com/security/cve/CVE-2022-50272.html * https://www.suse.com/security/cve/CVE-2022-50299.html * https://www.suse.com/security/cve/CVE-2022-50309.html * https://www.suse.com/security/cve/CVE-2022-50312.html * https://www.suse.com/security/cve/CVE-2022-50317.html * https://www.suse.com/security/cve/CVE-2022-50330.html * https://www.suse.com/security/cve/CVE-2022-50344.html * https://www.suse.com/security/cve/CVE-2022-50355.html * https://www.suse.com/security/cve/CVE-2022-50359.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2022-50368.html * https://www.suse.com/security/cve/CVE-2022-50375.html * https://www.suse.com/security/cve/CVE-2022-50381.html * https://www.suse.com/security/cve/CVE-2022-50385.html * https://www.suse.com/security/cve/CVE-2022-50386.html * https://www.suse.com/security/cve/CVE-2022-50401.html * https://www.suse.com/security/cve/CVE-2022-50408.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50410.html * https://www.suse.com/security/cve/CVE-2022-50412.html * https://www.suse.com/security/cve/CVE-2022-50414.html * https://www.suse.com/security/cve/CVE-2022-50419.html * https://www.suse.com/security/cve/CVE-2022-50422.html * https://www.suse.com/security/cve/CVE-2022-50427.html * https://www.suse.com/security/cve/CVE-2022-50431.html * https://www.suse.com/security/cve/CVE-2022-50435.html * https://www.suse.com/security/cve/CVE-2022-50437.html * https://www.suse.com/security/cve/CVE-2022-50440.html * https://www.suse.com/security/cve/CVE-2022-50444.html * https://www.suse.com/security/cve/CVE-2022-50454.html * https://www.suse.com/security/cve/CVE-2022-50458.html * https://www.suse.com/security/cve/CVE-2022-50459.html * https://www.suse.com/security/cve/CVE-2022-50467.html * https://www.suse.com/security/cve/CVE-2023-1380.html * https://www.suse.com/security/cve/CVE-2023-28328.html * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53178.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53213.html * https://www.suse.com/security/cve/CVE-2023-53220.html * https://www.suse.com/security/cve/CVE-2023-53265.html * https://www.suse.com/security/cve/CVE-2023-53273.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53464.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2024-26583.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-38011.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://bugzilla.suse.com/show_bug.cgi?id=1202700 * https://bugzilla.suse.com/show_bug.cgi?id=1203063 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1204228 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1209287 * https://bugzilla.suse.com/show_bug.cgi?id=1209291 * https://bugzilla.suse.com/show_bug.cgi?id=1210124 * https://bugzilla.suse.com/show_bug.cgi?id=1210584 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1220185 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1243278 * https://bugzilla.suse.com/show_bug.cgi?id=1244337 * https://bugzilla.suse.com/show_bug.cgi?id=1244729 * https://bugzilla.suse.com/show_bug.cgi?id=1245110 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1246879 * https://bugzilla.suse.com/show_bug.cgi?id=1246968 * https://bugzilla.suse.com/show_bug.cgi?id=1247172 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249664 * https://bugzilla.suse.com/show_bug.cgi?id=1249667 * https://bugzilla.suse.com/show_bug.cgi?id=1249700 * https://bugzilla.suse.com/show_bug.cgi?id=1249713 * https://bugzilla.suse.com/show_bug.cgi?id=1249716 * https://bugzilla.suse.com/show_bug.cgi?id=1249718 * https://bugzilla.suse.com/show_bug.cgi?id=1249734 * https://bugzilla.suse.com/show_bug.cgi?id=1249740 * https://bugzilla.suse.com/show_bug.cgi?id=1249743 * https://bugzilla.suse.com/show_bug.cgi?id=1249747 * https://bugzilla.suse.com/show_bug.cgi?id=1249808 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249827 * https://bugzilla.suse.com/show_bug.cgi?id=1249840 * https://bugzilla.suse.com/show_bug.cgi?id=1249846 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249885 * https://bugzilla.suse.com/show_bug.cgi?id=1249908 * https://bugzilla.suse.com/show_bug.cgi?id=1249918 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249930 * https://bugzilla.suse.com/show_bug.cgi?id=1249947 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250009 * https://bugzilla.suse.com/show_bug.cgi?id=1250014 * https://bugzilla.suse.com/show_bug.cgi?id=1250041 * https://bugzilla.suse.com/show_bug.cgi?id=1250131 * https://bugzilla.suse.com/show_bug.cgi?id=1250132 * https://bugzilla.suse.com/show_bug.cgi?id=1250140 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250183 * https://bugzilla.suse.com/show_bug.cgi?id=1250187 * https://bugzilla.suse.com/show_bug.cgi?id=1250189 * https://bugzilla.suse.com/show_bug.cgi?id=1250257 * https://bugzilla.suse.com/show_bug.cgi?id=1250269 * https://bugzilla.suse.com/show_bug.cgi?id=1250277 * https://bugzilla.suse.com/show_bug.cgi?id=1250301 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250337 * https://bugzilla.suse.com/show_bug.cgi?id=1250391 * https://bugzilla.suse.com/show_bug.cgi?id=1250392 * https://bugzilla.suse.com/show_bug.cgi?id=1250394 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250764 * https://bugzilla.suse.com/show_bug.cgi?id=1250767 * https://bugzilla.suse.com/show_bug.cgi?id=1250774 * https://bugzilla.suse.com/show_bug.cgi?id=1250787 * https://bugzilla.suse.com/show_bug.cgi?id=1250790 * https://bugzilla.suse.com/show_bug.cgi?id=1250797 * https://bugzilla.suse.com/show_bug.cgi?id=1250799 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250847 * https://bugzilla.suse.com/show_bug.cgi?id=1250850 * https://bugzilla.suse.com/show_bug.cgi?id=1250853 * https://bugzilla.suse.com/show_bug.cgi?id=1250868 * https://bugzilla.suse.com/show_bug.cgi?id=1250890 * https://bugzilla.suse.com/show_bug.cgi?id=1250891 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 08:31:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 08:31:23 -0000 Subject: SUSE-SU-2025:03625-1: important: Security update for pgadmin4 Message-ID: <176068988372.2571.5521878272923427074@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2025:03625-1 Release Date: 2025-10-17T06:12:54Z Rating: important References: * bsc#1249151 Cross-References: * CVE-2025-9636 CVSS scores: * CVE-2025-9636 ( SUSE ): 7.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-9636 ( SUSE ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L * CVE-2025-9636 ( NVD ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-9636: Fixed cross-origin opener policy (COOP) vulnerability (bsc#1249151). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3625=1 openSUSE-SLE-15.6-2025-3625=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-3625=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-3625=1 ## Package List: * openSUSE Leap 15.6 (noarch) * pgadmin4-desktop-8.5-150600.3.15.1 * pgadmin4-8.5-150600.3.15.1 * pgadmin4-doc-8.5-150600.3.15.1 * pgadmin4-cloud-8.5-150600.3.15.1 * system-user-pgadmin-8.5-150600.3.15.1 * pgadmin4-web-uwsgi-8.5-150600.3.15.1 * Python 3 Module 15-SP6 (noarch) * pgadmin4-8.5-150600.3.15.1 * pgadmin4-doc-8.5-150600.3.15.1 * system-user-pgadmin-8.5-150600.3.15.1 * Python 3 Module 15-SP7 (noarch) * pgadmin4-8.5-150600.3.15.1 * pgadmin4-doc-8.5-150600.3.15.1 * system-user-pgadmin-8.5-150600.3.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9636.html * https://bugzilla.suse.com/show_bug.cgi?id=1249151 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 08:31:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 08:31:26 -0000 Subject: SUSE-SU-2025:03624-1: important: Security update for expat Message-ID: <176068988665.2571.6416833827208647514@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:03624-1 Release Date: 2025-10-16T19:59:58Z Rating: important References: * bsc#1249584 Cross-References: * CVE-2025-59375 CVSS scores: * CVE-2025-59375 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59375 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59375 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves one vulnerability can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations by submitting crafted XML input (bsc#1249584). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3624=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3624=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3624=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3624=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3624=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3624=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3624=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3624=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3624=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3624=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-3624=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3624=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3624=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3624=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3624=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-3624=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3624=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3624=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3624=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Manager Server 4.3 LTS (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * openSUSE Leap 15.4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * libexpat-devel-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libexpat-devel-64bit-2.7.1-150400.3.31.1 * expat-64bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-64bit-2.7.1-150400.3.31.1 * libexpat1-64bit-debuginfo-2.7.1-150400.3.31.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * openSUSE Leap 15.6 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * libexpat-devel-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * Basesystem Module 15-SP6 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.31.1 * expat-debuginfo-2.7.1-150400.3.31.1 * expat-2.7.1-150400.3.31.1 * libexpat1-2.7.1-150400.3.31.1 * libexpat1-debuginfo-2.7.1-150400.3.31.1 * libexpat-devel-2.7.1-150400.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.31.1 * expat-32bit-debuginfo-2.7.1-150400.3.31.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59375.html * https://bugzilla.suse.com/show_bug.cgi?id=1249584 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 12:30:05 -0000 Subject: SUSE-SU-2025:03630-1: important: Security update for openssl1 Message-ID: <176070420522.27718.10820135848252679281@smelt2.prg2.suse.org> # Security update for openssl1 Announcement ID: SUSE-SU-2025:03630-1 Release Date: 2025-10-17T11:39:01Z Rating: important References: * bsc#1250232 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 11 SP4 * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE An update that solves one vulnerability can now be installed. ## Description: This update for openssl1 fixes the following issues: * CVE-2025-9230: Fixed out-of-bounds read & write in RFC 3211 KEK unwrap (bsc#1250232). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-3630=1 * SUSE Linux Enterprise Server 11 SP4 zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-3630=1 ## Package List: * SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (x86_64) * libopenssl1-devel-1.0.1g-0.58.85.1 * openssl1-doc-1.0.1g-0.58.85.1 * libopenssl1_0_0-1.0.1g-0.58.85.1 * libopenssl1_0_0-32bit-1.0.1g-0.58.85.1 * openssl1-1.0.1g-0.58.85.1 * SUSE Linux Enterprise Server 11 SP4 (x86_64) * libopenssl1-devel-1.0.1g-0.58.85.1 * openssl1-doc-1.0.1g-0.58.85.1 * libopenssl1_0_0-1.0.1g-0.58.85.1 * libopenssl1_0_0-32bit-1.0.1g-0.58.85.1 * openssl1-1.0.1g-0.58.85.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 12:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 12:30:11 -0000 Subject: SUSE-SU-2025:03629-1: important: Security update for gstreamer-plugins-rs Message-ID: <176070421139.27718.1068100463267551785@smelt2.prg2.suse.org> # Security update for gstreamer-plugins-rs Announcement ID: SUSE-SU-2025:03629-1 Release Date: 2025-10-17T11:38:56Z Rating: important References: * bsc#1223219 * jsc#PED-13826 Cross-References: * CVE-2024-32650 CVSS scores: * CVE-2024-32650 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for gstreamer-plugins-rs fixes the following issues: Update to version 0.12.11 (jsc#PED-13826): * CVE-2024-32650: Fixed infinite loop in rustls::conn::ConnectionCommon:complete_io() with proper client input (bsc#1223219). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3629=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3629=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3629=1 openSUSE-SLE-15.6-2025-3629=1 ## Package List: * Desktop Applications Module 15-SP6 (aarch64 s390x x86_64) * gstreamer-plugins-rs-debuginfo-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-debugsource-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-devel-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-0.12.11-150600.3.3.1 * Desktop Applications Module 15-SP7 (aarch64 s390x x86_64) * gstreamer-plugins-rs-debuginfo-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-debugsource-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-devel-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-0.12.11-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * gstreamer-plugins-rs-debuginfo-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-debugsource-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-devel-0.12.11-150600.3.3.1 * gstreamer-plugins-rs-0.12.11-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-32650.html * https://bugzilla.suse.com/show_bug.cgi?id=1223219 * https://jira.suse.com/browse/PED-13826 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 12:35:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 12:35:13 -0000 Subject: SUSE-SU-2025:03628-1: important: Security update for the Linux Kernel Message-ID: <176070451366.27718.7662536917036946137@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03628-1 Release Date: 2025-10-17T11:35:04Z Rating: important References: * bsc#1065729 * bsc#1164051 * bsc#1193629 * bsc#1194869 * bsc#1202700 * bsc#1203063 * bsc#1203332 * bsc#1204228 * bsc#1205128 * bsc#1206456 * bsc#1206468 * bsc#1206883 * bsc#1206884 * bsc#1207158 * bsc#1207621 * bsc#1207624 * bsc#1207625 * bsc#1207628 * bsc#1207629 * bsc#1207631 * bsc#1207645 * bsc#1207651 * bsc#1208607 * bsc#1209287 * bsc#1209291 * bsc#1210584 * bsc#1211960 * bsc#1212603 * bsc#1213015 * bsc#1213016 * bsc#1213040 * bsc#1213041 * bsc#1213061 * bsc#1213099 * bsc#1213104 * bsc#1213666 * bsc#1213747 * bsc#1214953 * bsc#1214967 * bsc#1215150 * bsc#1215696 * bsc#1215911 * bsc#1216976 * bsc#1217790 * bsc#1220185 * bsc#1220186 * bsc#1236104 * bsc#1238160 * bsc#1241353 * bsc#1242573 * bsc#1242846 * bsc#1242960 * bsc#1243539 * bsc#1244337 * bsc#1244732 * bsc#1245110 * bsc#1245498 * bsc#1245499 * bsc#1245666 * bsc#1245956 * bsc#1246879 * bsc#1246968 * bsc#1247028 * bsc#1247172 * bsc#1247239 * bsc#1247288 * bsc#1247317 * bsc#1248108 * bsc#1248255 * bsc#1248399 * bsc#1248628 * bsc#1248639 * bsc#1248847 * bsc#1249126 * bsc#1249158 * bsc#1249186 * bsc#1249195 * bsc#1249200 * bsc#1249220 * bsc#1249266 * bsc#1249315 * bsc#1249324 * bsc#1249346 * bsc#1249374 * bsc#1249516 * bsc#1249538 * bsc#1249548 * bsc#1249604 * bsc#1249608 * bsc#1249638 * bsc#1249639 * bsc#1249641 * bsc#1249642 * bsc#1249650 * bsc#1249651 * bsc#1249658 * bsc#1249661 * bsc#1249664 * bsc#1249667 * bsc#1249669 * bsc#1249677 * bsc#1249681 * bsc#1249683 * bsc#1249685 * bsc#1249687 * bsc#1249691 * bsc#1249695 * bsc#1249699 * bsc#1249700 * bsc#1249701 * bsc#1249705 * bsc#1249706 * bsc#1249707 * bsc#1249709 * bsc#1249712 * bsc#1249713 * bsc#1249715 * bsc#1249716 * bsc#1249718 * bsc#1249722 * bsc#1249727 * bsc#1249730 * bsc#1249733 * bsc#1249734 * bsc#1249739 * bsc#1249740 * bsc#1249741 * bsc#1249742 * bsc#1249743 * bsc#1249745 * bsc#1249746 * bsc#1249747 * bsc#1249749 * bsc#1249750 * bsc#1249751 * bsc#1249753 * bsc#1249758 * bsc#1249762 * bsc#1249767 * bsc#1249777 * bsc#1249781 * bsc#1249784 * bsc#1249791 * bsc#1249799 * bsc#1249808 * bsc#1249810 * bsc#1249820 * bsc#1249825 * bsc#1249827 * bsc#1249836 * bsc#1249840 * bsc#1249844 * bsc#1249846 * bsc#1249853 * bsc#1249858 * bsc#1249860 * bsc#1249864 * bsc#1249865 * bsc#1249866 * bsc#1249867 * bsc#1249868 * bsc#1249872 * bsc#1249877 * bsc#1249880 * bsc#1249882 * bsc#1249885 * bsc#1249890 * bsc#1249892 * bsc#1249908 * bsc#1249910 * bsc#1249911 * bsc#1249914 * bsc#1249917 * bsc#1249918 * bsc#1249920 * bsc#1249923 * bsc#1249924 * bsc#1249925 * bsc#1249927 * bsc#1249928 * bsc#1249930 * bsc#1249933 * bsc#1249934 * bsc#1249936 * bsc#1249938 * bsc#1249939 * bsc#1249944 * bsc#1249947 * bsc#1249949 * bsc#1249950 * bsc#1249954 * bsc#1249958 * bsc#1249979 * bsc#1249981 * bsc#1249991 * bsc#1249997 * bsc#1250002 * bsc#1250006 * bsc#1250007 * bsc#1250009 * bsc#1250010 * bsc#1250011 * bsc#1250014 * bsc#1250015 * bsc#1250023 * bsc#1250024 * bsc#1250026 * bsc#1250039 * bsc#1250041 * bsc#1250043 * bsc#1250044 * bsc#1250047 * bsc#1250049 * bsc#1250052 * bsc#1250055 * bsc#1250058 * bsc#1250060 * bsc#1250062 * bsc#1250065 * bsc#1250066 * bsc#1250070 * bsc#1250071 * bsc#1250072 * bsc#1250077 * bsc#1250080 * bsc#1250081 * bsc#1250083 * bsc#1250105 * bsc#1250106 * bsc#1250107 * bsc#1250108 * bsc#1250114 * bsc#1250118 * bsc#1250121 * bsc#1250127 * bsc#1250128 * bsc#1250131 * bsc#1250132 * bsc#1250137 * bsc#1250138 * bsc#1250140 * bsc#1250145 * bsc#1250151 * bsc#1250153 * bsc#1250156 * bsc#1250159 * bsc#1250161 * bsc#1250168 * bsc#1250178 * bsc#1250180 * bsc#1250181 * bsc#1250182 * bsc#1250183 * bsc#1250184 * bsc#1250187 * bsc#1250191 * bsc#1250197 * bsc#1250198 * bsc#1250200 * bsc#1250209 * bsc#1250211 * bsc#1250237 * bsc#1250245 * bsc#1250247 * bsc#1250250 * bsc#1250257 * bsc#1250264 * bsc#1250269 * bsc#1250277 * bsc#1250287 * bsc#1250293 * bsc#1250301 * bsc#1250303 * bsc#1250309 * bsc#1250311 * bsc#1250313 * bsc#1250315 * bsc#1250316 * bsc#1250322 * bsc#1250323 * bsc#1250324 * bsc#1250325 * bsc#1250328 * bsc#1250331 * bsc#1250358 * bsc#1250362 * bsc#1250363 * bsc#1250370 * bsc#1250374 * bsc#1250391 * bsc#1250392 * bsc#1250393 * bsc#1250394 * bsc#1250395 * bsc#1250406 * bsc#1250412 * bsc#1250418 * bsc#1250425 * bsc#1250428 * bsc#1250453 * bsc#1250454 * bsc#1250457 * bsc#1250459 * bsc#1250522 * bsc#1250759 * bsc#1250761 * bsc#1250762 * bsc#1250763 * bsc#1250767 * bsc#1250768 * bsc#1250774 * bsc#1250781 * bsc#1250784 * bsc#1250786 * bsc#1250787 * bsc#1250790 * bsc#1250791 * bsc#1250792 * bsc#1250797 * bsc#1250799 * bsc#1250807 * bsc#1250810 * bsc#1250811 * bsc#1250818 * bsc#1250819 * bsc#1250822 * bsc#1250823 * bsc#1250824 * bsc#1250825 * bsc#1250830 * bsc#1250831 * bsc#1250839 * bsc#1250841 * bsc#1250842 * bsc#1250843 * bsc#1250846 * bsc#1250847 * bsc#1250848 * bsc#1250850 * bsc#1250851 * bsc#1250853 * bsc#1250856 * bsc#1250863 * bsc#1250864 * bsc#1250866 * bsc#1250867 * bsc#1250868 * bsc#1250872 * bsc#1250874 * bsc#1250875 * bsc#1250877 * bsc#1250879 * bsc#1250883 * bsc#1250887 * bsc#1250888 * bsc#1250889 * bsc#1250890 * bsc#1250891 * bsc#1250905 * bsc#1250915 * bsc#1250917 * bsc#1250923 * bsc#1250927 * bsc#1250928 * bsc#1250948 * bsc#1250949 * bsc#1250953 * bsc#1250955 * bsc#1250963 * bsc#1250964 * bsc#1250965 Cross-References: * CVE-2022-2602 * CVE-2022-2978 * CVE-2022-36280 * CVE-2022-43945 * CVE-2022-49138 * CVE-2022-49980 * CVE-2022-50233 * CVE-2022-50234 * CVE-2022-50235 * CVE-2022-50239 * CVE-2022-50241 * CVE-2022-50246 * CVE-2022-50247 * CVE-2022-50248 * CVE-2022-50249 * CVE-2022-50250 * CVE-2022-50251 * CVE-2022-50252 * CVE-2022-50255 * CVE-2022-50257 * CVE-2022-50258 * CVE-2022-50260 * CVE-2022-50261 * CVE-2022-50264 * CVE-2022-50266 * CVE-2022-50267 * CVE-2022-50268 * CVE-2022-50269 * CVE-2022-50271 * CVE-2022-50272 * CVE-2022-50275 * CVE-2022-50276 * CVE-2022-50277 * CVE-2022-50278 * CVE-2022-50279 * CVE-2022-50282 * CVE-2022-50286 * CVE-2022-50289 * CVE-2022-50294 * CVE-2022-50297 * CVE-2022-50298 * CVE-2022-50299 * CVE-2022-50301 * CVE-2022-50308 * CVE-2022-50309 * CVE-2022-50312 * CVE-2022-50317 * CVE-2022-50318 * CVE-2022-50320 * CVE-2022-50321 * CVE-2022-50324 * CVE-2022-50328 * CVE-2022-50329 * CVE-2022-50330 * CVE-2022-50331 * CVE-2022-50333 * CVE-2022-50340 * CVE-2022-50342 * CVE-2022-50344 * CVE-2022-50346 * CVE-2022-50347 * CVE-2022-50348 * CVE-2022-50349 * CVE-2022-50351 * CVE-2022-50353 * CVE-2022-50355 * CVE-2022-50358 * CVE-2022-50359 * CVE-2022-50362 * CVE-2022-50364 * CVE-2022-50367 * CVE-2022-50368 * CVE-2022-50369 * CVE-2022-50370 * CVE-2022-50372 * CVE-2022-50373 * CVE-2022-50374 * CVE-2022-50375 * CVE-2022-50376 * CVE-2022-50379 * CVE-2022-50381 * CVE-2022-50385 * CVE-2022-50386 * CVE-2022-50388 * CVE-2022-50389 * CVE-2022-50391 * CVE-2022-50392 * CVE-2022-50394 * CVE-2022-50395 * CVE-2022-50399 * CVE-2022-50401 * CVE-2022-50402 * CVE-2022-50404 * CVE-2022-50408 * CVE-2022-50409 * CVE-2022-50410 * CVE-2022-50411 * CVE-2022-50414 * CVE-2022-50417 * CVE-2022-50419 * CVE-2022-50422 * CVE-2022-50423 * CVE-2022-50425 * CVE-2022-50427 * CVE-2022-50428 * CVE-2022-50429 * CVE-2022-50430 * CVE-2022-50431 * CVE-2022-50432 * CVE-2022-50434 * CVE-2022-50435 * CVE-2022-50436 * CVE-2022-50437 * CVE-2022-50439 * CVE-2022-50440 * CVE-2022-50443 * CVE-2022-50444 * CVE-2022-50449 * CVE-2022-50453 * CVE-2022-50454 * CVE-2022-50456 * CVE-2022-50458 * CVE-2022-50459 * CVE-2022-50460 * CVE-2022-50465 * CVE-2022-50466 * CVE-2022-50467 * CVE-2022-50468 * CVE-2022-50469 * CVE-2023-1380 * CVE-2023-28328 * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-39197 * CVE-2023-42753 * CVE-2023-52923 * CVE-2023-53147 * CVE-2023-53149 * CVE-2023-53150 * CVE-2023-53151 * CVE-2023-53153 * CVE-2023-53165 * CVE-2023-53167 * CVE-2023-53171 * CVE-2023-53174 * CVE-2023-53176 * CVE-2023-53178 * CVE-2023-53179 * CVE-2023-53182 * CVE-2023-53185 * CVE-2023-53196 * CVE-2023-53197 * CVE-2023-53199 * CVE-2023-53201 * CVE-2023-53205 * CVE-2023-53213 * CVE-2023-53216 * CVE-2023-53219 * CVE-2023-53222 * CVE-2023-53223 * CVE-2023-53226 * CVE-2023-53229 * CVE-2023-53230 * CVE-2023-53234 * CVE-2023-53238 * CVE-2023-53239 * CVE-2023-53241 * CVE-2023-53242 * CVE-2023-53244 * CVE-2023-53245 * CVE-2023-53246 * CVE-2023-53249 * CVE-2023-53250 * CVE-2023-53251 * CVE-2023-53255 * CVE-2023-53259 * CVE-2023-53265 * CVE-2023-53268 * CVE-2023-53270 * CVE-2023-53272 * CVE-2023-53273 * CVE-2023-53275 * CVE-2023-53276 * CVE-2023-53277 * CVE-2023-53280 * CVE-2023-53281 * CVE-2023-53282 * CVE-2023-53286 * CVE-2023-53288 * CVE-2023-53295 * CVE-2023-53297 * CVE-2023-53298 * CVE-2023-53299 * CVE-2023-53302 * CVE-2023-53304 * CVE-2023-53305 * CVE-2023-53307 * CVE-2023-53309 * CVE-2023-53311 * CVE-2023-53313 * CVE-2023-53314 * CVE-2023-53315 * CVE-2023-53316 * CVE-2023-53317 * CVE-2023-53321 * CVE-2023-53322 * CVE-2023-53324 * CVE-2023-53326 * CVE-2023-53330 * CVE-2023-53331 * CVE-2023-53333 * CVE-2023-53334 * CVE-2023-53335 * CVE-2023-53337 * CVE-2023-53344 * CVE-2023-53349 * CVE-2023-53352 * CVE-2023-53356 * CVE-2023-53359 * CVE-2023-53368 * CVE-2023-53373 * CVE-2023-53375 * CVE-2023-53377 * CVE-2023-53379 * CVE-2023-53380 * CVE-2023-53381 * CVE-2023-53384 * CVE-2023-53386 * CVE-2023-53388 * CVE-2023-53390 * CVE-2023-53393 * CVE-2023-53395 * CVE-2023-53396 * CVE-2023-53400 * CVE-2023-53404 * CVE-2023-53405 * CVE-2023-53406 * CVE-2023-53409 * CVE-2023-53413 * CVE-2023-53414 * CVE-2023-53415 * CVE-2023-53416 * CVE-2023-53422 * CVE-2023-53427 * CVE-2023-53431 * CVE-2023-53435 * CVE-2023-53436 * CVE-2023-53437 * CVE-2023-53438 * CVE-2023-53440 * CVE-2023-53443 * CVE-2023-53446 * CVE-2023-53449 * CVE-2023-53451 * CVE-2023-53452 * CVE-2023-53453 * CVE-2023-53454 * CVE-2023-53457 * CVE-2023-53458 * CVE-2023-53463 * CVE-2023-53464 * CVE-2023-53465 * CVE-2023-53468 * CVE-2023-53471 * CVE-2023-53472 * CVE-2023-53473 * CVE-2023-53474 * CVE-2023-53475 * CVE-2023-53476 * CVE-2023-53485 * CVE-2023-53487 * CVE-2023-53488 * CVE-2023-53492 * CVE-2023-53494 * CVE-2023-53496 * CVE-2023-53498 * CVE-2023-53499 * CVE-2023-53505 * CVE-2023-53506 * CVE-2023-53509 * CVE-2023-53512 * CVE-2023-53513 * CVE-2023-53515 * CVE-2023-53518 * CVE-2023-53519 * CVE-2023-53521 * CVE-2023-53524 * CVE-2023-53525 * CVE-2023-53526 * CVE-2023-53530 * CVE-2024-26583 * CVE-2024-26584 * CVE-2024-58240 * CVE-2025-23155 * CVE-2025-37738 * CVE-2025-37885 * CVE-2025-37958 * CVE-2025-38014 * CVE-2025-38084 * CVE-2025-38085 * CVE-2025-38111 * CVE-2025-38184 * CVE-2025-38380 * CVE-2025-38470 * CVE-2025-38476 * CVE-2025-38488 * CVE-2025-38553 * CVE-2025-38572 * CVE-2025-38659 * CVE-2025-38664 * CVE-2025-38678 * CVE-2025-38685 * CVE-2025-38706 * CVE-2025-38713 * CVE-2025-38734 * CVE-2025-39691 * CVE-2025-39703 * CVE-2025-39726 * CVE-2025-39746 * CVE-2025-39751 * CVE-2025-39790 * CVE-2025-39797 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39860 * CVE-2025-39869 CVSS scores: * CVE-2022-2602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2602 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-36280 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H * CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49138 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49138 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49138 ( NVD ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49980 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50235 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50235 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50246 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50246 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50247 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50248 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50257 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50260 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50261 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50264 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50266 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50267 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50267 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50268 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50268 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50275 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50275 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50277 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50277 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50279 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50279 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50282 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50282 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50289 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50289 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50297 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50297 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50320 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50320 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50328 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50333 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50333 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50340 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50342 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50344 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50344 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50346 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50346 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-50347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50355 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50358 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50358 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2022-50368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-50369 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50372 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50372 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50373 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50373 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-50374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50376 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50381 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50381 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50386 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50386 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50388 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50388 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50389 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50389 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50401 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50401 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50402 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50402 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50404 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50404 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50408 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50408 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50411 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50411 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50414 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50414 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50417 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50419 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50419 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50422 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50422 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50423 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50423 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50425 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50427 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50427 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50428 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50428 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50431 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50432 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50432 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50434 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50434 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50435 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50436 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50437 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50437 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50439 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50443 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50443 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-50444 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-50444 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-50449 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50449 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50456 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50456 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50460 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50460 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50467 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50469 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50469 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-28328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-28328 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52923 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53150 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53176 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53196 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53222 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53223 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53241 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53241 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53242 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53249 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53255 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53255 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53259 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53268 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53268 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53270 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53270 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53272 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53272 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53280 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53280 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53281 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53281 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53282 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53282 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53295 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53295 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-53297 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53298 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53298 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53311 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53311 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53314 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53316 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53316 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53317 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53317 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53324 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53324 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53334 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53334 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53359 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53390 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53390 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53393 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53396 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53396 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53400 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53404 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53409 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53413 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53413 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53414 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53415 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53415 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53416 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53437 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53437 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53443 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53452 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53452 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H * CVE-2023-53453 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53453 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53454 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53454 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53471 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53471 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53473 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53485 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53485 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53496 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53498 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53506 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53509 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53509 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53512 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53512 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53513 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53513 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53515 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53515 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53518 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53518 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53519 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53519 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53521 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53521 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53524 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53524 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53525 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53525 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53526 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26583 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26583 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-23155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37738 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38014 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38084 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38470 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves 326 vulnerabilities and has 45 security fixes can now be installed. ## Description: This update provides the initial livepatch for this kernel update. This update does not contain any fixes and will be updated with livepatches later. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-3628=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3628=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-3628=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3628=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-3628=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-3628=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3628=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3628=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3628=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3628=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-3628=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-3628=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-3628=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-3628=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (noarch) * kernel-source-5.14.21-150400.24.179.1 * kernel-docs-html-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-vanilla-5.14.21-150400.24.179.1 * kernel-macros-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.179.1 * kernel-default-base-rebuild-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.179.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.179.1 * kernel-kvmsmall-devel-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150400.24.179.1 * ocfs2-kmp-default-5.14.21-150400.24.179.1 * kselftests-kmp-default-5.14.21-150400.24.179.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * reiserfs-kmp-default-5.14.21-150400.24.179.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-extra-5.14.21-150400.24.179.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.179.1 * kernel-obs-build-debugsource-5.14.21-150400.24.179.1 * kernel-obs-build-5.14.21-150400.24.179.1 * kernel-default-extra-debuginfo-5.14.21-150400.24.179.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.179.1 * gfs2-kmp-default-5.14.21-150400.24.179.1 * kernel-default-livepatch-5.14.21-150400.24.179.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.179.1 * cluster-md-kmp-default-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-optional-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * kernel-obs-qa-5.14.21-150400.24.179.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.179.1 * dlm-kmp-default-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_179-default-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.179.1 * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.179.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (aarch64) * dtb-sprd-5.14.21-150400.24.179.1 * ocfs2-kmp-64kb-5.14.21-150400.24.179.1 * reiserfs-kmp-64kb-5.14.21-150400.24.179.1 * kernel-64kb-debuginfo-5.14.21-150400.24.179.1 * dtb-socionext-5.14.21-150400.24.179.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.179.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.179.1 * dtb-hisilicon-5.14.21-150400.24.179.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.179.1 * dtb-cavium-5.14.21-150400.24.179.1 * dtb-broadcom-5.14.21-150400.24.179.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.179.1 * dtb-freescale-5.14.21-150400.24.179.1 * dtb-lg-5.14.21-150400.24.179.1 * dtb-apm-5.14.21-150400.24.179.1 * dtb-arm-5.14.21-150400.24.179.1 * kernel-64kb-debugsource-5.14.21-150400.24.179.1 * dtb-exynos-5.14.21-150400.24.179.1 * gfs2-kmp-64kb-5.14.21-150400.24.179.1 * kernel-64kb-extra-5.14.21-150400.24.179.1 * dtb-altera-5.14.21-150400.24.179.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.179.1 * dtb-renesas-5.14.21-150400.24.179.1 * dtb-amlogic-5.14.21-150400.24.179.1 * dtb-mediatek-5.14.21-150400.24.179.1 * dtb-nvidia-5.14.21-150400.24.179.1 * dtb-amazon-5.14.21-150400.24.179.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.179.1 * dtb-amd-5.14.21-150400.24.179.1 * kselftests-kmp-64kb-5.14.21-150400.24.179.1 * dtb-apple-5.14.21-150400.24.179.1 * cluster-md-kmp-64kb-5.14.21-150400.24.179.1 * dtb-qcom-5.14.21-150400.24.179.1 * kernel-64kb-optional-5.14.21-150400.24.179.1 * dtb-xilinx-5.14.21-150400.24.179.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.179.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.179.1 * dtb-allwinner-5.14.21-150400.24.179.1 * dtb-marvell-5.14.21-150400.24.179.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.179.1 * kernel-64kb-devel-5.14.21-150400.24.179.1 * dlm-kmp-64kb-5.14.21-150400.24.179.1 * dtb-rockchip-5.14.21-150400.24.179.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * ocfs2-kmp-default-5.14.21-150400.24.179.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.179.1 * cluster-md-kmp-default-5.14.21-150400.24.179.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.179.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.179.1 * gfs2-kmp-default-5.14.21-150400.24.179.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.179.1 * dlm-kmp-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.179.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.179.1 * kernel-64kb-devel-5.14.21-150400.24.179.1 * kernel-64kb-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * reiserfs-kmp-default-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kernel-obs-build-debugsource-5.14.21-150400.24.179.1 * kernel-obs-build-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.179.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.179.1 * kernel-64kb-devel-5.14.21-150400.24.179.1 * kernel-64kb-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * reiserfs-kmp-default-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kernel-obs-build-debugsource-5.14.21-150400.24.179.1 * kernel-obs-build-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-5.14.21-150400.24.179.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.179.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.179.1 * kernel-64kb-devel-5.14.21-150400.24.179.1 * kernel-64kb-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * reiserfs-kmp-default-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kernel-obs-build-debugsource-5.14.21-150400.24.179.1 * kernel-obs-build-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.179.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * reiserfs-kmp-default-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.179.1 * kernel-obs-build-debugsource-5.14.21-150400.24.179.1 * kernel-obs-build-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.179.1 * SUSE Manager Proxy 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Manager Proxy 4.3 LTS (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-5.14.21-150400.24.179.1 * SUSE Manager Retail Branch Server 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * SUSE Manager Server 4.3 LTS (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.179.1 * SUSE Manager Server 4.3 LTS (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.179.1.150400.24.92.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * kernel-default-devel-5.14.21-150400.24.179.1 * kernel-syms-5.14.21-150400.24.179.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.179.1 * SUSE Manager Server 4.3 LTS (noarch) * kernel-macros-5.14.21-150400.24.179.1 * kernel-devel-5.14.21-150400.24.179.1 * kernel-source-5.14.21-150400.24.179.1 * SUSE Manager Server 4.3 LTS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.179.1 * SUSE Manager Server 4.3 LTS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.179.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.179.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_179-default-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.179.1 * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.179.1 * kernel-default-livepatch-5.14.21-150400.24.179.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.179.1 ## References: * https://www.suse.com/security/cve/CVE-2022-2602.html * https://www.suse.com/security/cve/CVE-2022-2978.html * https://www.suse.com/security/cve/CVE-2022-36280.html * https://www.suse.com/security/cve/CVE-2022-43945.html * https://www.suse.com/security/cve/CVE-2022-49138.html * https://www.suse.com/security/cve/CVE-2022-49980.html * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50234.html * https://www.suse.com/security/cve/CVE-2022-50235.html * https://www.suse.com/security/cve/CVE-2022-50239.html * https://www.suse.com/security/cve/CVE-2022-50241.html * https://www.suse.com/security/cve/CVE-2022-50246.html * https://www.suse.com/security/cve/CVE-2022-50247.html * https://www.suse.com/security/cve/CVE-2022-50248.html * https://www.suse.com/security/cve/CVE-2022-50249.html * https://www.suse.com/security/cve/CVE-2022-50250.html * https://www.suse.com/security/cve/CVE-2022-50251.html * https://www.suse.com/security/cve/CVE-2022-50252.html * https://www.suse.com/security/cve/CVE-2022-50255.html * https://www.suse.com/security/cve/CVE-2022-50257.html * https://www.suse.com/security/cve/CVE-2022-50258.html * https://www.suse.com/security/cve/CVE-2022-50260.html * https://www.suse.com/security/cve/CVE-2022-50261.html * https://www.suse.com/security/cve/CVE-2022-50264.html * https://www.suse.com/security/cve/CVE-2022-50266.html * https://www.suse.com/security/cve/CVE-2022-50267.html * https://www.suse.com/security/cve/CVE-2022-50268.html * https://www.suse.com/security/cve/CVE-2022-50269.html * https://www.suse.com/security/cve/CVE-2022-50271.html * https://www.suse.com/security/cve/CVE-2022-50272.html * https://www.suse.com/security/cve/CVE-2022-50275.html * https://www.suse.com/security/cve/CVE-2022-50276.html * https://www.suse.com/security/cve/CVE-2022-50277.html * https://www.suse.com/security/cve/CVE-2022-50278.html * https://www.suse.com/security/cve/CVE-2022-50279.html * https://www.suse.com/security/cve/CVE-2022-50282.html * https://www.suse.com/security/cve/CVE-2022-50286.html * https://www.suse.com/security/cve/CVE-2022-50289.html * https://www.suse.com/security/cve/CVE-2022-50294.html * https://www.suse.com/security/cve/CVE-2022-50297.html * https://www.suse.com/security/cve/CVE-2022-50298.html * https://www.suse.com/security/cve/CVE-2022-50299.html * https://www.suse.com/security/cve/CVE-2022-50301.html * https://www.suse.com/security/cve/CVE-2022-50308.html * https://www.suse.com/security/cve/CVE-2022-50309.html * https://www.suse.com/security/cve/CVE-2022-50312.html * https://www.suse.com/security/cve/CVE-2022-50317.html * https://www.suse.com/security/cve/CVE-2022-50318.html * https://www.suse.com/security/cve/CVE-2022-50320.html * https://www.suse.com/security/cve/CVE-2022-50321.html * https://www.suse.com/security/cve/CVE-2022-50324.html * https://www.suse.com/security/cve/CVE-2022-50328.html * https://www.suse.com/security/cve/CVE-2022-50329.html * https://www.suse.com/security/cve/CVE-2022-50330.html * https://www.suse.com/security/cve/CVE-2022-50331.html * https://www.suse.com/security/cve/CVE-2022-50333.html * https://www.suse.com/security/cve/CVE-2022-50340.html * https://www.suse.com/security/cve/CVE-2022-50342.html * https://www.suse.com/security/cve/CVE-2022-50344.html * https://www.suse.com/security/cve/CVE-2022-50346.html * https://www.suse.com/security/cve/CVE-2022-50347.html * https://www.suse.com/security/cve/CVE-2022-50348.html * https://www.suse.com/security/cve/CVE-2022-50349.html * https://www.suse.com/security/cve/CVE-2022-50351.html * https://www.suse.com/security/cve/CVE-2022-50353.html * https://www.suse.com/security/cve/CVE-2022-50355.html * https://www.suse.com/security/cve/CVE-2022-50358.html * https://www.suse.com/security/cve/CVE-2022-50359.html * https://www.suse.com/security/cve/CVE-2022-50362.html * https://www.suse.com/security/cve/CVE-2022-50364.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2022-50368.html * https://www.suse.com/security/cve/CVE-2022-50369.html * https://www.suse.com/security/cve/CVE-2022-50370.html * https://www.suse.com/security/cve/CVE-2022-50372.html * https://www.suse.com/security/cve/CVE-2022-50373.html * https://www.suse.com/security/cve/CVE-2022-50374.html * https://www.suse.com/security/cve/CVE-2022-50375.html * https://www.suse.com/security/cve/CVE-2022-50376.html * https://www.suse.com/security/cve/CVE-2022-50379.html * https://www.suse.com/security/cve/CVE-2022-50381.html * https://www.suse.com/security/cve/CVE-2022-50385.html * https://www.suse.com/security/cve/CVE-2022-50386.html * https://www.suse.com/security/cve/CVE-2022-50388.html * https://www.suse.com/security/cve/CVE-2022-50389.html * https://www.suse.com/security/cve/CVE-2022-50391.html * https://www.suse.com/security/cve/CVE-2022-50392.html * https://www.suse.com/security/cve/CVE-2022-50394.html * https://www.suse.com/security/cve/CVE-2022-50395.html * https://www.suse.com/security/cve/CVE-2022-50399.html * https://www.suse.com/security/cve/CVE-2022-50401.html * https://www.suse.com/security/cve/CVE-2022-50402.html * https://www.suse.com/security/cve/CVE-2022-50404.html * https://www.suse.com/security/cve/CVE-2022-50408.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50410.html * https://www.suse.com/security/cve/CVE-2022-50411.html * https://www.suse.com/security/cve/CVE-2022-50414.html * https://www.suse.com/security/cve/CVE-2022-50417.html * https://www.suse.com/security/cve/CVE-2022-50419.html * https://www.suse.com/security/cve/CVE-2022-50422.html * https://www.suse.com/security/cve/CVE-2022-50423.html * https://www.suse.com/security/cve/CVE-2022-50425.html * https://www.suse.com/security/cve/CVE-2022-50427.html * https://www.suse.com/security/cve/CVE-2022-50428.html * https://www.suse.com/security/cve/CVE-2022-50429.html * https://www.suse.com/security/cve/CVE-2022-50430.html * https://www.suse.com/security/cve/CVE-2022-50431.html * https://www.suse.com/security/cve/CVE-2022-50432.html * https://www.suse.com/security/cve/CVE-2022-50434.html * https://www.suse.com/security/cve/CVE-2022-50435.html * https://www.suse.com/security/cve/CVE-2022-50436.html * https://www.suse.com/security/cve/CVE-2022-50437.html * https://www.suse.com/security/cve/CVE-2022-50439.html * https://www.suse.com/security/cve/CVE-2022-50440.html * https://www.suse.com/security/cve/CVE-2022-50443.html * https://www.suse.com/security/cve/CVE-2022-50444.html * https://www.suse.com/security/cve/CVE-2022-50449.html * https://www.suse.com/security/cve/CVE-2022-50453.html * https://www.suse.com/security/cve/CVE-2022-50454.html * https://www.suse.com/security/cve/CVE-2022-50456.html * https://www.suse.com/security/cve/CVE-2022-50458.html * https://www.suse.com/security/cve/CVE-2022-50459.html * https://www.suse.com/security/cve/CVE-2022-50460.html * https://www.suse.com/security/cve/CVE-2022-50465.html * https://www.suse.com/security/cve/CVE-2022-50466.html * https://www.suse.com/security/cve/CVE-2022-50467.html * https://www.suse.com/security/cve/CVE-2022-50468.html * https://www.suse.com/security/cve/CVE-2022-50469.html * https://www.suse.com/security/cve/CVE-2023-1380.html * https://www.suse.com/security/cve/CVE-2023-28328.html * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-52923.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53149.html * https://www.suse.com/security/cve/CVE-2023-53150.html * https://www.suse.com/security/cve/CVE-2023-53151.html * https://www.suse.com/security/cve/CVE-2023-53153.html * https://www.suse.com/security/cve/CVE-2023-53165.html * https://www.suse.com/security/cve/CVE-2023-53167.html * https://www.suse.com/security/cve/CVE-2023-53171.html * https://www.suse.com/security/cve/CVE-2023-53174.html * https://www.suse.com/security/cve/CVE-2023-53176.html * https://www.suse.com/security/cve/CVE-2023-53178.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53182.html * https://www.suse.com/security/cve/CVE-2023-53185.html * https://www.suse.com/security/cve/CVE-2023-53196.html * https://www.suse.com/security/cve/CVE-2023-53197.html * https://www.suse.com/security/cve/CVE-2023-53199.html * https://www.suse.com/security/cve/CVE-2023-53201.html * https://www.suse.com/security/cve/CVE-2023-53205.html * https://www.suse.com/security/cve/CVE-2023-53213.html * https://www.suse.com/security/cve/CVE-2023-53216.html * https://www.suse.com/security/cve/CVE-2023-53219.html * https://www.suse.com/security/cve/CVE-2023-53222.html * https://www.suse.com/security/cve/CVE-2023-53223.html * https://www.suse.com/security/cve/CVE-2023-53226.html * https://www.suse.com/security/cve/CVE-2023-53229.html * https://www.suse.com/security/cve/CVE-2023-53230.html * https://www.suse.com/security/cve/CVE-2023-53234.html * https://www.suse.com/security/cve/CVE-2023-53238.html * https://www.suse.com/security/cve/CVE-2023-53239.html * https://www.suse.com/security/cve/CVE-2023-53241.html * https://www.suse.com/security/cve/CVE-2023-53242.html * https://www.suse.com/security/cve/CVE-2023-53244.html * https://www.suse.com/security/cve/CVE-2023-53245.html * https://www.suse.com/security/cve/CVE-2023-53246.html * https://www.suse.com/security/cve/CVE-2023-53249.html * https://www.suse.com/security/cve/CVE-2023-53250.html * https://www.suse.com/security/cve/CVE-2023-53251.html * https://www.suse.com/security/cve/CVE-2023-53255.html * https://www.suse.com/security/cve/CVE-2023-53259.html * https://www.suse.com/security/cve/CVE-2023-53265.html * https://www.suse.com/security/cve/CVE-2023-53268.html * https://www.suse.com/security/cve/CVE-2023-53270.html * https://www.suse.com/security/cve/CVE-2023-53272.html * https://www.suse.com/security/cve/CVE-2023-53273.html * https://www.suse.com/security/cve/CVE-2023-53275.html * https://www.suse.com/security/cve/CVE-2023-53276.html * https://www.suse.com/security/cve/CVE-2023-53277.html * https://www.suse.com/security/cve/CVE-2023-53280.html * https://www.suse.com/security/cve/CVE-2023-53281.html * https://www.suse.com/security/cve/CVE-2023-53282.html * https://www.suse.com/security/cve/CVE-2023-53286.html * https://www.suse.com/security/cve/CVE-2023-53288.html * https://www.suse.com/security/cve/CVE-2023-53295.html * https://www.suse.com/security/cve/CVE-2023-53297.html * https://www.suse.com/security/cve/CVE-2023-53298.html * https://www.suse.com/security/cve/CVE-2023-53299.html * https://www.suse.com/security/cve/CVE-2023-53302.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53305.html * https://www.suse.com/security/cve/CVE-2023-53307.html * https://www.suse.com/security/cve/CVE-2023-53309.html * https://www.suse.com/security/cve/CVE-2023-53311.html * https://www.suse.com/security/cve/CVE-2023-53313.html * https://www.suse.com/security/cve/CVE-2023-53314.html * https://www.suse.com/security/cve/CVE-2023-53315.html * https://www.suse.com/security/cve/CVE-2023-53316.html * https://www.suse.com/security/cve/CVE-2023-53317.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53324.html * https://www.suse.com/security/cve/CVE-2023-53326.html * https://www.suse.com/security/cve/CVE-2023-53330.html * https://www.suse.com/security/cve/CVE-2023-53331.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53334.html * https://www.suse.com/security/cve/CVE-2023-53335.html * https://www.suse.com/security/cve/CVE-2023-53337.html * https://www.suse.com/security/cve/CVE-2023-53344.html * https://www.suse.com/security/cve/CVE-2023-53349.html * https://www.suse.com/security/cve/CVE-2023-53352.html * https://www.suse.com/security/cve/CVE-2023-53356.html * https://www.suse.com/security/cve/CVE-2023-53359.html * https://www.suse.com/security/cve/CVE-2023-53368.html * https://www.suse.com/security/cve/CVE-2023-53373.html * https://www.suse.com/security/cve/CVE-2023-53375.html * https://www.suse.com/security/cve/CVE-2023-53377.html * https://www.suse.com/security/cve/CVE-2023-53379.html * https://www.suse.com/security/cve/CVE-2023-53380.html * https://www.suse.com/security/cve/CVE-2023-53381.html * https://www.suse.com/security/cve/CVE-2023-53384.html * https://www.suse.com/security/cve/CVE-2023-53386.html * https://www.suse.com/security/cve/CVE-2023-53388.html * https://www.suse.com/security/cve/CVE-2023-53390.html * https://www.suse.com/security/cve/CVE-2023-53393.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53396.html * https://www.suse.com/security/cve/CVE-2023-53400.html * https://www.suse.com/security/cve/CVE-2023-53404.html * https://www.suse.com/security/cve/CVE-2023-53405.html * https://www.suse.com/security/cve/CVE-2023-53406.html * https://www.suse.com/security/cve/CVE-2023-53409.html * https://www.suse.com/security/cve/CVE-2023-53413.html * https://www.suse.com/security/cve/CVE-2023-53414.html * https://www.suse.com/security/cve/CVE-2023-53415.html * https://www.suse.com/security/cve/CVE-2023-53416.html * https://www.suse.com/security/cve/CVE-2023-53422.html * https://www.suse.com/security/cve/CVE-2023-53427.html * https://www.suse.com/security/cve/CVE-2023-53431.html * https://www.suse.com/security/cve/CVE-2023-53435.html * https://www.suse.com/security/cve/CVE-2023-53436.html * https://www.suse.com/security/cve/CVE-2023-53437.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53440.html * https://www.suse.com/security/cve/CVE-2023-53443.html * https://www.suse.com/security/cve/CVE-2023-53446.html * https://www.suse.com/security/cve/CVE-2023-53449.html * https://www.suse.com/security/cve/CVE-2023-53451.html * https://www.suse.com/security/cve/CVE-2023-53452.html * https://www.suse.com/security/cve/CVE-2023-53453.html * https://www.suse.com/security/cve/CVE-2023-53454.html * https://www.suse.com/security/cve/CVE-2023-53457.html * https://www.suse.com/security/cve/CVE-2023-53458.html * https://www.suse.com/security/cve/CVE-2023-53463.html * https://www.suse.com/security/cve/CVE-2023-53464.html * https://www.suse.com/security/cve/CVE-2023-53465.html * https://www.suse.com/security/cve/CVE-2023-53468.html * https://www.suse.com/security/cve/CVE-2023-53471.html * https://www.suse.com/security/cve/CVE-2023-53472.html * https://www.suse.com/security/cve/CVE-2023-53473.html * https://www.suse.com/security/cve/CVE-2023-53474.html * https://www.suse.com/security/cve/CVE-2023-53475.html * https://www.suse.com/security/cve/CVE-2023-53476.html * https://www.suse.com/security/cve/CVE-2023-53485.html * https://www.suse.com/security/cve/CVE-2023-53487.html * https://www.suse.com/security/cve/CVE-2023-53488.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2023-53494.html * https://www.suse.com/security/cve/CVE-2023-53496.html * https://www.suse.com/security/cve/CVE-2023-53498.html * https://www.suse.com/security/cve/CVE-2023-53499.html * https://www.suse.com/security/cve/CVE-2023-53505.html * https://www.suse.com/security/cve/CVE-2023-53506.html * https://www.suse.com/security/cve/CVE-2023-53509.html * https://www.suse.com/security/cve/CVE-2023-53512.html * https://www.suse.com/security/cve/CVE-2023-53513.html * https://www.suse.com/security/cve/CVE-2023-53515.html * https://www.suse.com/security/cve/CVE-2023-53518.html * https://www.suse.com/security/cve/CVE-2023-53519.html * https://www.suse.com/security/cve/CVE-2023-53521.html * https://www.suse.com/security/cve/CVE-2023-53524.html * https://www.suse.com/security/cve/CVE-2023-53525.html * https://www.suse.com/security/cve/CVE-2023-53526.html * https://www.suse.com/security/cve/CVE-2023-53530.html * https://www.suse.com/security/cve/CVE-2024-26583.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-23155.html * https://www.suse.com/security/cve/CVE-2025-37738.html * https://www.suse.com/security/cve/CVE-2025-37885.html * https://www.suse.com/security/cve/CVE-2025-37958.html * https://www.suse.com/security/cve/CVE-2025-38014.html * https://www.suse.com/security/cve/CVE-2025-38084.html * https://www.suse.com/security/cve/CVE-2025-38085.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38470.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1164051 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1202700 * https://bugzilla.suse.com/show_bug.cgi?id=1203063 * https://bugzilla.suse.com/show_bug.cgi?id=1203332 * https://bugzilla.suse.com/show_bug.cgi?id=1204228 * https://bugzilla.suse.com/show_bug.cgi?id=1205128 * https://bugzilla.suse.com/show_bug.cgi?id=1206456 * https://bugzilla.suse.com/show_bug.cgi?id=1206468 * https://bugzilla.suse.com/show_bug.cgi?id=1206883 * https://bugzilla.suse.com/show_bug.cgi?id=1206884 * https://bugzilla.suse.com/show_bug.cgi?id=1207158 * https://bugzilla.suse.com/show_bug.cgi?id=1207621 * https://bugzilla.suse.com/show_bug.cgi?id=1207624 * https://bugzilla.suse.com/show_bug.cgi?id=1207625 * https://bugzilla.suse.com/show_bug.cgi?id=1207628 * https://bugzilla.suse.com/show_bug.cgi?id=1207629 * https://bugzilla.suse.com/show_bug.cgi?id=1207631 * https://bugzilla.suse.com/show_bug.cgi?id=1207645 * https://bugzilla.suse.com/show_bug.cgi?id=1207651 * https://bugzilla.suse.com/show_bug.cgi?id=1208607 * https://bugzilla.suse.com/show_bug.cgi?id=1209287 * https://bugzilla.suse.com/show_bug.cgi?id=1209291 * https://bugzilla.suse.com/show_bug.cgi?id=1210584 * https://bugzilla.suse.com/show_bug.cgi?id=1211960 * https://bugzilla.suse.com/show_bug.cgi?id=1212603 * https://bugzilla.suse.com/show_bug.cgi?id=1213015 * https://bugzilla.suse.com/show_bug.cgi?id=1213016 * https://bugzilla.suse.com/show_bug.cgi?id=1213040 * https://bugzilla.suse.com/show_bug.cgi?id=1213041 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213099 * https://bugzilla.suse.com/show_bug.cgi?id=1213104 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1214953 * https://bugzilla.suse.com/show_bug.cgi?id=1214967 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1215911 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1217790 * https://bugzilla.suse.com/show_bug.cgi?id=1220185 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1236104 * https://bugzilla.suse.com/show_bug.cgi?id=1238160 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1242573 * https://bugzilla.suse.com/show_bug.cgi?id=1242846 * https://bugzilla.suse.com/show_bug.cgi?id=1242960 * https://bugzilla.suse.com/show_bug.cgi?id=1243539 * https://bugzilla.suse.com/show_bug.cgi?id=1244337 * https://bugzilla.suse.com/show_bug.cgi?id=1244732 * https://bugzilla.suse.com/show_bug.cgi?id=1245110 * https://bugzilla.suse.com/show_bug.cgi?id=1245498 * https://bugzilla.suse.com/show_bug.cgi?id=1245499 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1246879 * https://bugzilla.suse.com/show_bug.cgi?id=1246968 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247172 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247288 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249158 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249638 * https://bugzilla.suse.com/show_bug.cgi?id=1249639 * https://bugzilla.suse.com/show_bug.cgi?id=1249641 * https://bugzilla.suse.com/show_bug.cgi?id=1249642 * https://bugzilla.suse.com/show_bug.cgi?id=1249650 * https://bugzilla.suse.com/show_bug.cgi?id=1249651 * https://bugzilla.suse.com/show_bug.cgi?id=1249658 * https://bugzilla.suse.com/show_bug.cgi?id=1249661 * https://bugzilla.suse.com/show_bug.cgi?id=1249664 * https://bugzilla.suse.com/show_bug.cgi?id=1249667 * https://bugzilla.suse.com/show_bug.cgi?id=1249669 * https://bugzilla.suse.com/show_bug.cgi?id=1249677 * https://bugzilla.suse.com/show_bug.cgi?id=1249681 * https://bugzilla.suse.com/show_bug.cgi?id=1249683 * https://bugzilla.suse.com/show_bug.cgi?id=1249685 * https://bugzilla.suse.com/show_bug.cgi?id=1249687 * https://bugzilla.suse.com/show_bug.cgi?id=1249691 * https://bugzilla.suse.com/show_bug.cgi?id=1249695 * https://bugzilla.suse.com/show_bug.cgi?id=1249699 * https://bugzilla.suse.com/show_bug.cgi?id=1249700 * https://bugzilla.suse.com/show_bug.cgi?id=1249701 * https://bugzilla.suse.com/show_bug.cgi?id=1249705 * https://bugzilla.suse.com/show_bug.cgi?id=1249706 * https://bugzilla.suse.com/show_bug.cgi?id=1249707 * https://bugzilla.suse.com/show_bug.cgi?id=1249709 * https://bugzilla.suse.com/show_bug.cgi?id=1249712 * https://bugzilla.suse.com/show_bug.cgi?id=1249713 * https://bugzilla.suse.com/show_bug.cgi?id=1249715 * https://bugzilla.suse.com/show_bug.cgi?id=1249716 * https://bugzilla.suse.com/show_bug.cgi?id=1249718 * https://bugzilla.suse.com/show_bug.cgi?id=1249722 * https://bugzilla.suse.com/show_bug.cgi?id=1249727 * https://bugzilla.suse.com/show_bug.cgi?id=1249730 * https://bugzilla.suse.com/show_bug.cgi?id=1249733 * https://bugzilla.suse.com/show_bug.cgi?id=1249734 * https://bugzilla.suse.com/show_bug.cgi?id=1249739 * https://bugzilla.suse.com/show_bug.cgi?id=1249740 * https://bugzilla.suse.com/show_bug.cgi?id=1249741 * https://bugzilla.suse.com/show_bug.cgi?id=1249742 * https://bugzilla.suse.com/show_bug.cgi?id=1249743 * https://bugzilla.suse.com/show_bug.cgi?id=1249745 * https://bugzilla.suse.com/show_bug.cgi?id=1249746 * https://bugzilla.suse.com/show_bug.cgi?id=1249747 * https://bugzilla.suse.com/show_bug.cgi?id=1249749 * https://bugzilla.suse.com/show_bug.cgi?id=1249750 * https://bugzilla.suse.com/show_bug.cgi?id=1249751 * https://bugzilla.suse.com/show_bug.cgi?id=1249753 * https://bugzilla.suse.com/show_bug.cgi?id=1249758 * https://bugzilla.suse.com/show_bug.cgi?id=1249762 * https://bugzilla.suse.com/show_bug.cgi?id=1249767 * https://bugzilla.suse.com/show_bug.cgi?id=1249777 * https://bugzilla.suse.com/show_bug.cgi?id=1249781 * https://bugzilla.suse.com/show_bug.cgi?id=1249784 * https://bugzilla.suse.com/show_bug.cgi?id=1249791 * https://bugzilla.suse.com/show_bug.cgi?id=1249799 * https://bugzilla.suse.com/show_bug.cgi?id=1249808 * https://bugzilla.suse.com/show_bug.cgi?id=1249810 * https://bugzilla.suse.com/show_bug.cgi?id=1249820 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249827 * https://bugzilla.suse.com/show_bug.cgi?id=1249836 * https://bugzilla.suse.com/show_bug.cgi?id=1249840 * https://bugzilla.suse.com/show_bug.cgi?id=1249844 * https://bugzilla.suse.com/show_bug.cgi?id=1249846 * https://bugzilla.suse.com/show_bug.cgi?id=1249853 * https://bugzilla.suse.com/show_bug.cgi?id=1249858 * https://bugzilla.suse.com/show_bug.cgi?id=1249860 * https://bugzilla.suse.com/show_bug.cgi?id=1249864 * https://bugzilla.suse.com/show_bug.cgi?id=1249865 * https://bugzilla.suse.com/show_bug.cgi?id=1249866 * https://bugzilla.suse.com/show_bug.cgi?id=1249867 * https://bugzilla.suse.com/show_bug.cgi?id=1249868 * https://bugzilla.suse.com/show_bug.cgi?id=1249872 * https://bugzilla.suse.com/show_bug.cgi?id=1249877 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249882 * https://bugzilla.suse.com/show_bug.cgi?id=1249885 * https://bugzilla.suse.com/show_bug.cgi?id=1249890 * https://bugzilla.suse.com/show_bug.cgi?id=1249892 * https://bugzilla.suse.com/show_bug.cgi?id=1249908 * https://bugzilla.suse.com/show_bug.cgi?id=1249910 * https://bugzilla.suse.com/show_bug.cgi?id=1249911 * https://bugzilla.suse.com/show_bug.cgi?id=1249914 * https://bugzilla.suse.com/show_bug.cgi?id=1249917 * https://bugzilla.suse.com/show_bug.cgi?id=1249918 * https://bugzilla.suse.com/show_bug.cgi?id=1249920 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249924 * https://bugzilla.suse.com/show_bug.cgi?id=1249925 * https://bugzilla.suse.com/show_bug.cgi?id=1249927 * https://bugzilla.suse.com/show_bug.cgi?id=1249928 * https://bugzilla.suse.com/show_bug.cgi?id=1249930 * https://bugzilla.suse.com/show_bug.cgi?id=1249933 * https://bugzilla.suse.com/show_bug.cgi?id=1249934 * https://bugzilla.suse.com/show_bug.cgi?id=1249936 * https://bugzilla.suse.com/show_bug.cgi?id=1249938 * https://bugzilla.suse.com/show_bug.cgi?id=1249939 * https://bugzilla.suse.com/show_bug.cgi?id=1249944 * https://bugzilla.suse.com/show_bug.cgi?id=1249947 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1249950 * https://bugzilla.suse.com/show_bug.cgi?id=1249954 * https://bugzilla.suse.com/show_bug.cgi?id=1249958 * https://bugzilla.suse.com/show_bug.cgi?id=1249979 * https://bugzilla.suse.com/show_bug.cgi?id=1249981 * https://bugzilla.suse.com/show_bug.cgi?id=1249991 * https://bugzilla.suse.com/show_bug.cgi?id=1249997 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250006 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250009 * https://bugzilla.suse.com/show_bug.cgi?id=1250010 * https://bugzilla.suse.com/show_bug.cgi?id=1250011 * https://bugzilla.suse.com/show_bug.cgi?id=1250014 * https://bugzilla.suse.com/show_bug.cgi?id=1250015 * https://bugzilla.suse.com/show_bug.cgi?id=1250023 * https://bugzilla.suse.com/show_bug.cgi?id=1250024 * https://bugzilla.suse.com/show_bug.cgi?id=1250026 * https://bugzilla.suse.com/show_bug.cgi?id=1250039 * https://bugzilla.suse.com/show_bug.cgi?id=1250041 * https://bugzilla.suse.com/show_bug.cgi?id=1250043 * https://bugzilla.suse.com/show_bug.cgi?id=1250044 * https://bugzilla.suse.com/show_bug.cgi?id=1250047 * https://bugzilla.suse.com/show_bug.cgi?id=1250049 * https://bugzilla.suse.com/show_bug.cgi?id=1250052 * https://bugzilla.suse.com/show_bug.cgi?id=1250055 * https://bugzilla.suse.com/show_bug.cgi?id=1250058 * https://bugzilla.suse.com/show_bug.cgi?id=1250060 * https://bugzilla.suse.com/show_bug.cgi?id=1250062 * https://bugzilla.suse.com/show_bug.cgi?id=1250065 * https://bugzilla.suse.com/show_bug.cgi?id=1250066 * https://bugzilla.suse.com/show_bug.cgi?id=1250070 * https://bugzilla.suse.com/show_bug.cgi?id=1250071 * https://bugzilla.suse.com/show_bug.cgi?id=1250072 * https://bugzilla.suse.com/show_bug.cgi?id=1250077 * https://bugzilla.suse.com/show_bug.cgi?id=1250080 * https://bugzilla.suse.com/show_bug.cgi?id=1250081 * https://bugzilla.suse.com/show_bug.cgi?id=1250083 * https://bugzilla.suse.com/show_bug.cgi?id=1250105 * https://bugzilla.suse.com/show_bug.cgi?id=1250106 * https://bugzilla.suse.com/show_bug.cgi?id=1250107 * https://bugzilla.suse.com/show_bug.cgi?id=1250108 * https://bugzilla.suse.com/show_bug.cgi?id=1250114 * https://bugzilla.suse.com/show_bug.cgi?id=1250118 * https://bugzilla.suse.com/show_bug.cgi?id=1250121 * https://bugzilla.suse.com/show_bug.cgi?id=1250127 * https://bugzilla.suse.com/show_bug.cgi?id=1250128 * https://bugzilla.suse.com/show_bug.cgi?id=1250131 * https://bugzilla.suse.com/show_bug.cgi?id=1250132 * https://bugzilla.suse.com/show_bug.cgi?id=1250137 * https://bugzilla.suse.com/show_bug.cgi?id=1250138 * https://bugzilla.suse.com/show_bug.cgi?id=1250140 * https://bugzilla.suse.com/show_bug.cgi?id=1250145 * https://bugzilla.suse.com/show_bug.cgi?id=1250151 * https://bugzilla.suse.com/show_bug.cgi?id=1250153 * https://bugzilla.suse.com/show_bug.cgi?id=1250156 * https://bugzilla.suse.com/show_bug.cgi?id=1250159 * https://bugzilla.suse.com/show_bug.cgi?id=1250161 * https://bugzilla.suse.com/show_bug.cgi?id=1250168 * https://bugzilla.suse.com/show_bug.cgi?id=1250178 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250181 * https://bugzilla.suse.com/show_bug.cgi?id=1250182 * https://bugzilla.suse.com/show_bug.cgi?id=1250183 * https://bugzilla.suse.com/show_bug.cgi?id=1250184 * https://bugzilla.suse.com/show_bug.cgi?id=1250187 * https://bugzilla.suse.com/show_bug.cgi?id=1250191 * https://bugzilla.suse.com/show_bug.cgi?id=1250197 * https://bugzilla.suse.com/show_bug.cgi?id=1250198 * https://bugzilla.suse.com/show_bug.cgi?id=1250200 * https://bugzilla.suse.com/show_bug.cgi?id=1250209 * https://bugzilla.suse.com/show_bug.cgi?id=1250211 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250245 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250250 * https://bugzilla.suse.com/show_bug.cgi?id=1250257 * https://bugzilla.suse.com/show_bug.cgi?id=1250264 * https://bugzilla.suse.com/show_bug.cgi?id=1250269 * https://bugzilla.suse.com/show_bug.cgi?id=1250277 * https://bugzilla.suse.com/show_bug.cgi?id=1250287 * https://bugzilla.suse.com/show_bug.cgi?id=1250293 * https://bugzilla.suse.com/show_bug.cgi?id=1250301 * https://bugzilla.suse.com/show_bug.cgi?id=1250303 * https://bugzilla.suse.com/show_bug.cgi?id=1250309 * https://bugzilla.suse.com/show_bug.cgi?id=1250311 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250315 * https://bugzilla.suse.com/show_bug.cgi?id=1250316 * https://bugzilla.suse.com/show_bug.cgi?id=1250322 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250324 * https://bugzilla.suse.com/show_bug.cgi?id=1250325 * https://bugzilla.suse.com/show_bug.cgi?id=1250328 * https://bugzilla.suse.com/show_bug.cgi?id=1250331 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250362 * https://bugzilla.suse.com/show_bug.cgi?id=1250363 * https://bugzilla.suse.com/show_bug.cgi?id=1250370 * https://bugzilla.suse.com/show_bug.cgi?id=1250374 * https://bugzilla.suse.com/show_bug.cgi?id=1250391 * https://bugzilla.suse.com/show_bug.cgi?id=1250392 * https://bugzilla.suse.com/show_bug.cgi?id=1250393 * https://bugzilla.suse.com/show_bug.cgi?id=1250394 * https://bugzilla.suse.com/show_bug.cgi?id=1250395 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250412 * https://bugzilla.suse.com/show_bug.cgi?id=1250418 * https://bugzilla.suse.com/show_bug.cgi?id=1250425 * https://bugzilla.suse.com/show_bug.cgi?id=1250428 * https://bugzilla.suse.com/show_bug.cgi?id=1250453 * https://bugzilla.suse.com/show_bug.cgi?id=1250454 * https://bugzilla.suse.com/show_bug.cgi?id=1250457 * https://bugzilla.suse.com/show_bug.cgi?id=1250459 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250759 * https://bugzilla.suse.com/show_bug.cgi?id=1250761 * https://bugzilla.suse.com/show_bug.cgi?id=1250762 * https://bugzilla.suse.com/show_bug.cgi?id=1250763 * https://bugzilla.suse.com/show_bug.cgi?id=1250767 * https://bugzilla.suse.com/show_bug.cgi?id=1250768 * https://bugzilla.suse.com/show_bug.cgi?id=1250774 * https://bugzilla.suse.com/show_bug.cgi?id=1250781 * https://bugzilla.suse.com/show_bug.cgi?id=1250784 * https://bugzilla.suse.com/show_bug.cgi?id=1250786 * https://bugzilla.suse.com/show_bug.cgi?id=1250787 * https://bugzilla.suse.com/show_bug.cgi?id=1250790 * https://bugzilla.suse.com/show_bug.cgi?id=1250791 * https://bugzilla.suse.com/show_bug.cgi?id=1250792 * https://bugzilla.suse.com/show_bug.cgi?id=1250797 * https://bugzilla.suse.com/show_bug.cgi?id=1250799 * https://bugzilla.suse.com/show_bug.cgi?id=1250807 * https://bugzilla.suse.com/show_bug.cgi?id=1250810 * https://bugzilla.suse.com/show_bug.cgi?id=1250811 * https://bugzilla.suse.com/show_bug.cgi?id=1250818 * https://bugzilla.suse.com/show_bug.cgi?id=1250819 * https://bugzilla.suse.com/show_bug.cgi?id=1250822 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250824 * https://bugzilla.suse.com/show_bug.cgi?id=1250825 * https://bugzilla.suse.com/show_bug.cgi?id=1250830 * https://bugzilla.suse.com/show_bug.cgi?id=1250831 * https://bugzilla.suse.com/show_bug.cgi?id=1250839 * https://bugzilla.suse.com/show_bug.cgi?id=1250841 * https://bugzilla.suse.com/show_bug.cgi?id=1250842 * https://bugzilla.suse.com/show_bug.cgi?id=1250843 * https://bugzilla.suse.com/show_bug.cgi?id=1250846 * https://bugzilla.suse.com/show_bug.cgi?id=1250847 * https://bugzilla.suse.com/show_bug.cgi?id=1250848 * https://bugzilla.suse.com/show_bug.cgi?id=1250850 * https://bugzilla.suse.com/show_bug.cgi?id=1250851 * https://bugzilla.suse.com/show_bug.cgi?id=1250853 * https://bugzilla.suse.com/show_bug.cgi?id=1250856 * https://bugzilla.suse.com/show_bug.cgi?id=1250863 * https://bugzilla.suse.com/show_bug.cgi?id=1250864 * https://bugzilla.suse.com/show_bug.cgi?id=1250866 * https://bugzilla.suse.com/show_bug.cgi?id=1250867 * https://bugzilla.suse.com/show_bug.cgi?id=1250868 * https://bugzilla.suse.com/show_bug.cgi?id=1250872 * https://bugzilla.suse.com/show_bug.cgi?id=1250874 * https://bugzilla.suse.com/show_bug.cgi?id=1250875 * https://bugzilla.suse.com/show_bug.cgi?id=1250877 * https://bugzilla.suse.com/show_bug.cgi?id=1250879 * https://bugzilla.suse.com/show_bug.cgi?id=1250883 * https://bugzilla.suse.com/show_bug.cgi?id=1250887 * https://bugzilla.suse.com/show_bug.cgi?id=1250888 * https://bugzilla.suse.com/show_bug.cgi?id=1250889 * https://bugzilla.suse.com/show_bug.cgi?id=1250890 * https://bugzilla.suse.com/show_bug.cgi?id=1250891 * https://bugzilla.suse.com/show_bug.cgi?id=1250905 * https://bugzilla.suse.com/show_bug.cgi?id=1250915 * https://bugzilla.suse.com/show_bug.cgi?id=1250917 * https://bugzilla.suse.com/show_bug.cgi?id=1250923 * https://bugzilla.suse.com/show_bug.cgi?id=1250927 * https://bugzilla.suse.com/show_bug.cgi?id=1250928 * https://bugzilla.suse.com/show_bug.cgi?id=1250948 * https://bugzilla.suse.com/show_bug.cgi?id=1250949 * https://bugzilla.suse.com/show_bug.cgi?id=1250953 * https://bugzilla.suse.com/show_bug.cgi?id=1250955 * https://bugzilla.suse.com/show_bug.cgi?id=1250963 * https://bugzilla.suse.com/show_bug.cgi?id=1250964 * https://bugzilla.suse.com/show_bug.cgi?id=1250965 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 16:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 16:30:03 -0000 Subject: SUSE-SU-2025:03635-1: important: Security update for openssl-1_1 Message-ID: <176071860393.14746.11902395678660922015@smelt2.prg2.suse.org> # Security update for openssl-1_1 Announcement ID: SUSE-SU-2025:03635-1 Release Date: 2025-10-17T14:33:24Z Rating: important References: * bsc#1250232 Cross-References: * CVE-2025-9230 CVSS scores: * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * Legacy Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openssl-1_1 fixes the following issues: * CVE-2025-9230: fixed out of bounds read and write in RFC 3211 KEK unwrap (bsc#1250232) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-3635=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3635=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-3635=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libopenssl1_1-debuginfo-1.1.1w-150700.11.6.1 * openssl-1_1-debuginfo-1.1.1w-150700.11.6.1 * libopenssl1_1-1.1.1w-150700.11.6.1 * openssl-1_1-debugsource-1.1.1w-150700.11.6.1 * Basesystem Module 15-SP7 (x86_64) * libopenssl1_1-32bit-debuginfo-1.1.1w-150700.11.6.1 * libopenssl1_1-32bit-1.1.1w-150700.11.6.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debuginfo-1.1.1w-150700.11.6.1 * libopenssl-1_1-devel-1.1.1w-150700.11.6.1 * openssl-1_1-debugsource-1.1.1w-150700.11.6.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openssl-1_1-debuginfo-1.1.1w-150700.11.6.1 * openssl-1_1-debugsource-1.1.1w-150700.11.6.1 * openssl-1_1-1.1.1w-150700.11.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250232 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 16:36:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 16:36:08 -0000 Subject: SUSE-SU-2025:03634-1: important: Security update for the Linux Kernel Message-ID: <176071896851.14746.9715313776092226445@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03634-1 Release Date: 2025-10-17T14:32:55Z Rating: important References: * bsc#1012628 * bsc#1194869 * bsc#1213061 * bsc#1213545 * bsc#1213666 * bsc#1214073 * bsc#1214928 * bsc#1214953 * bsc#1215150 * bsc#1215199 * bsc#1215696 * bsc#1216436 * bsc#1216976 * bsc#1218644 * bsc#1220186 * bsc#1220419 * bsc#1221858 * bsc#1222323 * bsc#1229165 * bsc#1230062 * bsc#1230557 * bsc#1230708 * bsc#1233120 * bsc#1234156 * bsc#1236897 * bsc#1237449 * bsc#1237776 * bsc#1240324 * bsc#1240708 * bsc#1240890 * bsc#1241166 * bsc#1241292 * bsc#1241353 * bsc#1241866 * bsc#1242034 * bsc#1242754 * bsc#1242960 * bsc#1243100 * bsc#1243112 * bsc#1244734 * bsc#1244930 * bsc#1245193 * bsc#1245260 * bsc#1245663 * bsc#1245700 * bsc#1245710 * bsc#1245767 * bsc#1245780 * bsc#1245815 * bsc#1245956 * bsc#1245973 * bsc#1245977 * bsc#1246005 * bsc#1246012 * bsc#1246057 * bsc#1246125 * bsc#1246181 * bsc#1246190 * bsc#1246193 * bsc#1246248 * bsc#1246298 * bsc#1246509 * bsc#1246782 * bsc#1247057 * bsc#1247078 * bsc#1247099 * bsc#1247112 * bsc#1247116 * bsc#1247118 * bsc#1247119 * bsc#1247126 * bsc#1247136 * bsc#1247137 * bsc#1247155 * bsc#1247162 * bsc#1247167 * bsc#1247223 * bsc#1247229 * bsc#1247239 * bsc#1247243 * bsc#1247262 * bsc#1247280 * bsc#1247313 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247712 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248108 * bsc#1248111 * bsc#1248121 * bsc#1248164 * bsc#1248166 * bsc#1248178 * bsc#1248179 * bsc#1248180 * bsc#1248183 * bsc#1248186 * bsc#1248192 * bsc#1248194 * bsc#1248196 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248223 * bsc#1248225 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248360 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248614 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248626 * bsc#1248628 * bsc#1248634 * bsc#1248636 * bsc#1248639 * bsc#1248643 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248733 * bsc#1248734 * bsc#1248735 * bsc#1248746 * bsc#1248748 * bsc#1248775 * bsc#1248847 * bsc#1249022 * bsc#1249122 * bsc#1249123 * bsc#1249124 * bsc#1249125 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249186 * bsc#1249190 * bsc#1249194 * bsc#1249195 * bsc#1249196 * bsc#1249199 * bsc#1249200 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249255 * bsc#1249257 * bsc#1249258 * bsc#1249260 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249299 * bsc#1249300 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249308 * bsc#1249312 * bsc#1249315 * bsc#1249318 * bsc#1249321 * bsc#1249323 * bsc#1249324 * bsc#1249334 * bsc#1249338 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249479 * bsc#1249481 * bsc#1249482 * bsc#1249486 * bsc#1249488 * bsc#1249489 * bsc#1249490 * bsc#1249494 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249548 * bsc#1249554 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249640 * bsc#1249641 * bsc#1249642 * bsc#1249658 * bsc#1249662 * bsc#1249672 * bsc#1249673 * bsc#1249677 * bsc#1249678 * bsc#1249679 * bsc#1249682 * bsc#1249687 * bsc#1249698 * bsc#1249707 * bsc#1249712 * bsc#1249730 * bsc#1249756 * bsc#1249758 * bsc#1249761 * bsc#1249762 * bsc#1249768 * bsc#1249770 * bsc#1249774 * bsc#1249779 * bsc#1249780 * bsc#1249785 * bsc#1249787 * bsc#1249795 * bsc#1249815 * bsc#1249820 * bsc#1249823 * bsc#1249824 * bsc#1249825 * bsc#1249826 * bsc#1249833 * bsc#1249842 * bsc#1249845 * bsc#1249849 * bsc#1249850 * bsc#1249853 * bsc#1249856 * bsc#1249861 * bsc#1249863 * bsc#1249864 * bsc#1249865 * bsc#1249866 * bsc#1249869 * bsc#1249870 * bsc#1249880 * bsc#1249883 * bsc#1249888 * bsc#1249894 * bsc#1249896 * bsc#1249897 * bsc#1249901 * bsc#1249911 * bsc#1249917 * bsc#1249919 * bsc#1249923 * bsc#1249926 * bsc#1249938 * bsc#1249949 * bsc#1249950 * bsc#1249952 * bsc#1249975 * bsc#1249979 * bsc#1249984 * bsc#1249988 * bsc#1249990 * bsc#1249993 * bsc#1249994 * bsc#1249997 * bsc#1250002 * bsc#1250004 * bsc#1250006 * bsc#1250007 * bsc#1250012 * bsc#1250022 * bsc#1250024 * bsc#1250025 * bsc#1250028 * bsc#1250029 * bsc#1250035 * bsc#1250049 * bsc#1250055 * bsc#1250057 * bsc#1250058 * bsc#1250062 * bsc#1250063 * bsc#1250065 * bsc#1250066 * bsc#1250067 * bsc#1250069 * bsc#1250070 * bsc#1250073 * bsc#1250074 * bsc#1250088 * bsc#1250089 * bsc#1250106 * bsc#1250112 * bsc#1250117 * bsc#1250120 * bsc#1250125 * bsc#1250127 * bsc#1250128 * bsc#1250145 * bsc#1250150 * bsc#1250156 * bsc#1250157 * bsc#1250161 * bsc#1250163 * bsc#1250166 * bsc#1250167 * bsc#1250169 * bsc#1250171 * bsc#1250177 * bsc#1250179 * bsc#1250180 * bsc#1250186 * bsc#1250196 * bsc#1250198 * bsc#1250199 * bsc#1250201 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250206 * bsc#1250208 * bsc#1250241 * bsc#1250242 * bsc#1250243 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250262 * bsc#1250263 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250290 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250297 * bsc#1250298 * bsc#1250313 * bsc#1250319 * bsc#1250323 * bsc#1250325 * bsc#1250329 * bsc#1250336 * bsc#1250337 * bsc#1250344 * bsc#1250358 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250384 * bsc#1250389 * bsc#1250395 * bsc#1250397 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250426 * bsc#1250450 * bsc#1250459 * bsc#1250519 * bsc#1250522 * bsc#1250530 * bsc#1250655 * bsc#1250712 * bsc#1250713 * bsc#1250732 * bsc#1250736 * bsc#1250741 * bsc#1250759 * bsc#1250763 * bsc#1250765 * bsc#1250807 * bsc#1250808 * bsc#1250809 * bsc#1250812 * bsc#1250813 * bsc#1250815 * bsc#1250816 * bsc#1250820 * bsc#1250823 * bsc#1250825 * bsc#1250827 * bsc#1250830 * bsc#1250831 * bsc#1250837 * bsc#1250841 * bsc#1250861 * bsc#1250863 * bsc#1250867 * bsc#1250872 * bsc#1250873 * bsc#1250878 * bsc#1250905 * bsc#1250907 * bsc#1250917 * bsc#1250918 * bsc#1250923 * bsc#1250926 * bsc#1250928 * bsc#1250929 * bsc#1250930 * bsc#1250931 * bsc#1250941 * bsc#1250942 * bsc#1250949 * bsc#1250952 * bsc#1250957 * bsc#1250964 * jsc#PED-13343 * jsc#PED-13345 Cross-References: * CVE-2023-31248 * CVE-2023-3772 * CVE-2023-3867 * CVE-2023-39197 * CVE-2023-4130 * CVE-2023-42753 * CVE-2023-4515 * CVE-2023-53147 * CVE-2023-53148 * CVE-2023-53150 * CVE-2023-53151 * CVE-2023-53152 * CVE-2023-53165 * CVE-2023-53167 * CVE-2023-53170 * CVE-2023-53174 * CVE-2023-53175 * CVE-2023-53177 * CVE-2023-53179 * CVE-2023-53180 * CVE-2023-53181 * CVE-2023-53183 * CVE-2023-53184 * CVE-2023-53185 * CVE-2023-53187 * CVE-2023-53189 * CVE-2023-53192 * CVE-2023-53195 * CVE-2023-53196 * CVE-2023-53201 * CVE-2023-53204 * CVE-2023-53205 * CVE-2023-53206 * CVE-2023-53207 * CVE-2023-53208 * CVE-2023-53209 * CVE-2023-53210 * CVE-2023-53215 * CVE-2023-53217 * CVE-2023-53220 * CVE-2023-53221 * CVE-2023-53222 * CVE-2023-53226 * CVE-2023-53230 * CVE-2023-53231 * CVE-2023-53235 * CVE-2023-53238 * CVE-2023-53243 * CVE-2023-53245 * CVE-2023-53247 * CVE-2023-53248 * CVE-2023-53249 * CVE-2023-53251 * CVE-2023-53252 * CVE-2023-53255 * CVE-2023-53257 * CVE-2023-53258 * CVE-2023-53260 * CVE-2023-53261 * CVE-2023-53263 * CVE-2023-53264 * CVE-2023-53272 * CVE-2023-53274 * CVE-2023-53275 * CVE-2023-53280 * CVE-2023-53286 * CVE-2023-53287 * CVE-2023-53288 * CVE-2023-53291 * CVE-2023-53292 * CVE-2023-53303 * CVE-2023-53304 * CVE-2023-53305 * CVE-2023-53309 * CVE-2023-53311 * CVE-2023-53312 * CVE-2023-53313 * CVE-2023-53314 * CVE-2023-53316 * CVE-2023-53319 * CVE-2023-53321 * CVE-2023-53322 * CVE-2023-53323 * CVE-2023-53324 * CVE-2023-53325 * CVE-2023-53328 * CVE-2023-53331 * CVE-2023-53333 * CVE-2023-53336 * CVE-2023-53338 * CVE-2023-53339 * CVE-2023-53342 * CVE-2023-53343 * CVE-2023-53350 * CVE-2023-53352 * CVE-2023-53354 * CVE-2023-53356 * CVE-2023-53357 * CVE-2023-53360 * CVE-2023-53362 * CVE-2023-53364 * CVE-2023-53365 * CVE-2023-53367 * CVE-2023-53368 * CVE-2023-53369 * CVE-2023-53370 * CVE-2023-53371 * CVE-2023-53374 * CVE-2023-53377 * CVE-2023-53379 * CVE-2023-53380 * CVE-2023-53384 * CVE-2023-53385 * CVE-2023-53386 * CVE-2023-53391 * CVE-2023-53394 * CVE-2023-53395 * CVE-2023-53397 * CVE-2023-53401 * CVE-2023-53420 * CVE-2023-53421 * CVE-2023-53424 * CVE-2023-53425 * CVE-2023-53426 * CVE-2023-53428 * CVE-2023-53429 * CVE-2023-53432 * CVE-2023-53436 * CVE-2023-53438 * CVE-2023-53441 * CVE-2023-53442 * CVE-2023-53444 * CVE-2023-53446 * CVE-2023-53447 * CVE-2023-53448 * CVE-2023-53451 * CVE-2023-53454 * CVE-2023-53456 * CVE-2023-53457 * CVE-2023-53461 * CVE-2023-53462 * CVE-2023-53463 * CVE-2023-53465 * CVE-2023-53472 * CVE-2023-53479 * CVE-2023-53480 * CVE-2023-53485 * CVE-2023-53487 * CVE-2023-53488 * CVE-2023-53490 * CVE-2023-53491 * CVE-2023-53492 * CVE-2023-53493 * CVE-2023-53495 * CVE-2023-53496 * CVE-2023-53500 * CVE-2023-53501 * CVE-2023-53504 * CVE-2023-53505 * CVE-2023-53507 * CVE-2023-53508 * CVE-2023-53510 * CVE-2023-53515 * CVE-2023-53516 * CVE-2023-53518 * CVE-2023-53519 * CVE-2023-53520 * CVE-2023-53523 * CVE-2023-53526 * CVE-2023-53527 * CVE-2023-53528 * CVE-2023-53530 * CVE-2023-53531 * CVE-2024-26584 * CVE-2024-26661 * CVE-2024-46733 * CVE-2024-53125 * CVE-2024-58090 * CVE-2024-58238 * CVE-2024-58239 * CVE-2024-58240 * CVE-2025-22022 * CVE-2025-37885 * CVE-2025-38006 * CVE-2025-38075 * CVE-2025-38103 * CVE-2025-38119 * CVE-2025-38125 * CVE-2025-38146 * CVE-2025-38160 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38190 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38234 * CVE-2025-38245 * CVE-2025-38251 * CVE-2025-38255 * CVE-2025-38263 * CVE-2025-38351 * CVE-2025-38360 * CVE-2025-38402 * CVE-2025-38408 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38439 * CVE-2025-38441 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38456 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38464 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38472 * CVE-2025-38488 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38510 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38514 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38544 * CVE-2025-38546 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38553 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38590 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38630 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38645 * CVE-2025-38646 * CVE-2025-38650 * CVE-2025-38656 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38663 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38697 * CVE-2025-38698 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38712 * CVE-2025-38713 * CVE-2025-38714 * CVE-2025-38715 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39743 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39790 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39835 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39846 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39882 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39891 * CVE-2025-39907 * CVE-2025-39920 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-40300 CVSS scores: * CVE-2023-31248 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-31248 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-39197 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2023-39197 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-4130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-4130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-42753 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42753 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4515 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-4515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53148 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53150 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53150 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53151 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-53167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53183 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53195 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53196 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53209 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53209 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53215 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53215 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53222 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53243 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53243 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53245 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53247 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53249 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53249 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53252 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53255 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53255 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53257 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53257 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53260 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53261 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53261 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53263 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53263 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53264 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53264 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53272 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53272 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53274 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2023-53275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53280 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53280 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53292 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53292 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53311 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53311 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53314 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53314 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53316 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53316 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53321 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53321 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53322 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53322 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53323 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53324 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53324 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53336 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53338 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53338 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53339 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53357 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53385 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53391 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53395 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53401 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53425 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53425 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53428 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53432 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53438 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53438 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53442 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53442 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53454 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53454 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-53457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53461 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53461 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53462 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53462 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53480 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53485 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53485 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53491 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53491 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53496 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53507 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53507 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53508 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53508 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53510 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53510 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53515 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53515 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53518 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53518 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53519 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53519 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53520 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53520 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53523 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53523 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53526 ( SUSE ): 0.0 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53526 ( SUSE ): 0.0 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53527 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53527 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53528 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53528 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53531 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53531 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26584 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26584 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46733 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53125 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58238 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58240 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-58240 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22022 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22022 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38697 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38698 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38698 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38712 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38713 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38713 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38714 ( SUSE ): 5.4 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38714 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H * CVE-2025-38715 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39743 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39743 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39920 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39920 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 445 vulnerabilities, contains two features and has 61 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-53261: coresight: Fix memory leak in acpi_buffer->pointer (bsc#1249770). * CVE-2024-46733: btrfs: fix qgroup reserve leaks in cow_file_range (bsc#1230708). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292). * CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't postable (bsc#1242960). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38466: perf: Revert to requiring CAP_SYS_ADMIN for uprobes (bsc#1247442). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38506: KVM: Allow CPU to reschedule while setting per-page memory attributes (bsc#1248186). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38520: drm/amdkfd: Do not call mmput from MMU notifier callback (bsc#1248217). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38528: bpf: Reject %p% format string in bprintf-like helpers (bsc#1248198). * CVE-2025-38531: iio: common: st_sensors: Fix use of uninitialize device structs (bsc#1248205). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38585: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (bsc#1248355). * CVE-2025-38590: net/mlx5e: Remove skb secpath if xfrm state is not found (bsc#1248360). * CVE-2025-38591: bpf: Reject narrower access to pointer ctx fields (bsc#1248363). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38595: xen: fix UAF in dmabuf_exp_from_pages() (bsc#1248380). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38605: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (bsc#1248334). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38645: net/mlx5: Check device memory pointer before usage (bsc#1248626). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38668: regulator: core: fix NULL dereference on unbind due to stale coupling data (bsc#1248647). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38679: media: venus: Fix OOB read due to missing payload bound check (bsc#1249202). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38721: netfilter: ctnetlink: fix refcount leak on table dump (bsc#1249176). * CVE-2025-38722: habanalabs: fix UAF in export_dmabuf() (bsc#1249163). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38732: netfilter: nf_reject: do not leak dst refcount for loopback packets (bsc#1249262). * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324). * CVE-2025-38735: gve: prevent ethtool ops after shutdown (bsc#1249288). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39678: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non- NULL (bsc#1249290). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295). * CVE-2025-39718: vsock/virtio: Validate length in packet header before skb_put() (bsc#1249305). * CVE-2025-39738: btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39764: netfilter: ctnetlink: remove refcounting in expectation dumpers (bsc#1249513). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39787: soc: qcom: mdt_loader: Deal with zero e_shentsize (bsc#1249545). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39810: bnxt_en: Fix memory corruption when FW resources change during ifdown (bsc#1249975). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205). * CVE-2025-39832: net/mlx5: Fix lockdep assertion on sync reset unload event (bsc#1249901). * CVE-2025-39835: xfs: do not propagate ENODATA disk errors into xattr code (bsc#1250025). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292). * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276). * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275). * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). The following non-security bugs were fixed: * 9p/xen: fix init sequence (git-fixes). * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git- fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup (stable- fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: compute LE flow credits based on recvbuf space (git-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: qca: fix invalid device address check (git-fixes). * Bluetooth: qca: fix wcn3991 device address check (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Correct typos of References tags in some patches * Do not self obsolete older kernel variants * Drivers: hv: Always select CONFIG_SYSFB for Hyper-V guests (git-fixes). * Drivers: hv: Select CONFIG_SYSFB only if EFI is enabled (git-fixes). * EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (git- fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: mcp2221: Do not set bus speed on every transfer (stable-fixes). * HID: mcp2221: Handle reads greater than 60 bytes (stable-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * KVM: SVM: Clear current_vmcb during vCPU free for all _possible_ CPUs (git- fixes). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active (git- fixes). * KVM: VMX: Extract checking of guest's DEBUGCTL into helper (git-fixes). * KVM: VMX: Flush shadow VMCS on emergency reboot (git-fixes). * KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2 (git- fixes). * KVM: VMX: Handle forced exit due to preemption timer in fastpath (git- fixes). * KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250336). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Fully defer to vendor code to decide how to force immediate exit (git-fixes). * KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers (git- fixes). * KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108). * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/AER: Fix missing uevent on recovery when a reset is requested (git- fixes). * PCI/ERR: Fix uevent on failure to recover (git-fixes). * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git- fixes). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI/sysfs: Ensure devices are powered for config reads (git-fixes). * PCI: Add ACS quirk for Loongson PCIe (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: apple: Fix missing OF node reference in apple_pcie_setup_port (git- fixes). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: rcar-host: Drop PMSR spinlock (git-fixes). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes). * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes). * PCI: tegra194: Handle errors in BPMP response (git-fixes). * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RAS/AMD/FMPM: Use atl internal.h for INVALID_SPA (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes) * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes) * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes) * RDMA/rxe: Fix race in do_task() when draining (git-fixes) * RDMA/siw: Always report immediate post SQ errors (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * Refresh patches.suse/kernel-add-product-identifying-information-to-kernel- build.patch. (bsc#1249186) * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * afs: Fix potential null pointer dereference in afs_put_server (git-fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1 (git- fixes) * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64: Add support for HIP09 Spectre-BHB mitigation (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes) * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma with Haikou (git-fixes). * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: libata-scsi: Fix CDL control (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * bpf, bpftool: Fix incorrect disasm pc (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Fix iter/task tid filtering (git-fixes). * bpf: Fix link info netfilter flags to populate defrag flag (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Properly test iter/task tid filtering (git-fixes). * bpf: bpftool: Setting error code in do_loader() (git-fixes). * bpf: fix kfunc btf caching for modules (git-fixes). * bpf: handle implicit declaration of function gettid in bpf_iter.c * bpf: skip non exist keys in generic_map_lookup_batch (git-fixes). * bpf: use kvzmalloc to allocate BPF verifier environment (git-fixes). * bpftool: Fix JSON writer resource leak in version command (git-fixes). * bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure (git-fixes). * bpftool: Fix readlink usage in get_fd_type (git-fixes). * bpftool: Mount bpffs when pinmaps path not under the bpffs (git-fixes). * bpftool: fix potential NULL pointer dereferencing in prog_dump() (git- fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add cancellation points to trim loops (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: always update fstrim_range on failure in FITRIM ioctl (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: fix adding block group to a reclaim list and the unused list during reclaim (git-fixes). * btrfs: fix bitmap leak when loading free space cache on duplicate entry (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix the length of reserved qgroup to free (bsc#1240708) * btrfs: make found_logical_ret parameter mandatory for function queue_scrub_stripe() (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: retry block group reclaim without infinite loop (git-fixes). * btrfs: return accurate error code on open failure in open_fs_devices() (bsc#1233120) * btrfs: run delayed iputs when flushing delalloc (git-fixes). * btrfs: scrub: avoid unnecessary csum tree search preparing stripes (git- fixes). * btrfs: scrub: avoid unnecessary extent tree search preparing stripes (git- fixes). * btrfs: scrub: fix grouping of read IO (git-fixes). * btrfs: scrub: remove scrub_ctx::csum_list member (git-fixes). * btrfs: split remaining space to discard in chunks (git-fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: update target inode's ctime on unlink (git-fixes). * btrfs: use SECTOR_SHIFT to convert physical offset to LBA (git-fixes). * build_bug.h: Add KABI assert (bsc#1249186). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * ceph: fix possible integer overflow in ceph_zero_objects() (git-fixes). * ceph: validate snapdirname option length when mounting (git-fixes). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup/rstat: Optimize cgroup_rstat_updated_list() (bsc#1247963). * cgroup/rstat: Reduce cpu_lock hold time in cgroup_rstat_flush_locked() (bsc#1247963). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove cgroup_rstat_flush_atomic() (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Use the fixed and coherent frequency for scaling capacity (stable- fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - add shutdown handler to qat_c3xxx (git-fixes). * crypto: qat - add shutdown handler to qat_c62x (git-fixes). * crypto: qat - add shutdown handler to qat_dh895xcc (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers/base/node: optimize memory block registration to reduce boot time (bsc#1241866). * drivers/base/node: remove register_mem_block_under_node_early() (bsc#1241866). * drivers/base/node: remove register_memory_blocks_under_node() function call from register_one_node (bsc#1241866). * drivers/base/node: rename __register_one_node() to register_one_node() (bsc#1241866). * drivers/base/node: rename register_memory_blocks_under_node() and remove context argument (bsc#1241866). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/ast: Use msleep instead of mdelay for edid read (bsc#1250530). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * et131x: Add missing check after DMA map (stable-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/mnt_idmapping.c: Return -EINVAL when no map is written (bsc#1233120) * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/orangefs: use snprintf() instead of sprintf() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * hfs: fix not erasing deleted b-tree node issue (git-fixes). * hfs: fix slab-out-of-bounds in hfs_bnode_read() (git-fixes). * hfsplus: do not use BUG_ON() in hfsplus_create_attributes_file() (git- fixes). * hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() (git-fixes). * hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * hypfs_create_cpu_files(): add missing check for hypfs_mkdir() failure (git- fixes bsc#1249122). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: enable_rdma devlink param (bsc#1247712). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * jfs: Regular file corruption check (git-fixes). * jfs: truncate good inode pages when hard link is 0 (git-fixes). * jfs: upper bound check of tree index in dbAllocAG (git-fixes). * kABI fix after vsock/virtio: fix `rx_bytes` accounting for stream sockets (git-fixes). * kABI fix for "netfilter: nf_tables: Audit log rule reset" (git-fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for RCU tasks exit tracking (bsc#1246298). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: adjust new field on ip_ct_sctp struct (git-fixes). * kABI: arm64: ftrace: Restore init_module behavior (git-fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: make nft_trans_gc_catchall() public again (git-fixes). * kABI: netfilter flowtable move gc operation to bottom (git-fixes). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: add struct cgroup_extra (bsc#1247963). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kselftest/arm64: Fix check for setting new VLs in sve-ptrace (git-fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * md/md-cluster: handle REMOVE message earlier (bsc#1247057). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: rc: fix races with imon_disconnect() (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * mm/hwpoison: do not send SIGBUS to processes with recovered clean pages (git-fixes). * mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn (git-fixes). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mmc: core: Use GFP_NOIO in ACMD22 (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fallback when MPTCP opts are dropped after 1st data (git-fixes). * mptcp: reset when MPTCP opts are dropped after join (git-fixes). * mtd: nand: raw: atmel: Fix comment in timings preparation (stable-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * netfilter: conntrack: fix extension size table (git-fixes). * netfilter: flowtable: GC pushes back packets to classic path (git-fixes). * netfilter: handle the connecting collision properly in nf_conntrack_proto_sctp (git-fixes). * netfilter: nat: fix ipv6 nat redirect with mapped and scoped addresses (git- fixes). * netfilter: nf_conntrack_bridge: initialize err to 0 (git-fixes). * netfilter: nf_tables: A better name for nft_obj_filter (git-fixes). * netfilter: nf_tables: Audit log rule reset (git-fixes). * netfilter: nf_tables: Carry reset boolean in nft_obj_dump_ctx (git-fixes). * netfilter: nf_tables: Carry s_idx in nft_obj_dump_ctx (git-fixes). * netfilter: nf_tables: Deduplicate nft_register_obj audit logs (git-fixes). * netfilter: nf_tables: Drop pointless memset in nf_tables_dump_obj (git- fixes). * netfilter: nf_tables: Drop pointless memset when dumping rules (git-fixes). * netfilter: nf_tables: Fix entries val in rule reset audit log (git-fixes). * netfilter: nf_tables: Introduce nf_tables_getrule_single() (git-fixes). * netfilter: nf_tables: Open-code audit log call in nf_tables_getrule() (git- fixes). * netfilter: nf_tables: Unbreak audit log reset (git-fixes). * netfilter: nf_tables: Unconditionally allocate nft_obj_filter (git-fixes). * netfilter: nf_tables: audit log object reset once per table (git-fixes). * netfilter: nf_tables: bogus ENOENT when destroying element which does not exist (git-fixes). * netfilter: nf_tables: disallow element removal on anonymous sets (git- fixes). * netfilter: nf_tables: do not remove elements if set backend implements .abort (git-fixes). * netfilter: nf_tables: nft_obj_filter fits into cb->ctx (git-fixes). * netfilter: nf_tables: remove catchall element in GC sync path (git-fixes). * netfilter: nf_tables: revert do not remove elements if set backend implements .abort (git-fixes). * netfilter: nf_tables: split async and sync catchall in two functions (git- fixes). * netfilter: nfnetlink_log: silence bogus compiler warning (git-fixes). * netfilter: nft_payload: fix wrong mac header matching (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync() in catchall GC (git-fixes). * netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation fails (git-fixes). * netfilter: nft_set_rbtree: prefer sync gc to async worker (git-fixes). * netfilter: nft_set_rbtree: rename gc deactivate+erase function (git-fixes). * netfilter: xt_recent: fix (increase) ipv6 literal buffer length (git-fixes). * nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* (git- fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500). * nvme-pci: try function level reset on init failure (git-fixes). * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500). * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500). * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500). * orangefs: Remove unused type in macro fill_default_sys_attrs (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * pcmcia: Add error handling for add_interval() in do_validate_mem() (git- fixes). * pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() (git- fixes). * pcmcia: omap: Add missing check for platform_get_resource (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86: dell-wmi-sysman: Fix class device unregistration (git-fixes). * platform/x86: think-lmi: Fix class device unregistration (git-fixes). * platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches (git- fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/eeh: Rely on dev->link_active_reporting (bsc#1215199). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * rcu-tasks: Add data to eliminate RCU-tasks/do_exit() (bsc#1246298) * rcu-tasks: Eliminate deadlocks involving do_exit() and RCU (bsc#1246298) * rcu-tasks: Initialize callback lists at rcu_init() time (bsc#1246298) * rcu-tasks: Initialize data to eliminate RCU-tasks/do_exit() (bsc#1246298) * rcu-tasks: Maintain lists to eliminate RCU-tasks/do_exit() (bsc#1246298) * rcu-tasks: Maintain real-time response in (bsc#1246298) * rcu/exp: Fix RCU expedited parallel grace period kworker (git-fixes) * rcu/exp: Handle RCU expedited grace period kworker allocation (git-fixes) * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * rpm: Configure KABI checkingness macro (bsc#1249186) * rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186) * rpm: Link arch-symbols script from scripts directory. * rpm: Link guards script from scripts directory. * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249481). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (git-fixes bsc#1248733 LTC#214881). * s390/hypfs: Enable limited access during lockdown (git-fixes bsc#1248733 LTC#214881). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1248735). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249482). * s390/pci: Allow automatic recovery with minimal driver support (git-fixes bsc#1248734 LTC#214880). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249123). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249124). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249125). * s390/vfio-ap: Fix no AP queue sharing allowed message written to kernel log (git-fixes bsc#1249488). * samples/bpf: Fix compilation errors with cf-protection option (git-fixes). * sched/deadline: Collect sched_dl_entity initialization (git-fixes) * sched/fair: Remove unused parameter from sched_asym() (git-fixes) * sched/fair: Take the scheduling domain into account in (git-fixes) * sched/isolation: Fix boot crash when maxcpus < first (git-fixes) * sched/numa, mm: do not try to migrate memory to memoryless (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519). * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519). * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519). * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519). * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519). * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519). * scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519). * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519). * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519). * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519). * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519). * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519). * scsi: lpfc: Use int type to store negative error codes (bsc#1250519). * scsi: lpfc: use min() to improve code (bsc#1250519). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes). * scsi: qla2xxx: Remove firmware URL (git-fixes). * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git- fixes). * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes). * selftests/bpf: Add asserts for netfilter link info (git-fixes). * selftests/bpf: Add cmp_map_pointer_with_const test (git-fixes). * selftests/bpf: Add test cases with CONST_PTR_TO_MAP null checks (git-fixes). * selftests/bpf: adapt one more case in test_lru_map to the new target_free (git-fixes). * selftests/bpf: fexit_sleep: Fix stack allocation for arm64 (git-fixes). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: Fix errno checking in syscall_user_dispatch test (git-fixes). * selftests: bpf: test batch lookup on array of maps with holes (git-fixes). * selftests: rtnetlink.sh: remove esp4_offload after test (git-fixes). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * struct cdc_ncm_ctx: hide new member filtering_supported (git-fixes). * struct ci_hdrc: new member has_short_pkt_limit to end (git-fixes). * struct l2cap_chan: shift new member rx_avail to end (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: mark hyperv_drm as external * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: chipidea: add CI_HDRC_HAS_SHORT_PKT_LIMIT flag (git-fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: core: Fix system suspend on TI AM62 platforms (git-fixes). * usb: dwc3: fix fault at system suspend if device was already runtime suspended (git-fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpci: use GENMASK() for TCPC_ROLE_CTRL_CC[12] (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix non-contaminant CC handling (git-fixes). * usb: typec: tcpm/tcpci_maxim: use GENMASK() for TCPC_VENDOR_CC_CTRL2 register (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix invalid pointer dereference in Etron workaround (git-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vfs: Add a sysctl for automated deletion of dentry (bsc#1240890). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost-scsi: Return queue full for page alloc failures during copy (git- fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: fix `rx_bytes` accounting for stream sockets (git-fixes). * vsock: Allow retrying on connect() failure (git-fixes). * vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local` (git-fixes). * vsock: avoid timeout during connect() if the socket is closing (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: remove cfg80211_inform_single_bss_frame_data() (git-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtw89: Disable deep power saving for USB/SDIO (stable-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn() (git- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR fails (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/amd_nb: Restrict init function to AMD-based systems (git-fixes). * x86/cpu: Add model number for Intel Clearwater Forest processor (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: Add support for XenServer 6.1 platform device (git-fixes). * xenbus: Allow PVH dom0 a non-local xenstore (git-fixes). * xfs: rearrange code in xfs_inode_item_precommit (bsc#1237449). * xfs: rework datasync tracking and execution (bsc#1237449). * xhci: Fix control transfer error on Etron xHCI host (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3634=1 openSUSE-SLE-15.6-2025-3634=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3634=1 ## Package List: * openSUSE Leap 15.6 (noarch) * kernel-source-azure-6.4.0-150600.8.52.1 * kernel-devel-azure-6.4.0-150600.8.52.1 * openSUSE Leap 15.6 (aarch64 x86_64) * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.52.1 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.52.1 * kernel-azure-extra-debuginfo-6.4.0-150600.8.52.1 * kselftests-kmp-azure-6.4.0-150600.8.52.1 * kernel-azure-optional-debuginfo-6.4.0-150600.8.52.1 * kernel-azure-debugsource-6.4.0-150600.8.52.1 * kernel-azure-optional-6.4.0-150600.8.52.1 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.52.1 * kernel-azure-extra-6.4.0-150600.8.52.1 * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.52.1 * dlm-kmp-azure-6.4.0-150600.8.52.1 * cluster-md-kmp-azure-6.4.0-150600.8.52.1 * kernel-azure-devel-6.4.0-150600.8.52.1 * kernel-azure-debuginfo-6.4.0-150600.8.52.1 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.52.1 * ocfs2-kmp-azure-6.4.0-150600.8.52.1 * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.52.1 * kernel-syms-azure-6.4.0-150600.8.52.1 * gfs2-kmp-azure-6.4.0-150600.8.52.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.52.1 * reiserfs-kmp-azure-6.4.0-150600.8.52.1 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.52.1 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-debuginfo-6.4.0-150600.8.52.1 * kernel-azure-vdso-6.4.0-150600.8.52.1 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.52.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-azure-devel-6.4.0-150600.8.52.1 * kernel-syms-azure-6.4.0-150600.8.52.1 * kernel-azure-debuginfo-6.4.0-150600.8.52.1 * kernel-azure-devel-debuginfo-6.4.0-150600.8.52.1 * kernel-azure-debugsource-6.4.0-150600.8.52.1 * Public Cloud Module 15-SP6 (noarch) * kernel-source-azure-6.4.0-150600.8.52.1 * kernel-devel-azure-6.4.0-150600.8.52.1 ## References: * https://www.suse.com/security/cve/CVE-2023-31248.html * https://www.suse.com/security/cve/CVE-2023-3772.html * https://www.suse.com/security/cve/CVE-2023-3867.html * https://www.suse.com/security/cve/CVE-2023-39197.html * https://www.suse.com/security/cve/CVE-2023-4130.html * https://www.suse.com/security/cve/CVE-2023-42753.html * https://www.suse.com/security/cve/CVE-2023-4515.html * https://www.suse.com/security/cve/CVE-2023-53147.html * https://www.suse.com/security/cve/CVE-2023-53148.html * https://www.suse.com/security/cve/CVE-2023-53150.html * https://www.suse.com/security/cve/CVE-2023-53151.html * https://www.suse.com/security/cve/CVE-2023-53152.html * https://www.suse.com/security/cve/CVE-2023-53165.html * https://www.suse.com/security/cve/CVE-2023-53167.html * https://www.suse.com/security/cve/CVE-2023-53170.html * https://www.suse.com/security/cve/CVE-2023-53174.html * https://www.suse.com/security/cve/CVE-2023-53175.html * https://www.suse.com/security/cve/CVE-2023-53177.html * https://www.suse.com/security/cve/CVE-2023-53179.html * https://www.suse.com/security/cve/CVE-2023-53180.html * https://www.suse.com/security/cve/CVE-2023-53181.html * https://www.suse.com/security/cve/CVE-2023-53183.html * https://www.suse.com/security/cve/CVE-2023-53184.html * https://www.suse.com/security/cve/CVE-2023-53185.html * https://www.suse.com/security/cve/CVE-2023-53187.html * https://www.suse.com/security/cve/CVE-2023-53189.html * https://www.suse.com/security/cve/CVE-2023-53192.html * https://www.suse.com/security/cve/CVE-2023-53195.html * https://www.suse.com/security/cve/CVE-2023-53196.html * https://www.suse.com/security/cve/CVE-2023-53201.html * https://www.suse.com/security/cve/CVE-2023-53204.html * https://www.suse.com/security/cve/CVE-2023-53205.html * https://www.suse.com/security/cve/CVE-2023-53206.html * https://www.suse.com/security/cve/CVE-2023-53207.html * https://www.suse.com/security/cve/CVE-2023-53208.html * https://www.suse.com/security/cve/CVE-2023-53209.html * https://www.suse.com/security/cve/CVE-2023-53210.html * https://www.suse.com/security/cve/CVE-2023-53215.html * https://www.suse.com/security/cve/CVE-2023-53217.html * https://www.suse.com/security/cve/CVE-2023-53220.html * https://www.suse.com/security/cve/CVE-2023-53221.html * https://www.suse.com/security/cve/CVE-2023-53222.html * https://www.suse.com/security/cve/CVE-2023-53226.html * https://www.suse.com/security/cve/CVE-2023-53230.html * https://www.suse.com/security/cve/CVE-2023-53231.html * https://www.suse.com/security/cve/CVE-2023-53235.html * https://www.suse.com/security/cve/CVE-2023-53238.html * https://www.suse.com/security/cve/CVE-2023-53243.html * https://www.suse.com/security/cve/CVE-2023-53245.html * https://www.suse.com/security/cve/CVE-2023-53247.html * https://www.suse.com/security/cve/CVE-2023-53248.html * https://www.suse.com/security/cve/CVE-2023-53249.html * https://www.suse.com/security/cve/CVE-2023-53251.html * https://www.suse.com/security/cve/CVE-2023-53252.html * https://www.suse.com/security/cve/CVE-2023-53255.html * https://www.suse.com/security/cve/CVE-2023-53257.html * https://www.suse.com/security/cve/CVE-2023-53258.html * https://www.suse.com/security/cve/CVE-2023-53260.html * https://www.suse.com/security/cve/CVE-2023-53261.html * https://www.suse.com/security/cve/CVE-2023-53263.html * https://www.suse.com/security/cve/CVE-2023-53264.html * https://www.suse.com/security/cve/CVE-2023-53272.html * https://www.suse.com/security/cve/CVE-2023-53274.html * https://www.suse.com/security/cve/CVE-2023-53275.html * https://www.suse.com/security/cve/CVE-2023-53280.html * https://www.suse.com/security/cve/CVE-2023-53286.html * https://www.suse.com/security/cve/CVE-2023-53287.html * https://www.suse.com/security/cve/CVE-2023-53288.html * https://www.suse.com/security/cve/CVE-2023-53291.html * https://www.suse.com/security/cve/CVE-2023-53292.html * https://www.suse.com/security/cve/CVE-2023-53303.html * https://www.suse.com/security/cve/CVE-2023-53304.html * https://www.suse.com/security/cve/CVE-2023-53305.html * https://www.suse.com/security/cve/CVE-2023-53309.html * https://www.suse.com/security/cve/CVE-2023-53311.html * https://www.suse.com/security/cve/CVE-2023-53312.html * https://www.suse.com/security/cve/CVE-2023-53313.html * https://www.suse.com/security/cve/CVE-2023-53314.html * https://www.suse.com/security/cve/CVE-2023-53316.html * https://www.suse.com/security/cve/CVE-2023-53319.html * https://www.suse.com/security/cve/CVE-2023-53321.html * https://www.suse.com/security/cve/CVE-2023-53322.html * https://www.suse.com/security/cve/CVE-2023-53323.html * https://www.suse.com/security/cve/CVE-2023-53324.html * https://www.suse.com/security/cve/CVE-2023-53325.html * https://www.suse.com/security/cve/CVE-2023-53328.html * https://www.suse.com/security/cve/CVE-2023-53331.html * https://www.suse.com/security/cve/CVE-2023-53333.html * https://www.suse.com/security/cve/CVE-2023-53336.html * https://www.suse.com/security/cve/CVE-2023-53338.html * https://www.suse.com/security/cve/CVE-2023-53339.html * https://www.suse.com/security/cve/CVE-2023-53342.html * https://www.suse.com/security/cve/CVE-2023-53343.html * https://www.suse.com/security/cve/CVE-2023-53350.html * https://www.suse.com/security/cve/CVE-2023-53352.html * https://www.suse.com/security/cve/CVE-2023-53354.html * https://www.suse.com/security/cve/CVE-2023-53356.html * https://www.suse.com/security/cve/CVE-2023-53357.html * https://www.suse.com/security/cve/CVE-2023-53360.html * https://www.suse.com/security/cve/CVE-2023-53362.html * https://www.suse.com/security/cve/CVE-2023-53364.html * https://www.suse.com/security/cve/CVE-2023-53365.html * https://www.suse.com/security/cve/CVE-2023-53367.html * https://www.suse.com/security/cve/CVE-2023-53368.html * https://www.suse.com/security/cve/CVE-2023-53369.html * https://www.suse.com/security/cve/CVE-2023-53370.html * https://www.suse.com/security/cve/CVE-2023-53371.html * https://www.suse.com/security/cve/CVE-2023-53374.html * https://www.suse.com/security/cve/CVE-2023-53377.html * https://www.suse.com/security/cve/CVE-2023-53379.html * https://www.suse.com/security/cve/CVE-2023-53380.html * https://www.suse.com/security/cve/CVE-2023-53384.html * https://www.suse.com/security/cve/CVE-2023-53385.html * https://www.suse.com/security/cve/CVE-2023-53386.html * https://www.suse.com/security/cve/CVE-2023-53391.html * https://www.suse.com/security/cve/CVE-2023-53394.html * https://www.suse.com/security/cve/CVE-2023-53395.html * https://www.suse.com/security/cve/CVE-2023-53397.html * https://www.suse.com/security/cve/CVE-2023-53401.html * https://www.suse.com/security/cve/CVE-2023-53420.html * https://www.suse.com/security/cve/CVE-2023-53421.html * https://www.suse.com/security/cve/CVE-2023-53424.html * https://www.suse.com/security/cve/CVE-2023-53425.html * https://www.suse.com/security/cve/CVE-2023-53426.html * https://www.suse.com/security/cve/CVE-2023-53428.html * https://www.suse.com/security/cve/CVE-2023-53429.html * https://www.suse.com/security/cve/CVE-2023-53432.html * https://www.suse.com/security/cve/CVE-2023-53436.html * https://www.suse.com/security/cve/CVE-2023-53438.html * https://www.suse.com/security/cve/CVE-2023-53441.html * https://www.suse.com/security/cve/CVE-2023-53442.html * https://www.suse.com/security/cve/CVE-2023-53444.html * https://www.suse.com/security/cve/CVE-2023-53446.html * https://www.suse.com/security/cve/CVE-2023-53447.html * https://www.suse.com/security/cve/CVE-2023-53448.html * https://www.suse.com/security/cve/CVE-2023-53451.html * https://www.suse.com/security/cve/CVE-2023-53454.html * https://www.suse.com/security/cve/CVE-2023-53456.html * https://www.suse.com/security/cve/CVE-2023-53457.html * https://www.suse.com/security/cve/CVE-2023-53461.html * https://www.suse.com/security/cve/CVE-2023-53462.html * https://www.suse.com/security/cve/CVE-2023-53463.html * https://www.suse.com/security/cve/CVE-2023-53465.html * https://www.suse.com/security/cve/CVE-2023-53472.html * https://www.suse.com/security/cve/CVE-2023-53479.html * https://www.suse.com/security/cve/CVE-2023-53480.html * https://www.suse.com/security/cve/CVE-2023-53485.html * https://www.suse.com/security/cve/CVE-2023-53487.html * https://www.suse.com/security/cve/CVE-2023-53488.html * https://www.suse.com/security/cve/CVE-2023-53490.html * https://www.suse.com/security/cve/CVE-2023-53491.html * https://www.suse.com/security/cve/CVE-2023-53492.html * https://www.suse.com/security/cve/CVE-2023-53493.html * https://www.suse.com/security/cve/CVE-2023-53495.html * https://www.suse.com/security/cve/CVE-2023-53496.html * https://www.suse.com/security/cve/CVE-2023-53500.html * https://www.suse.com/security/cve/CVE-2023-53501.html * https://www.suse.com/security/cve/CVE-2023-53504.html * https://www.suse.com/security/cve/CVE-2023-53505.html * https://www.suse.com/security/cve/CVE-2023-53507.html * https://www.suse.com/security/cve/CVE-2023-53508.html * https://www.suse.com/security/cve/CVE-2023-53510.html * https://www.suse.com/security/cve/CVE-2023-53515.html * https://www.suse.com/security/cve/CVE-2023-53516.html * https://www.suse.com/security/cve/CVE-2023-53518.html * https://www.suse.com/security/cve/CVE-2023-53519.html * https://www.suse.com/security/cve/CVE-2023-53520.html * https://www.suse.com/security/cve/CVE-2023-53523.html * https://www.suse.com/security/cve/CVE-2023-53526.html * https://www.suse.com/security/cve/CVE-2023-53527.html * https://www.suse.com/security/cve/CVE-2023-53528.html * https://www.suse.com/security/cve/CVE-2023-53530.html * https://www.suse.com/security/cve/CVE-2023-53531.html * https://www.suse.com/security/cve/CVE-2024-26584.html * https://www.suse.com/security/cve/CVE-2024-26661.html * https://www.suse.com/security/cve/CVE-2024-46733.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2024-58238.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2024-58240.html * https://www.suse.com/security/cve/CVE-2025-22022.html * https://www.suse.com/security/cve/CVE-2025-37885.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38650.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38663.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38697.html * https://www.suse.com/security/cve/CVE-2025-38698.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38712.html * https://www.suse.com/security/cve/CVE-2025-38713.html * https://www.suse.com/security/cve/CVE-2025-38714.html * https://www.suse.com/security/cve/CVE-2025-38715.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39743.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39846.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39920.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1213061 * https://bugzilla.suse.com/show_bug.cgi?id=1213545 * https://bugzilla.suse.com/show_bug.cgi?id=1213666 * https://bugzilla.suse.com/show_bug.cgi?id=1214073 * https://bugzilla.suse.com/show_bug.cgi?id=1214928 * https://bugzilla.suse.com/show_bug.cgi?id=1214953 * https://bugzilla.suse.com/show_bug.cgi?id=1215150 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215696 * https://bugzilla.suse.com/show_bug.cgi?id=1216436 * https://bugzilla.suse.com/show_bug.cgi?id=1216976 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1220186 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222323 * https://bugzilla.suse.com/show_bug.cgi?id=1229165 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230708 * https://bugzilla.suse.com/show_bug.cgi?id=1233120 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237449 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240890 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241292 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241866 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242754 * https://bugzilla.suse.com/show_bug.cgi?id=1242960 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246298 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1247057 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248164 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248180 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248614 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248636 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248733 * https://bugzilla.suse.com/show_bug.cgi?id=1248734 * https://bugzilla.suse.com/show_bug.cgi?id=1248735 * https://bugzilla.suse.com/show_bug.cgi?id=1248746 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1248847 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249122 * https://bugzilla.suse.com/show_bug.cgi?id=1249123 * https://bugzilla.suse.com/show_bug.cgi?id=1249124 * https://bugzilla.suse.com/show_bug.cgi?id=1249125 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249194 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249196 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249200 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249255 * https://bugzilla.suse.com/show_bug.cgi?id=1249257 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249260 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249481 * https://bugzilla.suse.com/show_bug.cgi?id=1249482 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249488 * https://bugzilla.suse.com/show_bug.cgi?id=1249489 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249640 * https://bugzilla.suse.com/show_bug.cgi?id=1249641 * https://bugzilla.suse.com/show_bug.cgi?id=1249642 * https://bugzilla.suse.com/show_bug.cgi?id=1249658 * https://bugzilla.suse.com/show_bug.cgi?id=1249662 * https://bugzilla.suse.com/show_bug.cgi?id=1249672 * https://bugzilla.suse.com/show_bug.cgi?id=1249673 * https://bugzilla.suse.com/show_bug.cgi?id=1249677 * https://bugzilla.suse.com/show_bug.cgi?id=1249678 * https://bugzilla.suse.com/show_bug.cgi?id=1249679 * https://bugzilla.suse.com/show_bug.cgi?id=1249682 * https://bugzilla.suse.com/show_bug.cgi?id=1249687 * https://bugzilla.suse.com/show_bug.cgi?id=1249698 * https://bugzilla.suse.com/show_bug.cgi?id=1249707 * https://bugzilla.suse.com/show_bug.cgi?id=1249712 * https://bugzilla.suse.com/show_bug.cgi?id=1249730 * https://bugzilla.suse.com/show_bug.cgi?id=1249756 * https://bugzilla.suse.com/show_bug.cgi?id=1249758 * https://bugzilla.suse.com/show_bug.cgi?id=1249761 * https://bugzilla.suse.com/show_bug.cgi?id=1249762 * https://bugzilla.suse.com/show_bug.cgi?id=1249768 * https://bugzilla.suse.com/show_bug.cgi?id=1249770 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249779 * https://bugzilla.suse.com/show_bug.cgi?id=1249780 * https://bugzilla.suse.com/show_bug.cgi?id=1249785 * https://bugzilla.suse.com/show_bug.cgi?id=1249787 * https://bugzilla.suse.com/show_bug.cgi?id=1249795 * https://bugzilla.suse.com/show_bug.cgi?id=1249815 * https://bugzilla.suse.com/show_bug.cgi?id=1249820 * https://bugzilla.suse.com/show_bug.cgi?id=1249823 * https://bugzilla.suse.com/show_bug.cgi?id=1249824 * https://bugzilla.suse.com/show_bug.cgi?id=1249825 * https://bugzilla.suse.com/show_bug.cgi?id=1249826 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249842 * https://bugzilla.suse.com/show_bug.cgi?id=1249845 * https://bugzilla.suse.com/show_bug.cgi?id=1249849 * https://bugzilla.suse.com/show_bug.cgi?id=1249850 * https://bugzilla.suse.com/show_bug.cgi?id=1249853 * https://bugzilla.suse.com/show_bug.cgi?id=1249856 * https://bugzilla.suse.com/show_bug.cgi?id=1249861 * https://bugzilla.suse.com/show_bug.cgi?id=1249863 * https://bugzilla.suse.com/show_bug.cgi?id=1249864 * https://bugzilla.suse.com/show_bug.cgi?id=1249865 * https://bugzilla.suse.com/show_bug.cgi?id=1249866 * https://bugzilla.suse.com/show_bug.cgi?id=1249869 * https://bugzilla.suse.com/show_bug.cgi?id=1249870 * https://bugzilla.suse.com/show_bug.cgi?id=1249880 * https://bugzilla.suse.com/show_bug.cgi?id=1249883 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249894 * https://bugzilla.suse.com/show_bug.cgi?id=1249896 * https://bugzilla.suse.com/show_bug.cgi?id=1249897 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249911 * https://bugzilla.suse.com/show_bug.cgi?id=1249917 * https://bugzilla.suse.com/show_bug.cgi?id=1249919 * https://bugzilla.suse.com/show_bug.cgi?id=1249923 * https://bugzilla.suse.com/show_bug.cgi?id=1249926 * https://bugzilla.suse.com/show_bug.cgi?id=1249938 * https://bugzilla.suse.com/show_bug.cgi?id=1249949 * https://bugzilla.suse.com/show_bug.cgi?id=1249950 * https://bugzilla.suse.com/show_bug.cgi?id=1249952 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1249979 * https://bugzilla.suse.com/show_bug.cgi?id=1249984 * https://bugzilla.suse.com/show_bug.cgi?id=1249988 * https://bugzilla.suse.com/show_bug.cgi?id=1249990 * https://bugzilla.suse.com/show_bug.cgi?id=1249993 * https://bugzilla.suse.com/show_bug.cgi?id=1249994 * https://bugzilla.suse.com/show_bug.cgi?id=1249997 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250004 * https://bugzilla.suse.com/show_bug.cgi?id=1250006 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250012 * https://bugzilla.suse.com/show_bug.cgi?id=1250022 * https://bugzilla.suse.com/show_bug.cgi?id=1250024 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250029 * https://bugzilla.suse.com/show_bug.cgi?id=1250035 * https://bugzilla.suse.com/show_bug.cgi?id=1250049 * https://bugzilla.suse.com/show_bug.cgi?id=1250055 * https://bugzilla.suse.com/show_bug.cgi?id=1250057 * https://bugzilla.suse.com/show_bug.cgi?id=1250058 * https://bugzilla.suse.com/show_bug.cgi?id=1250062 * https://bugzilla.suse.com/show_bug.cgi?id=1250063 * https://bugzilla.suse.com/show_bug.cgi?id=1250065 * https://bugzilla.suse.com/show_bug.cgi?id=1250066 * https://bugzilla.suse.com/show_bug.cgi?id=1250067 * https://bugzilla.suse.com/show_bug.cgi?id=1250069 * https://bugzilla.suse.com/show_bug.cgi?id=1250070 * https://bugzilla.suse.com/show_bug.cgi?id=1250073 * https://bugzilla.suse.com/show_bug.cgi?id=1250074 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250089 * https://bugzilla.suse.com/show_bug.cgi?id=1250106 * https://bugzilla.suse.com/show_bug.cgi?id=1250112 * https://bugzilla.suse.com/show_bug.cgi?id=1250117 * https://bugzilla.suse.com/show_bug.cgi?id=1250120 * https://bugzilla.suse.com/show_bug.cgi?id=1250125 * https://bugzilla.suse.com/show_bug.cgi?id=1250127 * https://bugzilla.suse.com/show_bug.cgi?id=1250128 * https://bugzilla.suse.com/show_bug.cgi?id=1250145 * https://bugzilla.suse.com/show_bug.cgi?id=1250150 * https://bugzilla.suse.com/show_bug.cgi?id=1250156 * https://bugzilla.suse.com/show_bug.cgi?id=1250157 * https://bugzilla.suse.com/show_bug.cgi?id=1250161 * https://bugzilla.suse.com/show_bug.cgi?id=1250163 * https://bugzilla.suse.com/show_bug.cgi?id=1250166 * https://bugzilla.suse.com/show_bug.cgi?id=1250167 * https://bugzilla.suse.com/show_bug.cgi?id=1250169 * https://bugzilla.suse.com/show_bug.cgi?id=1250171 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250180 * https://bugzilla.suse.com/show_bug.cgi?id=1250186 * https://bugzilla.suse.com/show_bug.cgi?id=1250196 * https://bugzilla.suse.com/show_bug.cgi?id=1250198 * https://bugzilla.suse.com/show_bug.cgi?id=1250199 * https://bugzilla.suse.com/show_bug.cgi?id=1250201 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250206 * https://bugzilla.suse.com/show_bug.cgi?id=1250208 * https://bugzilla.suse.com/show_bug.cgi?id=1250241 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250243 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250263 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250290 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250313 * https://bugzilla.suse.com/show_bug.cgi?id=1250319 * https://bugzilla.suse.com/show_bug.cgi?id=1250323 * https://bugzilla.suse.com/show_bug.cgi?id=1250325 * https://bugzilla.suse.com/show_bug.cgi?id=1250329 * https://bugzilla.suse.com/show_bug.cgi?id=1250336 * https://bugzilla.suse.com/show_bug.cgi?id=1250337 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250358 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250384 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250395 * https://bugzilla.suse.com/show_bug.cgi?id=1250397 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250426 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250459 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250530 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250732 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250759 * https://bugzilla.suse.com/show_bug.cgi?id=1250763 * https://bugzilla.suse.com/show_bug.cgi?id=1250765 * https://bugzilla.suse.com/show_bug.cgi?id=1250807 * https://bugzilla.suse.com/show_bug.cgi?id=1250808 * https://bugzilla.suse.com/show_bug.cgi?id=1250809 * https://bugzilla.suse.com/show_bug.cgi?id=1250812 * https://bugzilla.suse.com/show_bug.cgi?id=1250813 * https://bugzilla.suse.com/show_bug.cgi?id=1250815 * https://bugzilla.suse.com/show_bug.cgi?id=1250816 * https://bugzilla.suse.com/show_bug.cgi?id=1250820 * https://bugzilla.suse.com/show_bug.cgi?id=1250823 * https://bugzilla.suse.com/show_bug.cgi?id=1250825 * https://bugzilla.suse.com/show_bug.cgi?id=1250827 * https://bugzilla.suse.com/show_bug.cgi?id=1250830 * https://bugzilla.suse.com/show_bug.cgi?id=1250831 * https://bugzilla.suse.com/show_bug.cgi?id=1250837 * https://bugzilla.suse.com/show_bug.cgi?id=1250841 * https://bugzilla.suse.com/show_bug.cgi?id=1250861 * https://bugzilla.suse.com/show_bug.cgi?id=1250863 * https://bugzilla.suse.com/show_bug.cgi?id=1250867 * https://bugzilla.suse.com/show_bug.cgi?id=1250872 * https://bugzilla.suse.com/show_bug.cgi?id=1250873 * https://bugzilla.suse.com/show_bug.cgi?id=1250878 * https://bugzilla.suse.com/show_bug.cgi?id=1250905 * https://bugzilla.suse.com/show_bug.cgi?id=1250907 * https://bugzilla.suse.com/show_bug.cgi?id=1250917 * https://bugzilla.suse.com/show_bug.cgi?id=1250918 * https://bugzilla.suse.com/show_bug.cgi?id=1250923 * https://bugzilla.suse.com/show_bug.cgi?id=1250926 * https://bugzilla.suse.com/show_bug.cgi?id=1250928 * https://bugzilla.suse.com/show_bug.cgi?id=1250929 * https://bugzilla.suse.com/show_bug.cgi?id=1250930 * https://bugzilla.suse.com/show_bug.cgi?id=1250931 * https://bugzilla.suse.com/show_bug.cgi?id=1250941 * https://bugzilla.suse.com/show_bug.cgi?id=1250942 * https://bugzilla.suse.com/show_bug.cgi?id=1250949 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1250957 * https://bugzilla.suse.com/show_bug.cgi?id=1250964 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 16:39:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 16:39:13 -0000 Subject: SUSE-SU-2025:03633-1: important: Security update for the Linux Kernel Message-ID: <176071915361.14746.11660920350448662146@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:03633-1 Release Date: 2025-10-17T14:32:41Z Rating: important References: * bsc#1012628 * bsc#1170284 * bsc#1212533 * bsc#1213545 * bsc#1215199 * bsc#1216527 * bsc#1218644 * bsc#1221858 * bsc#1222323 * bsc#1227555 * bsc#1230062 * bsc#1230557 * bsc#1230708 * bsc#1233120 * bsc#1236897 * bsc#1237449 * bsc#1237776 * bsc#1238782 * bsc#1240324 * bsc#1240708 * bsc#1240890 * bsc#1241166 * bsc#1241292 * bsc#1241353 * bsc#1241866 * bsc#1242034 * bsc#1242754 * bsc#1242960 * bsc#1243112 * bsc#1244734 * bsc#1244930 * bsc#1245410 * bsc#1245538 * bsc#1245663 * bsc#1245700 * bsc#1245710 * bsc#1245767 * bsc#1245780 * bsc#1245815 * bsc#1245956 * bsc#1245963 * bsc#1245973 * bsc#1245977 * bsc#1246005 * bsc#1246012 * bsc#1246057 * bsc#1246181 * bsc#1246190 * bsc#1246193 * bsc#1246248 * bsc#1246298 * bsc#1246509 * bsc#1246782 * bsc#1247057 * bsc#1247078 * bsc#1247099 * bsc#1247112 * bsc#1247116 * bsc#1247119 * bsc#1247126 * bsc#1247136 * bsc#1247137 * bsc#1247155 * bsc#1247162 * bsc#1247167 * bsc#1247223 * bsc#1247229 * bsc#1247239 * bsc#1247243 * bsc#1247262 * bsc#1247280 * bsc#1247290 * bsc#1247313 * bsc#1247442 * bsc#1247483 * bsc#1247712 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248108 * bsc#1248111 * bsc#1248121 * bsc#1248164 * bsc#1248166 * bsc#1248175 * bsc#1248178 * bsc#1248179 * bsc#1248180 * bsc#1248183 * bsc#1248186 * bsc#1248192 * bsc#1248194 * bsc#1248196 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248223 * bsc#1248225 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248232 * bsc#1248240 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248360 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248368 * bsc#1248370 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248614 * bsc#1248616 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248626 * bsc#1248628 * bsc#1248634 * bsc#1248636 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248733 * bsc#1248734 * bsc#1248735 * bsc#1248746 * bsc#1248748 * bsc#1248775 * bsc#1249022 * bsc#1249122 * bsc#1249123 * bsc#1249124 * bsc#1249125 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249163 * bsc#1249172 * bsc#1249176 * bsc#1249183 * bsc#1249186 * bsc#1249193 * bsc#1249201 * bsc#1249202 * bsc#1249206 * bsc#1249258 * bsc#1249262 * bsc#1249274 * bsc#1249284 * bsc#1249290 * bsc#1249295 * bsc#1249300 * bsc#1249303 * bsc#1249305 * bsc#1249306 * bsc#1249315 * bsc#1249333 * bsc#1249334 * bsc#1249346 * bsc#1249374 * bsc#1249481 * bsc#1249482 * bsc#1249488 * bsc#1249494 * bsc#1249504 * bsc#1249508 * bsc#1249510 * bsc#1249513 * bsc#1249516 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249540 * bsc#1249545 * bsc#1249566 * bsc#1249604 * bsc#1249608 * bsc#1249770 * bsc#1249887 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1250002 * bsc#1250021 * bsc#1250025 * bsc#1250057 * bsc#1250179 * bsc#1250251 * bsc#1250267 * bsc#1250294 * bsc#1250334 * bsc#1250336 * bsc#1250344 * bsc#1250365 * bsc#1250407 * bsc#1250522 * bsc#1250530 * bsc#1250574 * bsc#1250655 * bsc#1250722 * bsc#1250952 * jsc#PED-13260 * jsc#PED-13343 * jsc#PED-13345 Cross-References: * CVE-2023-3867 * CVE-2023-4130 * CVE-2023-4515 * CVE-2023-53261 * CVE-2023-5633 * CVE-2024-26661 * CVE-2024-46733 * CVE-2024-58090 * CVE-2024-58238 * CVE-2024-58239 * CVE-2025-22022 * CVE-2025-37885 * CVE-2025-38006 * CVE-2025-38075 * CVE-2025-38103 * CVE-2025-38119 * CVE-2025-38125 * CVE-2025-38146 * CVE-2025-38160 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38190 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38216 * CVE-2025-38234 * CVE-2025-38245 * CVE-2025-38251 * CVE-2025-38255 * CVE-2025-38263 * CVE-2025-38351 * CVE-2025-38360 * CVE-2025-38402 * CVE-2025-38408 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38439 * CVE-2025-38440 * CVE-2025-38441 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38456 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38464 * CVE-2025-38466 * CVE-2025-38472 * CVE-2025-38488 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38510 * CVE-2025-38511 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38514 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38521 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38544 * CVE-2025-38546 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38553 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38590 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38628 * CVE-2025-38630 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38645 * CVE-2025-38646 * CVE-2025-38650 * CVE-2025-38656 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38663 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38684 * CVE-2025-38701 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39691 * CVE-2025-39695 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39707 * CVE-2025-39711 * CVE-2025-39718 * CVE-2025-39738 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39749 * CVE-2025-39754 * CVE-2025-39764 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39773 * CVE-2025-39782 * CVE-2025-39787 * CVE-2025-39797 * CVE-2025-39807 * CVE-2025-39811 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39825 * CVE-2025-39830 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39838 * CVE-2025-39842 * CVE-2025-39857 * CVE-2025-39865 * CVE-2025-39885 * CVE-2025-39890 * CVE-2025-39922 * CVE-2025-40300 CVSS scores: * CVE-2023-4130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-4130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4515 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-4515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53261 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53261 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-5633 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5633 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-5633 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46733 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58238 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22022 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-22022 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38440 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N Affected Products: * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves 196 vulnerabilities, contains three features and has 57 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP7 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-53261: coresight: Fix memory leak in acpi_buffer->pointer (bsc#1249770). * CVE-2024-46733: btrfs: fix qgroup reserve leaks in cow_file_range (bsc#1230708). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22022: usb: xhci: Apply the link chain quirk on NEC isoc endpoints (bsc#1241292). * CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't postable (bsc#1242960). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963). * CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38466: perf: Revert to requiring CAP_SYS_ADMIN for uprobes (bsc#1247442). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38506: KVM: Allow CPU to reschedule while setting per-page memory attributes (bsc#1248186). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38520: drm/amdkfd: Do not call mmput from MMU notifier callback (bsc#1248217). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38528: bpf: Reject %p% format string in bprintf-like helpers (bsc#1248198). * CVE-2025-38531: iio: common: st_sensors: Fix use of uninitialize device structs (bsc#1248205). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38585: staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (bsc#1248355). * CVE-2025-38590: net/mlx5e: Remove skb secpath if xfrm state is not found (bsc#1248360). * CVE-2025-38591: bpf: Reject narrower access to pointer ctx fields (bsc#1248363). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38595: xen: fix UAF in dmabuf_exp_from_pages() (bsc#1248380). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38605: wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (bsc#1248334). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38645: net/mlx5: Check device memory pointer before usage (bsc#1248626). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38668: regulator: core: fix NULL dereference on unbind due to stale coupling data (bsc#1248647). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38679: media: venus: Fix OOB read due to missing payload bound check (bsc#1249202). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38705: drm/amd/pm: fix null pointer access (bsc#1249334). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201). * CVE-2025-38721: netfilter: ctnetlink: fix refcount leak on table dump (bsc#1249176). * CVE-2025-38722: habanalabs: fix UAF in export_dmabuf() (bsc#1249163). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38732: netfilter: nf_reject: do not leak dst refcount for loopback packets (bsc#1249262). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39678: platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non- NULL (bsc#1249290). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39705: drm/amd/display: fix a Null pointer dereference vulnerability (bsc#1249295). * CVE-2025-39718: vsock/virtio: Validate length in packet header before skb_put() (bsc#1249305). * CVE-2025-39738: btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39764: netfilter: ctnetlink: remove refcounting in expectation dumpers (bsc#1249513). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39787: soc: qcom: mdt_loader: Deal with zero e_shentsize (bsc#1249545). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974). * CVE-2025-39834: net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (bsc#1250021). * CVE-2025-39835: xfs: do not propagate ENODATA disk errors into xattr code (bsc#1250025). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). The following non-security bugs were fixed: * 9p/xen: fix init sequence (git-fixes). * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add new HP ZBook laptop with micmute led fixup (stable- fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add support for HP Agusta using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: qcom: use drvdata instead of component to keep id (stable-fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Add alt-commit to drm v3d patch * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: ISO: free rx_skb if not consumed (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git- fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: compute LE flow credits based on recvbuf space (git-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: qca: fix invalid device address check (git-fixes). * Bluetooth: qca: fix wcn3991 device address check (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Correct typos of References tags in some patches * Drivers: hv: Always select CONFIG_SYSFB for Hyper-V guests (git-fixes). * Drivers: hv: Select CONFIG_SYSFB only if EFI is enabled (git-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: mcp2221: Do not set bus speed on every transfer (stable-fixes). * HID: mcp2221: Handle reads greater than 60 bytes (stable-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * KVM: SVM: Clear current_vmcb during vCPU free for all _possible_ CPUs (git- fixes). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Sync TPR from LAPIC into VMCB::V_TPR even if AVIC is active (git- fixes). * KVM: VMX: Extract checking of guest's DEBUGCTL into helper (git-fixes). * KVM: VMX: Flush shadow VMCS on emergency reboot (git-fixes). * KVM: VMX: Handle KVM-induced preemption timer exits in fastpath for L2 (git- fixes). * KVM: VMX: Handle forced exit due to preemption timer in fastpath (git- fixes). * KVM: VMX: Re-enter guest in fastpath for "spurious" preemption timer exits (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250336). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Fully defer to vendor code to decide how to force immediate exit (git-fixes). * KVM: x86: Move handling of is_guest_mode() into fastpath exit handlers (git- fixes). * KVM: x86: Plumb "force_immediate_exit" into kvm_entry() tracepoint (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI: Add ACS quirk for Loongson PCIe (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: apple: Fix missing OF node reference in apple_pcie_setup_port (git- fixes). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RAS/AMD/FMPM: Use atl internal.h for INVALID_SPA (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes) * RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes). * RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes). * afs: Fix potential null pointer dereference in afs_put_server (git-fixes). * amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable- fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/cpufeatures/kvm: Add ARMv8.9 FEAT_ECBHB bits in ID_AA64MMFR1 (git- fixes) * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64: Add support for HIP09 Spectre-BHB mitigation (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma with Haikou (git-fixes). * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: libata-scsi: Fix CDL control (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * bpf, bpftool: Fix incorrect disasm pc (git-fixes). * bpf/selftests: Fix test_tcpnotify_user (poo#189822). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Fix iter/task tid filtering (git-fixes). * bpf: Fix link info netfilter flags to populate defrag flag (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Properly test iter/task tid filtering (git-fixes). * bpf: bpftool: Setting error code in do_loader() (git-fixes). * bpf: fix kfunc btf caching for modules (git-fixes). * bpf: handle implicit declaration of function gettid in bpf_iter.c * bpf: skip non exist keys in generic_map_lookup_batch (git-fixes). * bpf: use kvzmalloc to allocate BPF verifier environment (git-fixes). * bpftool: Fix JSON writer resource leak in version command (git-fixes). * bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure (git-fixes). * bpftool: Fix readlink usage in get_fd_type (git-fixes). * bpftool: Mount bpffs when pinmaps path not under the bpffs (git-fixes). * bpftool: fix potential NULL pointer dereferencing in prog_dump() (git- fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add cancellation points to trim loops (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: always update fstrim_range on failure in FITRIM ioctl (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: fix adding block group to a reclaim list and the unused list during reclaim (git-fixes). * btrfs: fix bitmap leak when loading free space cache on duplicate entry (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix the length of reserved qgroup to free (bsc#1240708) * btrfs: make found_logical_ret parameter mandatory for function queue_scrub_stripe() (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: retry block group reclaim without infinite loop (git-fixes). * btrfs: return accurate error code on open failure in open_fs_devices() (bsc#1233120) * btrfs: run delayed iputs when flushing delalloc (git-fixes). * btrfs: scrub: avoid unnecessary csum tree search preparing stripes (git- fixes). * btrfs: scrub: avoid unnecessary extent tree search preparing stripes (git- fixes). * btrfs: scrub: fix grouping of read IO (git-fixes). * btrfs: scrub: remove scrub_ctx::csum_list member (git-fixes). * btrfs: split remaining space to discard in chunks (git-fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: update target inode's ctime on unlink (git-fixes). * btrfs: use SECTOR_SHIFT to convert physical offset to LBA (git-fixes). * build_bug.h: Add KABI assert (bsc#1249186). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * ceph: fix possible integer overflow in ceph_zero_objects() (git-fixes). * ceph: validate snapdirname option length when mounting (git-fixes). * cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup/rstat: Optimize cgroup_rstat_updated_list() (bsc#1247963). * cgroup/rstat: Reduce cpu_lock hold time in cgroup_rstat_flush_locked() (bsc#1247963). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove cgroup_rstat_flush_atomic() (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Use the fixed and coherent frequency for scaling capacity (stable- fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: hisilicon - re-enable address prefetch after device resuming (git- fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - request reserved interrupt for virtual function (git- fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - add shutdown handler to qat_c3xxx (git-fixes). * crypto: qat - add shutdown handler to qat_c62x (git-fixes). * crypto: qat - add shutdown handler to qat_dh895xcc (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * devlink: add value check to devlink_info_version_put() (bsc#1245410 jsc#PED-12320). * devlink: let driver opt out of automatic phys_port_name generation (git- fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers/base/node: optimize memory block registration to reduce boot time (bsc#1241866). * drivers/base/node: remove register_mem_block_under_node_early() (bsc#1241866). * drivers/base/node: remove register_memory_blocks_under_node() function call from register_one_node (bsc#1241866). * drivers/base/node: rename __register_one_node() to register_one_node() (bsc#1241866). * drivers/base/node: rename register_memory_blocks_under_node() and remove context argument (bsc#1241866). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable- fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Allow DCN301 to clear update flags (git-fixes). * drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git- fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes). * drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable- fixes). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not print errors for nonexistent connectors (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable- fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Fix mismatch type comparison (stable-fixes). * drm/amd/display: Fix unnecessary cast warnings from checkpatch (stable- fixes). * drm/amd/display: Initialize mode_select to 0 (stable-fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Reduce accessing remote DPCD overhead (git-fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes). * drm/amd/display: fix a Null pointer dereference vulnerability (stable- fixes). * drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd/pm: fix null pointer access (stable-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/discovery: fix fw based ip discovery (git-fixes). * drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes). * drm/amdgpu/mes: add missing locking in helper functions (stable-fixes). * drm/amdgpu/swm14: Update power limit logic (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Fix Circular Locking Dependency in AMDGPU GFX Isolation (git- fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes). * drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable- fixes). * drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes). * drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect MALL size for GFX1151 (stable-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: fix vram reservation issue (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/ast: Use msleep instead of mdelay for edid read (bsc#1250530). * drm/ast: Use msleep instead of mdelay for edid read (git-fixes). * drm/bridge: fix OF node leak (git-fixes). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/cirrus-qemu: Fix pitch programming (git-fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes). * drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes). * drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes). * drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes). * drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes). * drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes). * drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes). * drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable- fixes). * drm/i915/icl+/tc: Cache the max lane count value (stable-fixes). * drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable- fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/imagination: Clear runtime PM errors while resetting the GPU (stable- fixes). * drm/mediatek: Add error handling for old state CRTC in atomic_disable (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dp: account for widebus and yuv420 during mode validation (git- fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Add error handling for krealloc in metadata setup (stable-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: update the high bitfield of certain DSI registers (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/gsp: fix potential leak of memory used during acpi init (git- fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/nouveau: select FW caching (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/panthor: Defer scheduler entitiy destruction to queue release (git- fixes). * drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes). * drm/panthor: validate group queue count (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/simpledrm: Do not upcast in release helpers (git-fixes). * drm/tests: Fix endian warning (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm/xe/bmg: Add new PCI IDs (stable-fixes). * drm/xe/bmg: Update Wa_22019338487 (git-fixes). * drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes). * drm/xe/tile: Release kobject for the failure path (git-fixes). * drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes). * drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes). * drm/xe/xe_sync: avoid race during ufence signaling (git-fixes). * drm/xe: Allow dropping kunit dependency as built-in (git-fixes). * drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes). * drm/xe: Carve out wopcm portion from the stolen memory (git-fixes). * drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes). * drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes). * drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git- fixes). * drm/xe: Fix and re-enable xe_print_blob_ascii85() (git-fixes). * drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes). * drm/xe: Move page fault init after topology init (git-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * et131x: Add missing check after DMA map (stable-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/mnt_idmapping.c: Return -EINVAL when no map is written (bsc#1233120) * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/orangefs: use snprintf() instead of sprintf() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * hfs: fix not erasing deleted b-tree node issue (git-fixes). * hfs: fix slab-out-of-bounds in hfs_bnode_read() (git-fixes). * hfsplus: do not use BUG_ON() in hfsplus_create_attributes_file() (git- fixes). * hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read() (git-fixes). * hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Set VF priv_flags to IFF_NO_ADDRCONF before open to prevent IPv6 addrconf (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * hypfs_create_cpu_files(): add missing check for hypfs_mkdir() failure (git- fixes bsc#1249122). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * i3c: master: svc: Use manual response for IBI events (git-fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: enable_rdma devlink param (bsc#1247712). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * ixgbe: add .info_get extension specific for E610 devices (bsc#1245410 jsc#PED-12320). * ixgbe: add E610 functions for acquiring flash data (bsc#1245410 jsc#PED-12320). * ixgbe: add E610 functions getting PBA and FW ver info (bsc#1245410 jsc#PED-12320). * ixgbe: add E610 implementation of FW recovery mode (bsc#1245410 jsc#PED-12320). * ixgbe: add FW API version check (bsc#1245410 jsc#PED-12320). * ixgbe: add device flash update via devlink (bsc#1245410 jsc#PED-12320). * ixgbe: add handler for devlink .info_get() (bsc#1245410 jsc#PED-12320). * ixgbe: add initial devlink support (bsc#1245410 jsc#PED-12320). * ixgbe: add support for FW rollback mode (bsc#1245410 jsc#PED-12320). * ixgbe: add support for devlink reload (bsc#1245410 jsc#PED-12320). * ixgbe: extend .info_get() with stored versions (bsc#1245410 jsc#PED-12320). * ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410). * ixgbe: prevent from unwanted interface name changes (git-fixes). * ixgbe: read the OROM version information (bsc#1245410 jsc#PED-12320). * ixgbe: read the netlist version information (bsc#1245410 jsc#PED-12320). * ixgbe: wrap netdev_priv() usage (bsc#1245410 jsc#PED-12320). * jfs: Regular file corruption check (git-fixes). * jfs: truncate good inode pages when hard link is 0 (git-fixes). * jfs: upper bound check of tree index in dbAllocAG (git-fixes). * kABI fix after vsock/virtio: fix `rx_bytes` accounting for stream sockets (git-fixes). * kABI fix for "netfilter: nf_tables: Audit log rule reset" (git-fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for RCU tasks exit tracking (bsc#1246298). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: adjust new field on ip_ct_sctp struct (git-fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: fix for struct devlink_port_attrs: move new member to the end (git- fixes). * kABI: make nft_trans_gc_catchall() public again (git-fixes). * kABI: netfilter flowtable move gc operation to bottom (git-fixes). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: add struct cgroup_extra (bsc#1247963). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kselftest/arm64: Fix check for setting new VLs in sve-ptrace (git-fixes). * kselftest/runner.sh: add netns support * kselftests: Sort the collections list to avoid duplicate tests * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * livepatch: Add "replace" sysfs attribute (poo#187320). * livepatch: Add stack_order sysfs attribute (poo#187320). * livepatch: Move tests from lib/livepatch to selftests/livepatch * livepatch: Replace snprintf() with sysfs_emit() (poo#187320). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * md/md-cluster: handle REMOVE message earlier (bsc#1247057). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: chips-media: wave5: Fix gray color on screen (git-fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * mm/hwpoison: do not send SIGBUS to processes with recovered clean pages (git-fixes). * mm/memory-failure: fix infinite UCE for VM_PFNMAP pfn (git-fixes). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mmc: core: Use GFP_NOIO in ACMD22 (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fallback when MPTCP opts are dropped after 1st data (git-fixes). * mptcp: reset when MPTCP opts are dropped after join (git-fixes). * mtd: nand: raw: atmel: Fix comment in timings preparation (stable-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * netfilter: conntrack: fix extension size table (git-fixes). * netfilter: flowtable: GC pushes back packets to classic path (git-fixes). * netfilter: handle the connecting collision properly in nf_conntrack_proto_sctp (git-fixes). * netfilter: nat: fix ipv6 nat redirect with mapped and scoped addresses (git- fixes). * netfilter: nf_conntrack_bridge: initialize err to 0 (git-fixes). * netfilter: nf_tables: A better name for nft_obj_filter (git-fixes). * netfilter: nf_tables: Audit log rule reset (git-fixes). * netfilter: nf_tables: Carry reset boolean in nft_obj_dump_ctx (git-fixes). * netfilter: nf_tables: Carry s_idx in nft_obj_dump_ctx (git-fixes). * netfilter: nf_tables: Deduplicate nft_register_obj audit logs (git-fixes). * netfilter: nf_tables: Drop pointless memset in nf_tables_dump_obj (git- fixes). * netfilter: nf_tables: Drop pointless memset when dumping rules (git-fixes). * netfilter: nf_tables: Fix entries val in rule reset audit log (git-fixes). * netfilter: nf_tables: Introduce nf_tables_getrule_single() (git-fixes). * netfilter: nf_tables: Open-code audit log call in nf_tables_getrule() (git- fixes). * netfilter: nf_tables: Unbreak audit log reset (git-fixes). * netfilter: nf_tables: Unconditionally allocate nft_obj_filter (git-fixes). * netfilter: nf_tables: audit log object reset once per table (git-fixes). * netfilter: nf_tables: bogus ENOENT when destroying element which does not exist (git-fixes). * netfilter: nf_tables: disallow element removal on anonymous sets (git- fixes). * netfilter: nf_tables: do not remove elements if set backend implements .abort (git-fixes). * netfilter: nf_tables: nft_obj_filter fits into cb->ctx (git-fixes). * netfilter: nf_tables: remove catchall element in GC sync path (git-fixes). * netfilter: nf_tables: revert do not remove elements if set backend implements .abort (git-fixes). * netfilter: nf_tables: split async and sync catchall in two functions (git- fixes). * netfilter: nfnetlink_log: silence bogus compiler warning (git-fixes). * netfilter: nft_payload: fix wrong mac header matching (git-fixes). * netfilter: nft_set_hash: try later when GC hits EAGAIN on iteration (git- fixes). * netfilter: nft_set_pipapo: call nft_trans_gc_queue_sync() in catchall GC (git-fixes). * netfilter: nft_set_pipapo: stop GC iteration if GC transaction allocation fails (git-fixes). * netfilter: nft_set_rbtree: prefer sync gc to async worker (git-fixes). * netfilter: nft_set_rbtree: rename gc deactivate+erase function (git-fixes). * netfilter: xt_recent: fix (increase) ipv6 literal buffer length (git-fixes). * nilfs2: fix CFI failure when accessing /sys/fs/nilfs2/features/* (git- fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-auth: do not re-authenticate queues with no prior authentication (bsc#1227555). * nvme-pci: try function level reset on init failure (git-fixes). * nvme-tcp: remove tag set when second admin queue config fails (git-fixes). * nvmet-auth: always free derived key data (git-fixes). * nvmet-auth: authenticate on admin queue only (bsc#1227555). * nvmet: auth: use NULL to clear a pointer in (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * pcmcia: Add error handling for add_interval() in do_validate_mem() (git- fixes). * pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region() (git- fixes). * pcmcia: omap: Add missing check for platform_get_resource (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes). * platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes). * platform/x86: dell-wmi-sysman: Fix class device unregistration (git-fixes). * platform/x86: think-lmi: Fix class device unregistration (git-fixes). * platform/x86: thinkpad_acpi: Handle KCOV __init vs inline mismatches (git- fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/eeh: Rely on dev->link_active_reporting (bsc#1215199). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * rcu-tasks: Add data to eliminate RCU-tasks/do_exit() (bsc#1246298) * rcu-tasks: Eliminate deadlocks involving do_exit() and RCU (bsc#1246298) * rcu-tasks: Initialize callback lists at rcu_init() time (bsc#1246298) * rcu-tasks: Initialize data to eliminate RCU-tasks/do_exit() (bsc#1246298) * rcu-tasks: Maintain lists to eliminate RCU-tasks/do_exit() (bsc#1246298) * rcu-tasks: Maintain real-time response in (bsc#1246298) * rcu/exp: Fix RCU expedited parallel grace period kworker (git-fixes) * rcu/exp: Handle RCU expedited grace period kworker allocation (git-fixes) * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * rpm/config.sh: Udate OBS repositories * rpm/config.sh: Update Leap project * rpm: Configure KABI checkingness macro (bsc#1249186). * rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186). * rpm: Link arch-symbols script from scripts directory. * rpm: Link guards script from scripts directory. * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1249183). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249481). * s390/debug: Add a reverse mode for debug_dump() (git-fixes jsc#PED-13260). * s390/debug: Add debug_dump() to write debug view to a string buffer (git- fixes jsc#PED-13260). * s390/debug: Simplify and document debug_next_entry() logic (git-fixes jsc#PED-13260). * s390/debug: Split private data alloc/free out of file operations (git-fixes jsc#PED-13260). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (git-fixes bsc#1248733 LTC#214881). * s390/hypfs: Enable limited access during lockdown (git-fixes bsc#1248733 LTC#214881). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1248735). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249482). * s390/pci: Add pci_msg debug view to PCI report (git-fixes jsc#PED-13260). * s390/pci: Allow automatic recovery with minimal driver support (git-fixes bsc#1248734 LTC#214880). * s390/pci: Report PCI error recovery results via SCLP (git-fixes jsc#PED-13260). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249123). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249124). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249125). * s390/vfio-ap: Fix no AP queue sharing allowed message written to kernel log (git-fixes bsc#1249488). * samples/bpf: Fix compilation errors with cf-protection option (git-fixes). * sched/deadline: Collect sched_dl_entity initialization (git-fixes) * sched/fair: Remove unused parameter from sched_asym() (git-fixes) * sched/fair: Take the scheduling domain into account in (git-fixes) * sched/isolation: Fix boot crash when maxcpus < first (git-fixes) * sched/numa, mm: do not try to migrate memory to memoryless (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes). * selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE * selftests/bpf: Add asserts for netfilter link info (git-fixes). * selftests/bpf: Add cmp_map_pointer_with_const test (git-fixes). * selftests/bpf: Add test cases with CONST_PTR_TO_MAP null checks (git-fixes). * selftests/bpf: adapt one more case in test_lru_map to the new target_free (git-fixes). * selftests/bpf: fexit_sleep: Fix stack allocation for arm64 (git-fixes). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/livepatch: Add selftests for "replace" sysfs attribute * selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320). * selftests/livepatch: Replace hardcoded module name with variable in * selftests/livepatch: define max test-syscall processes * selftests/livepatch: fix and refactor new dmesg message code * selftests/livepatch: wait for atomic replace to occur * selftests/run_kselftest.sh: Fix help string for --per-test-log * selftests/run_kselftest.sh: Use readlink if realpath is not available * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: Fix errno checking in syscall_user_dispatch test (git-fixes). * selftests: allow runners to override the timeout * selftests: bpf: test batch lookup on array of maps with holes (git-fixes). * selftests: livepatch: Add initial .gitignore * selftests: livepatch: Avoid running the tests if kernel-devel is * selftests: livepatch: Test atomic replace against multiple modules * selftests: livepatch: Test livepatching a heavily called syscall * selftests: livepatch: add new ftrace helpers functions * selftests: livepatch: add test cases of stack_order sysfs interface * selftests: livepatch: handle PRINTK_CALLER in check_result() * selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR * selftests: livepatch: save and restore kprobe state * selftests: livepatch: test if ftrace can trace a livepatched function * selftests: livepatch: test livepatching a kprobed function * selftests: rtnetlink.sh: remove esp4_offload after test (git-fixes). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: core: fix OF node leak (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * struct cdc_ncm_ctx: hide new member filtering_supported (git-fixes). * struct l2cap_chan: shift new member rx_avail to end (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: mark hyperv_drm as external * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git- fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: core: Fix system suspend on TI AM62 platforms (git-fixes). * usb: dwc3: fix fault at system suspend if device was already runtime suspended (git-fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: phy: twl6030: Fix incorrect type for ret (git-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpci: use GENMASK() for TCPC_ROLE_CTRL_CC[12] (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix non-contaminant CC handling (git-fixes). * usb: typec: tcpm/tcpci_maxim: use GENMASK() for TCPC_VENDOR_CC_CTRL2 register (git-fixes). * usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git- fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix invalid pointer dereference in Etron workaround (git-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vfs: Add a sysctl for automated deletion of dentry (bsc#1240890). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost-scsi: Return queue full for page alloc failures during copy (git- fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: fix `rx_bytes` accounting for stream sockets (git-fixes). * vsock: Allow retrying on connect() failure (git-fixes). * vsock: Fix IOCTL_VM_SOCKETS_GET_LOCAL_CID to check also `transport_local` (git-fixes). * vsock: avoid timeout during connect() if the socket is closing (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes). * wifi: ath11k: Fix DMA buffer allocation to resolve SWIOTLB issues (stable- fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: Use dma_alloc_noncoherent for rx_tid buffer allocation (stable-fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes). * wifi: ath12k: fix the fetching of combined rssi (git-fixes). * wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath12k: fix wrong logging ID used for CE (git-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: remove cfg80211_inform_single_bss_frame_data() (git-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: Remove redundant header files (git-fixes). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: avoid weird state in error path (stable-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtw89: Disable deep power saving for USB/SDIO (stable-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * wireless: purelifi: plfxlc: fix memory leak in plfxlc_usb_wreq_asyn() (git- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: WARN when setting EFER.AUTOIBRS if and only if the WRMSR fails (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/amd_nb: Restrict init function to AMD-based systems (git-fixes). * x86/cpu: Add model number for Intel Clearwater Forest processor (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/kvm: Force legacy PCI hole to UC when overriding MTRRs for TDX/SNP (bsc#1245538). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: Add support for XenServer 6.1 platform device (git-fixes). * xenbus: Allow PVH dom0 a non-local xenstore (git-fixes). * xfs: rearrange code in xfs_inode_item_precommit (bsc#1237449). * xfs: rework datasync tracking and execution (bsc#1237449). * xhci: Fix control transfer error on Etron xHCI host (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: dbc: decouple endpoint allocation from initialization (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3633=1 ## Package List: * Public Cloud Module 15-SP7 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150700.20.15.2 * Public Cloud Module 15-SP7 (aarch64 x86_64) * kernel-syms-azure-6.4.0-150700.20.15.1 * kernel-azure-debugsource-6.4.0-150700.20.15.2 * kernel-azure-devel-debuginfo-6.4.0-150700.20.15.2 * kernel-azure-devel-6.4.0-150700.20.15.2 * kernel-azure-debuginfo-6.4.0-150700.20.15.2 * Public Cloud Module 15-SP7 (noarch) * kernel-devel-azure-6.4.0-150700.20.15.2 * kernel-source-azure-6.4.0-150700.20.15.2 ## References: * https://www.suse.com/security/cve/CVE-2023-3867.html * https://www.suse.com/security/cve/CVE-2023-4130.html * https://www.suse.com/security/cve/CVE-2023-4515.html * https://www.suse.com/security/cve/CVE-2023-53261.html * https://www.suse.com/security/cve/CVE-2023-5633.html * https://www.suse.com/security/cve/CVE-2024-26661.html * https://www.suse.com/security/cve/CVE-2024-46733.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2024-58238.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-22022.html * https://www.suse.com/security/cve/CVE-2025-37885.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38440.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38521.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38650.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38663.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1170284 * https://bugzilla.suse.com/show_bug.cgi?id=1212533 * https://bugzilla.suse.com/show_bug.cgi?id=1213545 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1216527 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1221858 * https://bugzilla.suse.com/show_bug.cgi?id=1222323 * https://bugzilla.suse.com/show_bug.cgi?id=1227555 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1230557 * https://bugzilla.suse.com/show_bug.cgi?id=1230708 * https://bugzilla.suse.com/show_bug.cgi?id=1233120 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237449 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238782 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240890 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241292 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241866 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242754 * https://bugzilla.suse.com/show_bug.cgi?id=1242960 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1245410 * https://bugzilla.suse.com/show_bug.cgi?id=1245538 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246298 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1247057 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247290 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248108 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248164 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248175 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248180 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248232 * https://bugzilla.suse.com/show_bug.cgi?id=1248240 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248370 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248614 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248636 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248733 * https://bugzilla.suse.com/show_bug.cgi?id=1248734 * https://bugzilla.suse.com/show_bug.cgi?id=1248735 * https://bugzilla.suse.com/show_bug.cgi?id=1248746 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249122 * https://bugzilla.suse.com/show_bug.cgi?id=1249123 * https://bugzilla.suse.com/show_bug.cgi?id=1249124 * https://bugzilla.suse.com/show_bug.cgi?id=1249125 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249183 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249481 * https://bugzilla.suse.com/show_bug.cgi?id=1249482 * https://bugzilla.suse.com/show_bug.cgi?id=1249488 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249770 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250057 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250336 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250530 * https://bugzilla.suse.com/show_bug.cgi?id=1250574 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://jira.suse.com/browse/PED-13260 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 16:39:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 16:39:18 -0000 Subject: SUSE-SU-2025:03632-1: important: Security update for openssl-1_1-livepatches Message-ID: <176071915813.14746.8265879429527906975@smelt2.prg2.suse.org> # Security update for openssl-1_1-livepatches Announcement ID: SUSE-SU-2025:03632-1 Release Date: 2025-10-17T14:06:18Z Rating: important References: * bsc#1224458 * bsc#1225552 * bsc#1250410 Cross-References: * CVE-2024-4741 * CVE-2025-9230 CVSS scores: * CVE-2024-4741 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-4741 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for openssl-1_1-livepatches fixes the following issues: * Add livepatch for CVE-2025-9230 (bsc#1250410). * Use strong externalization for ssl3_setup_read_buffer and ssl3_release_read_buffer * Use strong externalization for ossl_statem_fatal. * Add livepatch for CVE-2024-4741 (bsc#1225552). * Drop trigger rules for very old libpulp-tools package. * Fix building process to include functions of older livepatches correctly (bsc#1224458)'. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-3632=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-3632=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * openssl-1_1-livepatches-0.5-150600.11.3.1 * openssl-1_1-livepatches-debuginfo-0.5-150600.11.3.1 * openssl-1_1-livepatches-debugsource-0.5-150600.11.3.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * openssl-1_1-livepatches-0.5-150600.11.3.1 * openssl-1_1-livepatches-debuginfo-0.5-150600.11.3.1 * openssl-1_1-livepatches-debugsource-0.5-150600.11.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-4741.html * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1224458 * https://bugzilla.suse.com/show_bug.cgi?id=1225552 * https://bugzilla.suse.com/show_bug.cgi?id=1250410 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Oct 17 16:39:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 17 Oct 2025 16:39:21 -0000 Subject: SUSE-SU-2025:02970-2: moderate: Security update for pam Message-ID: <176071916197.14746.2177804946001652596@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:02970-2 Release Date: 2025-10-17T13:14:34Z Rating: moderate References: * bsc#1232234 * bsc#1246221 Cross-References: * CVE-2024-10041 CVSS scores: * CVE-2024-10041 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-10041 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-10041 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for pam fixes the following issues: * Improve previous CVE-2024-10041 fix which led to CPU performance issues (bsc#1232234) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-2970=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2970=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2970=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2970=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2970=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2970=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2970=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2970=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2970=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2970=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2970=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2970=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2970=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-2970=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2025-2970=1 ## Package List: * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Manager Server 4.3 LTS (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Manager Server 4.3 LTS (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-32bit-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Enterprise Storage 7.1 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Enterprise Storage 7.1 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * pam-32bit-1.3.0-150000.6.86.1 * pam-devel-32bit-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-32bit-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Manager Proxy 4.3 LTS (noarch) * pam-doc-1.3.0-150000.6.86.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * pam-extra-debuginfo-1.3.0-150000.6.86.1 * pam-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-1.3.0-150000.6.86.1 * pam-devel-1.3.0-150000.6.86.1 * pam-32bit-1.3.0-150000.6.86.1 * pam-extra-1.3.0-150000.6.86.1 * pam-1.3.0-150000.6.86.1 * pam-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1 * pam-debugsource-1.3.0-150000.6.86.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * pam-doc-1.3.0-150000.6.86.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10041.html * https://bugzilla.suse.com/show_bug.cgi?id=1232234 * https://bugzilla.suse.com/show_bug.cgi?id=1246221 -------------- next part -------------- An HTML attachment was scrubbed... URL: