SUSE-SU-2026:0447-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Wed Feb 11 20:32:40 UTC 2026



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0447-1  
Release Date: 2026-02-11T14:05:12Z  
Rating: important  
References:

  * bsc#1205462
  * bsc#1214285
  * bsc#1215199
  * bsc#1223800
  * bsc#1228490
  * bsc#1233563
  * bsc#1234842
  * bsc#1235566
  * bsc#1241437
  * bsc#1242505
  * bsc#1242909
  * bsc#1243662
  * bsc#1243677
  * bsc#1243678
  * bsc#1245538
  * bsc#1246022
  * bsc#1246184
  * bsc#1246447
  * bsc#1247030
  * bsc#1247712
  * bsc#1248211
  * bsc#1249307
  * bsc#1249904
  * bsc#1250032
  * bsc#1250082
  * bsc#1250388
  * bsc#1250705
  * bsc#1250748
  * bsc#1252511
  * bsc#1252712
  * bsc#1252891
  * bsc#1252900
  * bsc#1253087
  * bsc#1253330
  * bsc#1253340
  * bsc#1253348
  * bsc#1253433
  * bsc#1253443
  * bsc#1253451
  * bsc#1253471
  * bsc#1253739
  * bsc#1254244
  * bsc#1254447
  * bsc#1254465
  * bsc#1254510
  * bsc#1254624
  * bsc#1254767
  * bsc#1254835
  * bsc#1254839
  * bsc#1254842
  * bsc#1254845
  * bsc#1254852
  * bsc#1254871
  * bsc#1255102
  * bsc#1255120
  * bsc#1255128
  * bsc#1255138
  * bsc#1255140
  * bsc#1255157
  * bsc#1255164
  * bsc#1255172
  * bsc#1255216
  * bsc#1255226
  * bsc#1255241
  * bsc#1255255
  * bsc#1255260
  * bsc#1255261
  * bsc#1255266
  * bsc#1255268
  * bsc#1255269
  * bsc#1255327
  * bsc#1255346
  * bsc#1255377
  * bsc#1255401
  * bsc#1255403
  * bsc#1255417
  * bsc#1255482
  * bsc#1255488
  * bsc#1255537
  * bsc#1255539
  * bsc#1255544
  * bsc#1255547
  * bsc#1255548
  * bsc#1255552
  * bsc#1255568
  * bsc#1255569
  * bsc#1255615
  * bsc#1255622
  * bsc#1255695
  * bsc#1255930
  * bsc#1256280
  * bsc#1256528
  * bsc#1256568
  * bsc#1256579
  * bsc#1256582
  * bsc#1256584
  * bsc#1256586
  * bsc#1256591
  * bsc#1256592
  * bsc#1256593
  * bsc#1256594
  * bsc#1256597
  * bsc#1256605
  * bsc#1256606
  * bsc#1256607
  * bsc#1256608
  * bsc#1256609
  * bsc#1256610
  * bsc#1256611
  * bsc#1256612
  * bsc#1256613
  * bsc#1256616
  * bsc#1256617
  * bsc#1256619
  * bsc#1256622
  * bsc#1256623
  * bsc#1256625
  * bsc#1256627
  * bsc#1256628
  * bsc#1256630
  * bsc#1256638
  * bsc#1256641
  * bsc#1256645
  * bsc#1256646
  * bsc#1256650
  * bsc#1256651
  * bsc#1256653
  * bsc#1256654
  * bsc#1256655
  * bsc#1256659
  * bsc#1256660
  * bsc#1256661
  * bsc#1256664
  * bsc#1256665
  * bsc#1256674
  * bsc#1256680
  * bsc#1256682
  * bsc#1256688
  * bsc#1256689
  * bsc#1256690
  * bsc#1256726
  * bsc#1256728
  * bsc#1256730
  * bsc#1256733
  * bsc#1256737
  * bsc#1256741
  * bsc#1256742
  * bsc#1256744
  * bsc#1256748
  * bsc#1256749
  * bsc#1256752
  * bsc#1256754
  * bsc#1256756
  * bsc#1256757
  * bsc#1256759
  * bsc#1256760
  * bsc#1256761
  * bsc#1256763
  * bsc#1256770
  * bsc#1256773
  * bsc#1256774
  * bsc#1256777
  * bsc#1256779
  * bsc#1256781
  * bsc#1256785
  * bsc#1256792
  * bsc#1256794
  * bsc#1256861
  * bsc#1256863
  * bsc#1257035
  * bsc#1257053
  * bsc#1257154
  * bsc#1257155
  * bsc#1257158
  * bsc#1257163
  * bsc#1257164
  * bsc#1257167
  * bsc#1257168
  * bsc#1257180
  * bsc#1257202
  * bsc#1257204
  * bsc#1257207
  * bsc#1257208
  * bsc#1257215
  * bsc#1257217
  * bsc#1257218
  * bsc#1257220
  * bsc#1257221
  * bsc#1257227
  * bsc#1257232
  * bsc#1257234
  * bsc#1257236
  * bsc#1257245
  * bsc#1257277
  * bsc#1257282
  * bsc#1257296
  * bsc#1257473
  * bsc#1257603
  * jsc#PED-12554
  * jsc#PED-3527
  * jsc#PED-5065
  * jsc#PED-5475
  * jsc#PED-5477
  * jsc#PED-5511
  * jsc#PED-6041
  * jsc#PED-6068
  * jsc#PED-6069
  * jsc#PED-6070
  * jsc#PED-6071
  * jsc#PED-6116
  * jsc#PED-6120
  * jsc#PED-6996

  
Cross-References:

  * CVE-2023-53714
  * CVE-2023-54013
  * CVE-2024-27005
  * CVE-2024-42103
  * CVE-2024-53070
  * CVE-2024-53149
  * CVE-2024-56721
  * CVE-2025-22047
  * CVE-2025-37744
  * CVE-2025-37751
  * CVE-2025-37813
  * CVE-2025-38209
  * CVE-2025-38243
  * CVE-2025-38322
  * CVE-2025-38379
  * CVE-2025-38539
  * CVE-2025-39689
  * CVE-2025-39813
  * CVE-2025-39829
  * CVE-2025-39836
  * CVE-2025-39880
  * CVE-2025-39913
  * CVE-2025-40097
  * CVE-2025-40106
  * CVE-2025-40132
  * CVE-2025-40136
  * CVE-2025-40142
  * CVE-2025-40166
  * CVE-2025-40177
  * CVE-2025-40181
  * CVE-2025-40202
  * CVE-2025-40238
  * CVE-2025-40254
  * CVE-2025-40257
  * CVE-2025-40259
  * CVE-2025-40261
  * CVE-2025-40264
  * CVE-2025-40328
  * CVE-2025-40350
  * CVE-2025-40355
  * CVE-2025-40363
  * CVE-2025-68171
  * CVE-2025-68174
  * CVE-2025-68178
  * CVE-2025-68188
  * CVE-2025-68200
  * CVE-2025-68215
  * CVE-2025-68227
  * CVE-2025-68241
  * CVE-2025-68245
  * CVE-2025-68254
  * CVE-2025-68256
  * CVE-2025-68261
  * CVE-2025-68284
  * CVE-2025-68285
  * CVE-2025-68296
  * CVE-2025-68297
  * CVE-2025-68301
  * CVE-2025-68320
  * CVE-2025-68325
  * CVE-2025-68327
  * CVE-2025-68337
  * CVE-2025-68349
  * CVE-2025-68363
  * CVE-2025-68365
  * CVE-2025-68366
  * CVE-2025-68367
  * CVE-2025-68372
  * CVE-2025-68379
  * CVE-2025-68725
  * CVE-2025-68727
  * CVE-2025-68728
  * CVE-2025-68733
  * CVE-2025-68764
  * CVE-2025-68768
  * CVE-2025-68770
  * CVE-2025-68771
  * CVE-2025-68773
  * CVE-2025-68775
  * CVE-2025-68776
  * CVE-2025-68777
  * CVE-2025-68783
  * CVE-2025-68788
  * CVE-2025-68789
  * CVE-2025-68795
  * CVE-2025-68797
  * CVE-2025-68798
  * CVE-2025-68800
  * CVE-2025-68801
  * CVE-2025-68802
  * CVE-2025-68803
  * CVE-2025-68804
  * CVE-2025-68808
  * CVE-2025-68813
  * CVE-2025-68814
  * CVE-2025-68815
  * CVE-2025-68816
  * CVE-2025-68819
  * CVE-2025-68820
  * CVE-2025-71064
  * CVE-2025-71066
  * CVE-2025-71076
  * CVE-2025-71077
  * CVE-2025-71078
  * CVE-2025-71079
  * CVE-2025-71080
  * CVE-2025-71081
  * CVE-2025-71082
  * CVE-2025-71083
  * CVE-2025-71084
  * CVE-2025-71085
  * CVE-2025-71086
  * CVE-2025-71087
  * CVE-2025-71088
  * CVE-2025-71089
  * CVE-2025-71091
  * CVE-2025-71093
  * CVE-2025-71094
  * CVE-2025-71095
  * CVE-2025-71096
  * CVE-2025-71097
  * CVE-2025-71098
  * CVE-2025-71099
  * CVE-2025-71100
  * CVE-2025-71101
  * CVE-2025-71108
  * CVE-2025-71111
  * CVE-2025-71112
  * CVE-2025-71114
  * CVE-2025-71116
  * CVE-2025-71118
  * CVE-2025-71119
  * CVE-2025-71120
  * CVE-2025-71123
  * CVE-2025-71130
  * CVE-2025-71131
  * CVE-2025-71132
  * CVE-2025-71133
  * CVE-2025-71135
  * CVE-2025-71136
  * CVE-2025-71137
  * CVE-2025-71138
  * CVE-2025-71141
  * CVE-2025-71142
  * CVE-2025-71143
  * CVE-2025-71145
  * CVE-2025-71147
  * CVE-2025-71149
  * CVE-2025-71154
  * CVE-2025-71156
  * CVE-2025-71157
  * CVE-2025-71162
  * CVE-2025-71163
  * CVE-2026-22976
  * CVE-2026-22977
  * CVE-2026-22978
  * CVE-2026-22984
  * CVE-2026-22985
  * CVE-2026-22988
  * CVE-2026-22990
  * CVE-2026-22991
  * CVE-2026-22992
  * CVE-2026-22993
  * CVE-2026-22996
  * CVE-2026-22997
  * CVE-2026-22999
  * CVE-2026-23000
  * CVE-2026-23001
  * CVE-2026-23005
  * CVE-2026-23006
  * CVE-2026-23011

  
CVSS scores:

  * CVE-2023-53714 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53714 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54013 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54013 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27005 ( NVD ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-42103 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42103 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53149 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-53149 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-53149 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56721 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56721 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-56721 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-56721 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-22047 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22047 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22047 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37744 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-37744 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-37744 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37751 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37751 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37813 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37813 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38209 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38209 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38209 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38243 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38243 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-38243 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38322 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-38322 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-38322 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38379 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38379 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38379 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38539 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38539 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38539 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39689 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39689 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39813 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39836 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39836 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39880 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39913 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40097 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40097 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40132 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40132 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40136 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40136 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-40142 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40142 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40166 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40166 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40177 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40177 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40181 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40181 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40202 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40202 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40254 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40257 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40259 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40264 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40328 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40350 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40355 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40363 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40363 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-68171 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68174 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68174 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68178 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68178 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68188 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68188 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68215 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68227 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68241 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68245 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68254 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68254 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68256 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68256 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68284 ( SUSE ):  7.0
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68284 ( SUSE ):  7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-68285 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68285 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68297 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68297 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68301 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68320 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68320 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68325 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68325 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68327 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68327 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68337 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68349 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68363 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68365 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68366 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68367 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68372 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68372 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68379 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68379 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68379 ( SUSE ):  5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68725 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68728 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68764 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-68764 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-68768 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68768 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68770 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68770 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68771 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68773 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68775 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68775 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68776 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68776 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68777 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68777 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68783 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68788 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68788 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-68789 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68795 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68795 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68797 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68798 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68798 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68800 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68801 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68801 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68802 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-68802 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-68803 ( SUSE ):  4.8
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68803 ( SUSE ):  4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
  * CVE-2025-68804 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68804 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68813 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68813 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68814 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68820 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71066 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71079 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71080 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71080 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-71081 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71081 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71082 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71083 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71083 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71084 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71084 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71085 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71085 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71086 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71086 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71087 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71087 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-71088 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71088 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71089 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71089 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71091 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71091 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71093 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-71093 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-71094 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71094 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71096 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71096 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2025-71097 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71097 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71098 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71099 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71099 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71100 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71100 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2025-71101 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71101 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2025-71108 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71111 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71111 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71112 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71112 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71114 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71114 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71116 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71116 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-71118 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71118 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71119 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71119 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71120 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71120 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71123 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71123 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2025-71130 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71132 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71133 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71135 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71136 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71137 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71138 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71138 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71142 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71143 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71145 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71145 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71147 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71147 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71149 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71149 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-71154 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71154 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71156 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71157 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71157 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71163 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22976 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22977 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22977 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-22978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22984 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22985 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22985 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22988 ( SUSE ):  6.0
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22988 ( SUSE ):  5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-22990 ( SUSE ):  7.1
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22990 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22991 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22992 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22993 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22993 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22999 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22999 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23000 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23001 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23001 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23005 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23005 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23006 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * Basesystem Module 15-SP7
  * Development Tools Module 15-SP7
  * Legacy Module 15-SP7
  * SUSE Linux Enterprise Desktop 15 SP7
  * SUSE Linux Enterprise High Availability Extension 15 SP7
  * SUSE Linux Enterprise Live Patching 15-SP7
  * SUSE Linux Enterprise Real Time 15 SP7
  * SUSE Linux Enterprise Server 15 SP7
  * SUSE Linux Enterprise Server for SAP Applications 15 SP7
  * SUSE Linux Enterprise Workstation Extension 15 SP7

  
  
An update that solves 171 vulnerabilities, contains 14 features and has 27
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security
issues

The following security issues were fixed:

  * CVE-2023-54013: interconnect: Fix locking for runpm vs reclaim
    (bsc#1256280).
  * CVE-2025-39880: libceph: fix invalid accesses to ceph_connection_v1_info
    (bsc#1250388).
  * CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).
  * CVE-2025-40254: net: openvswitch: remove never-working support for setting
    nsh fields (bsc#1254852).
  * CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
  * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
  * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in
    nvme_fc_delete_ctrl() (bsc#1254839).
  * CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
  * CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid()
    (bsc#1254624).
  * CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff
    for striding RQ (bsc#1255260).
  * CVE-2025-40355: sysfs: check visibility before changing group attribute
    ownership (bsc#1255261).
  * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output
    (bsc#1255102).
  * CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).
  * CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition
    (bsc#1255327).
  * CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy
    (bsc#1255266).
  * CVE-2025-68188: tcp: use dst_dev_rcu() in
    tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
  * CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).
  * CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path
    (bsc#1255226).
  * CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).
  * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding
    stale fnhe (bsc#1255157).
  * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing
    incorrect cleanup (bsc#1255268).
  * CVE-2025-68261: ext4: add i_data_sem protection in
    ext4_destroy_inline_data_nolock() (bsc#1255164).
  * CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
    handle_auth_session_key() (bsc#1255377).
  * CVE-2025-68285: libceph: fix potential use-after-free in
    have_mon_and_osd_map() (bsc#1255401).
  * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon
    setup (bsc#1255128).
  * CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted
    directories (bsc#1255403).
  * CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path
    (bsc#1255120).
  * CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).
  * CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in
    cake_drop (bsc#1255417).
  * CVE-2025-68327: usb: renesas_usbhs: Fix synchronous external abort on unbind
    (bsc#1255488).
  * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when
    file system corrupted (bsc#1255482).
  * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in
    pnfs_mark_layout_stateid_invalid (bsc#1255544).
  * CVE-2025-68363: bpf: Check skb->transport_header is set in bpf_skb_check_mtu
    (bsc#1255552).
  * CVE-2025-68365: fs/ntfs3: Initialize allocated memory before use
    (bsc#1255548).
  * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
  * CVE-2025-68367: macintosh/mac_hid: fix race condition in
    mac_hid_toggle_emumouse (bsc#1255547).
  * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
  * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize
    failure (bsc#1255695).
  * CVE-2025-68727: ntfs3: Fix uninit buffer allocated by __getname()
    (bsc#1255568).
  * CVE-2025-68728: ntfs3: fix uninit memory after failed mi_read in
    mi_format_new (bsc#1255539).
  * CVE-2025-68733: smack: fix bug: unprivileged task can create labels
    (bsc#1255615).
  * CVE-2025-68764: NFS: Automounted filesystems should inherit
    ro,noexec,nodev,sync flags (bsc#1255930).
  * CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).
  * CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).
  * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
    (bsc#1256582).
  * CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket
    (bsc#1256665).
  * CVE-2025-68776: net/hsr: fix NULL pointer dereference in
    prp_get_untagged_frame() (bsc#1256659).
  * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for
    special files (bsc#1256638).
  * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query
    (bsc#1256688).
  * CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF
    (bsc#1256689).
  * CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating
    multicast route stats (bsc#1256646).
  * CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free
    (bsc#1256653).
  * CVE-2025-68803: nfsd: set security label during create operations
    (bsc#1256770).
  * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
    (bsc#1256641).
  * CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep()
    (bsc#1256651).
  * CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it
    changes to strict (bsc#1256680).
  * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters
    (bsc#1256674).
  * CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode()
    (bsc#1256754).
  * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for
    resources (bsc#1256654).
  * CVE-2025-71066: net/sched: ets: Always remove class from active list before
    deleting in ets_qdisc_change (bsc#1256645).
  * CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).
  * CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT
    (bsc#1256608).
  * CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference
    (bsc#1256622).
  * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
    calipso_skbuff_setattr() (bsc#1256623).
  * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg()
    (bsc#1256628).
  * CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).
  * CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
  * CVE-2025-71091: team: fix check for port enabled in
    team_queue_override_port_prio_changed() (bsc#1256773).
  * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
  * CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size
    (bsc#1256597).
  * CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action
    (bsc#1256605).
  * CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID
    correctly (bsc#1256606).
  * CVE-2025-71097: ipv4: Fix reference count leak when using error routes with
    nexthop objects (bsc#1256607).
  * CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
  * CVE-2025-71112: net: hns3: add VLAN id validation before using
    (bsc#1256726).
  * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted
    osdmaps (bsc#1256744).
  * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
    gss_token in gss_read_proxy_verf (bsc#1256779).
  * CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options()
    (bsc#1256757).
  * CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event
    (bsc#1256733).
  * CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in
    raid5_store_group_thread_cnt() (bsc#1256761).
  * CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
    (bsc#1256760).
  * CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value
    on update (bsc#1257164).
  * CVE-2025-71156: gve: defer interrupt enabling until NAPI registration
    (bsc#1257167).
  * CVE-2025-71157: RDMA/core: always drop device refcount in
    ib_del_sub_device_and_put() (bsc#1257168).
  * CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating
    inactive aggregate in qfq_reset (bsc#1257035).
  * CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue
    (bsc#1257053).
  * CVE-2026-22984: libceph: prevent potential out-of-bounds reads in
    handle_auth_done() (bsc#1257217).
  * CVE-2026-22990: libceph: replace overzealous BUG_ON in
    osdmap_apply_incremental() (bsc#1257221).
  * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial
    allocation (bsc#1257220).
  * CVE-2026-22992: libceph: return the handler error from
    mon_handle_auth_done() (bsc#1257218).
  * CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool
    operations (bsc#1257180).
  * CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.
  * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
    qfq_change_class() (bsc#1257236).
  * CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure
    (bsc#1257234).
  * CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source()
    (bsc#1257232).
  * CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever
    XFD[i]=1 (bsc#1257245).
  * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).

The following non security issues were fixed:

  * ALSA: ctxfi: Fix potential OOB access in audio mixer handling (stable-
    fixes).
  * ALSA: scarlett2: Fix buffer overflow in config retrieval (git-fixes).
  * ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (git-fixes).
  * ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).
  * ALSA: usb: Increase volume range that triggers a warning (git-fixes).
  * ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 (stable-fixes).
  * ASoC: codecs: wsa881x: Drop unused version readout (stable-fixes).
  * ASoC: codecs: wsa881x: fix unnecessary initialisation (git-fixes).
  * ASoC: codecs: wsa883x: fix unnecessary initialisation (git-fixes).
  * ASoC: codecs: wsa884x: fix codec initialisation (git-fixes).
  * ASoC: fsl_sai: Add missing registers to cache default (stable-fixes).
  * ASoC: fsl: imx-card: Do not force slot width to sample width (git-fixes).
  * ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion (git-fixes).
  * ASoC: tlv320adcx140: fix null pointer (git-fixes).
  * ASoC: tlv320adcx140: fix word length (git-fixes).
  * ata: libata: Add cpr_log to ata_dev_print_features() early return (git-
    fixes).
  * Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work (git-fixes).
  * Bluetooth: MGMT: Fix memory leak in set_ssp_complete (git-fixes).
  * bpf: Do not let BPF test infra emit invalid GSO types to stack
    (bsc#1255569).
  * bpf/selftests: test_select_reuseport_kern: Remove unused header
    (bsc#1257603).
  * bs-upload-kernel: Fix cve branch uploads.
  * btrfs: do not strictly require dirty metadata threshold for metadata
    writepages (stable-fixes).
  * can: ctucanfd: fix SSP_SRC in cases when bit-rate is higher than 1 MBit
    (git-fixes).
  * can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak (git-fixes).
  * can: etas_es58x: allow partial RX URB allocation to succeed (git-fixes).
  * can: gs_usb: gs_usb_receive_bulk_callback(): fix error message (git-fixes).
  * can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on
    usb_submit_urb() error (git-fixes).
  * can: j1939: make j1939_session_activate() fail if device is no longer
    registered (stable-fixes).
  * can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak (git-
    fixes).
  * can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak (git-
    fixes).
  * can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak (git-
    fixes).
  * cifs: add new field to track the last access time of cfid (git-fixes).
  * cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).
  * cifs: avoid redundant calls to disable multichannel (git-fixes).
  * cifs: cifs_pick_channel should try selecting active channels (git-fixes).
  * cifs: deal with the channel loading lag while picking channels (git-fixes).
  * cifs: dns resolution is needed only for primary channel (git-fixes).
  * cifs: do not disable interface polling on failure (git-fixes).
  * cifs: do not search for channel if server is terminating (git-fixes).
  * cifs: fix a pending undercount of srv_count (git-fixes).
  * cifs: Fix copy offload to flush destination region (bsc#1252511).
  * cifs: Fix flushing, invalidation and file size with copy_file_range()
    (bsc#1252511).
  * cifs: fix lock ordering while disabling multichannel (git-fixes).
  * cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).
  * cifs: fix use after free for iface while disabling secondary channels (git-
    fixes).
  * cifs: handle servers that still advertise multichannel after disabling (git-
    fixes).
  * cifs: handle when server starts supporting multichannel (git-fixes).
  * cifs: handle when server stops supporting multichannel (git-fixes).
  * cifs: make cifs_chan_update_iface() a void function (git-fixes).
  * cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).
  * cifs: make sure that channel scaling is done only once (git-fixes).
  * cifs: reconnect worker should take reference on server struct
    unconditionally (git-fixes).
  * cifs: reset connections for all channels when reconnect requested (git-
    fixes).
  * cifs: reset iface weights when we cannot find a candidate (git-fixes).
  * cifs: serialize other channels when query server interfaces is pending (git-
    fixes).
  * cifs: update dstaddr whenever channel iface is updated (git-fixes).
  * comedi: dmm32at: serialize use of paged registers (git-fixes).
  * comedi: fix divide-by-zero in comedi_buf_munge() (stable-fixes).
  * comedi: Fix getting range information for subdevices 16 to 255 (git-fixes).
  * cpuset: fix warning when disabling remote partition (bsc#1256794).
  * crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
    (git-fixes).
  * dmaengine: apple-admac: Add "apple,t8103-admac" compatible (git-fixes).
  * dmaengine: at_hdmac: fix device leak on of_dma_xlate() (git-fixes).
  * dmaengine: bcm-sba-raid: fix device leak on probe (git-fixes).
  * dmaengine: dw: dmamux: fix OF node leak on route allocation failure (git-
    fixes).
  * dmaengine: idxd: fix device leaks on compat bind and unbind (git-fixes).
  * dmaengine: lpc18xx-dmamux: fix device leak on route allocation (git-fixes).
  * dmaengine: omap-dma: fix dma_pool resource leak in error paths (git-fixes).
  * dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() (git-
    fixes).
  * dmaengine: sh: rz-dmac: Fix rz_dmac_terminate_all() (git-fixes).
  * dmaengine: tegra-adma: Fix use-after-free (git-fixes).
  * dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation
    (git-fixes).
  * dmaengine: ti: dma-crossbar: fix device leak on dra7x route allocation (git-
    fixes).
  * dmaengine: ti: k3-udma: fix device leak on udma lookup (git-fixes).
  * dmaengine: xilinx_dma: Fix uninitialized addr_width when "xlnx,addrwidth"
    property is missing (git-fixes).
  * dmaengine: xilinx: xdma: Fix regmap max_register (git-fixes).
  * dpll: fix device-id-get and pin-id-get to return errors properly (git-
    fixes).
  * dpll: fix return value check for kmemdup (git-fixes).
  * dpll: indent DPLL option type by a tab (git-fixes).
  * dpll: Prevent duplicate registrations (git-fixes).
  * dpll: spec: add missing module-name and clock-id to pin-get reply (git-
    fixes).
  * drm/amd: Clean up kfd node on surprise disconnect (stable-fixes).
  * drm/amd/display: Apply e4479aecf658 to dml (stable-fixes).
  * drm/amd/display: Bump the HDMI clock to 340MHz (stable-fixes).
  * drm/amd/display: Fix DP no audio issue (stable-fixes).
  * drm/amd/display: Initialise backlight level values from hw (git-fixes).
  * drm/amd/display: Respect user's CONFIG_FRAME_WARN more for dml files
    (stable-fixes).
  * drm/amd/display: shrink struct members (stable-fixes).
  * drm/amd/pm: Don't clear SI SMC table when setting power limit (git-fixes).
  * drm/amd/pm: fix race in power state check before mutex lock (git-fixes).
  * drm/amd/pm: fix smu overdrive data type wrong issue on smu 14.0.2 (git-
    fixes).
  * drm/amd/pm: Workaround SI powertune issue on Radeon 430 (v2) (git-fixes).
  * drm/amdgpu: Fix cond_exec handling in amdgpu_ib_schedule() (git-fixes).
  * drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove
    (git-fixes).
  * drm/amdgpu: Fix query for VPE block_type and ip_count (stable-fixes).
  * drm/amdgpu: remove frame cntl for gfx v12 (stable-fixes).
  * drm/amdkfd: fix a memory leak in device_queue_manager_init() (git-fixes).
  * drm/amdkfd: Fix improper NULL termination of queue restore SMI event string
    (stable-fixes).
  * drm/imagination: Wait for FW trace update command completion (git-fixes).
  * drm/imx/tve: fix probe device leak (git-fixes).
  * drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).
  * drm/nouveau: add missing DCB connector types (git-fixes).
  * drm/nouveau: implement missing DCB connector types; gracefully handle
    unknown connectors (git-fixes).
  * drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit) (stable-
    fixes).
  * drm/nouveau/disp/nv50-: Set lock_core in curs507a_prepare (git-fixes).
  * drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel
    (git-fixes).
  * drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] (stable-
    fixes).
  * drm/vmwgfx: Fix an error return check in vmw_compat_shader_add() (git-
    fixes).
  * drm/vmwgfx: Merge vmw_bo_release and vmw_bo_free functions (git-fixes).
  * exfat: check return value of sb_min_blocksize in exfat_read_boot_sector
    (git-fixes).
  * exfat: fix remount failure in different process environments (git-fixes).
  * gpio: omap: do not register driver in probe() (git-fixes).
  * gpio: pca953x: Add support for level-triggered interrupts (stable-fixes).
  * gpio: pca953x: fix wrong error probe return value (git-fixes).
  * gpio: pca953x: handle short interrupt pulses on PCAL devices (git-fixes).
  * gpio: pca953x: Utilise dev_err_probe() where it makes sense (stable-fixes).
  * gpio: pca953x: Utilise temporary variable for struct device (stable-fixes).
  * gpio: rockchip: Stop calling pinctrl for set_direction (git-fixes).
  * HID: usbhid: paper over wrong bNumDescriptor field (stable-fixes).
  * ice: use netif_get_num_default_rss_queues() (bsc#1247712).
  * iio: accel: iis328dq: fix gain values (git-fixes).
  * iio: adc: ad7280a: handle spi_setup() errors in probe() (git-fixes).
  * iio: adc: ad9467: fix ad9434 vref mask (git-fixes).
  * iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc
    driver (git-fixes).
  * iio: dac: ad5686: add AD5695R to ad5686_chip_info_tbl (git-fixes).
  * iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection
    (git-fixes).
  * Input: i8042 - add quirk for ASUS Zenbook UX425QA_UM425QA (stable-fixes).
  * Input: i8042 - add quirks for MECHREVO Wujie 15X Pro (stable-fixes).
  * intel_th: fix device leak on output open() (git-fixes).
  * leds: led-class: Only Add LED to leds_list when it is fully ready (git-
    fixes).
  * lib/crypto: aes: Fix missing MMU protection for AES S-box (git-fixes).
  * mei: me: add nova lake point S DID (stable-fixes).
  * mei: me: add wildcat lake P DID (stable-fixes).
  * mISDN: annotate data-race around dev->work (git-fixes).
  * mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
    (bsc#1253087).
  * mmc: rtsx_pci_sdmmc: implement sdmmc_card_busy function (git-fixes).
  * mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
    (git-fixes).
  * net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon
    receiving the second rts (git-fixes).
  * net: hv_netvsc: reject RSS hash key programming without RX indirection table
    (bsc#1257473).
  * net: mana: Add metadata support for xdp mode (git-fixes).
  * net: mana: Add standard counter rx_missed_errors (git-fixes).
  * net: mana: Add support for auxiliary device servicing events (git-fixes).
  * net: mana: Change the function signature of mana_get_primary_netdev_rcu
    (bsc#1256690).
  * net: mana: Drop TX skb on post_work_request failure and unmap resources
    (git-fixes).
  * net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).
  * net: mana: Fix use-after-free in reset service rescan path (git-fixes).
  * net: mana: Fix warnings for missing export.h header inclusion (git-fixes).
  * net: mana: Handle hardware recovery events when probing the device (git-
    fixes).
  * net: mana: Handle Reset Request from MANA NIC (git-fixes).
  * net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).
  * net: mana: Handle unsupported HWC commands (git-fixes).
  * net: mana: Move hardware counter stats from per-port to per-VF context (git-
    fixes).
  * net: mana: Probe rdma device in mana driver (git-fixes).
  * net: mana: Reduce waiting time if HWC not responding (git-fixes).
  * net: tcp: allow zero-window ACK update the window (bsc#1254767).
  * net: usb: dm9601: remove broken SR9700 support (git-fixes).
  * net: wwan: t7xx: fix potential skb->frags overflow in RX path (git-fixes).
  * nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame() (git-fixes).
  * nfc: nci: Fix race between rfkill and nci_unregister_device() (git-fixes).
  * NFS: Fix up the automount fs_context to use the correct cred (git-fixes).
  * nfsd: Drop the client reference in client_states_open() (git-fixes).
  * NFSD: Fix permission check for read access to executable-only files (git-
    fixes).
  * NFSD: use correct reservation type in nfsd4_scsi_fence_client (git-fixes).
  * NFSD/blocklayout: Fix minlength check in proc_layoutget (git-fixes).
  * NFSv4: ensure the open stateid seqid doesn't go backwards (git-fixes).
  * nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).
  * nvmet-auth: update sc_c in host response (git-fixes).
  * nvmet-auth: update sc_c in target host hash calculation (git-fixes).
  * of: fix reference count leak in of_alias_scan() (git-fixes).
  * of: platform: Use default match table for /firmware (git-fixes).
  * phy: freescale: imx8m-pcie: assert phy reset during power on (stable-fixes).
  * phy: rockchip: inno-usb2: fix communication disruption in gadget mode (git-
    fixes).
  * phy: rockchip: inno-usb2: fix disconnection in gadget mode (git-fixes).
  * phy: stm32-usphyc: Fix off by one in probe() (git-fixes).
  * phy: tegra: xusb: Explicitly configure HS_DISCON_LEVEL to 0x7 (git-fixes).
  * platform/x86: hp-bioscfg: Fix automatic module loading (git-fixes).
  * platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro (git-
    fixes).
  * platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names
    (git-fixes).
  * platform/x86/amd: Fix memory leak in wbrf_record() (git-fixes).
  * pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node() (git-
    fixes).
  * powercap: fix race condition in register_control_type() (stable-fixes).
  * powercap: fix sscanf() error return value handling (stable-fixes).
  * powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).
  * RDMA/mana_ib: Access remote atomic for MRs (git-fixes).
  * RDMA/mana_ib: add additional port counters (git-fixes).
  * RDMA/mana_ib: Add device statistics support (git-fixes).
  * RDMA/mana_ib: Add port statistics support (git-fixes).
  * RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).
  * RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).
  * RDMA/mana_ib: add support of multiple ports (git-fixes).
  * RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).
  * RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).
  * RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).
  * RDMA/mana_ib: create kernel-level CQs (git-fixes).
  * RDMA/mana_ib: create/destroy AH (git-fixes).
  * RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).
  * RDMA/mana_ib: extend mana QP table (git-fixes).
  * RDMA/mana_ib: Extend modify QP (git-fixes).
  * RDMA/mana_ib: Fix error code in probe() (git-fixes).
  * RDMA/mana_ib: Fix integer overflow during queue creation (git-fixes).
  * RDMA/mana_ib: Handle net event for pointing to the current netdev
    (bsc#1256690).
  * RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).
  * RDMA/mana_ib: Implement DMABUF MR support (git-fixes).
  * RDMA/mana_ib: implement get_dma_mr (git-fixes).
  * RDMA/mana_ib: implement req_notify_cq (git-fixes).
  * RDMA/mana_ib: indicate CM support (git-fixes).
  * RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).
  * RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).
  * RDMA/mana_ib: request error CQEs when supported (git-fixes).
  * RDMA/mana_ib: support of the zero based MRs (git-fixes).
  * RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).
  * RDMA/mana_ib: UD/GSI work requests (git-fixes).
  * RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-
    fixes).
  * RDMA/mana_ib: Use safer allocation function() (git-fixes).
  * regmap: Fix race condition in hwspinlock irqsave routine (git-fixes).
  * sched: Increase sched_tick_remote timeout (bsc#1254510).
  * sched/rt: Skip group schedulable check with rt_group_sched=0 (bsc#1256568).
  * scripts: obsapi: Support URL trailing / in oscrc.
  * scripts: teaapi: Add paging.
  * scripts: uploader: Fix no change condition for _maintainership.json.
  * scripts: uploader: Handle missing upstream in is_pr_open.
  * scripts/python/git_sort/git_sort.yaml: add cifs for-next repository.
  * scrits: teaapi: Add list_repos.
  * scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256861).
  * scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256861).
  * scsi: qla2xxx: Add bsg interface to support firmware img validation
    (bsc#1256863).
  * scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx
    (bsc#1256863).
  * scsi: qla2xxx: Add Speed in SFP print information (bsc#1256863).
  * scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256863).
  * scsi: qla2xxx: Allow recovery for tape devices (bsc#1256863).
  * scsi: qla2xxx: Delay module unload while fabric scan in progress
    (bsc#1256863).
  * scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256863).
  * scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256863).
  * scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256863).
  * scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256863).
  * scsi: qla2xxx: Validate MCU signature before executing MBC 03h
    (bsc#1256863).
  * scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256863).
  * scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
  * selftests: net: fib-onlink-tests: Convert to use namespaces by default
    (bsc#1255346).
  * selftests/bpf: Fix flaky bpf_cookie selftest (git-fixes).
  * serial: 8250_pci: Fix broken RS485 for F81504/508/512 (git-fixes).
  * slimbus: core: fix device reference leak on report present (git-fixes).
  * slimbus: core: fix OF node leak on registration failure (git-fixes).
  * slimbus: core: fix of_slim_get_device() kernel doc (git-fixes).
  * slimbus: core: fix runtime PM imbalance on report present (git-fixes).
  * smb: change return type of cached_dir_lease_break() to bool (git-fixes).
  * smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid
    (git-fixes).
  * smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).
  * smb: client: fix warning when reconnecting channel (git-fixes).
  * smb: client: introduce close_cached_dir_locked() (git-fixes).
  * smb: client: remove unused fid_lock (git-fixes).
  * smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-
    fixes).
  * smb: client: split cached_fid bitfields to avoid shared-byte RMW races
    (bsc#1250748).
  * smb: client: update cfid->last_access_time in open_cached_dir_by_dentry()
    (git-fixes).
  * smb: improve directory cache reuse for readdir operations (bsc#1252712).
  * smb3: add missing null server pointer check (git-fixes).
  * spi: spi-sprd-adi: Fix double free in probe error path (git-fixes).
  * spi: sprd-adi: switch to use spi_alloc_host() (stable-fixes).
  * spi: sprd: adi: Use devm_register_restart_handler() (stable-fixes).
  * svcrdma: return 0 on success from svc_rdma_copy_inline_range (git-fixes).
  * uacce: ensure safe queue release with state management (git-fixes).
  * uacce: fix cdev handling in the cleanup path (git-fixes).
  * uacce: fix isolate sysfs check condition (git-fixes).
  * uacce: implement mremap in uacce_vm_ops to return -EPERM (git-fixes).
  * usb: core: add USB_QUIRK_NO_BOS for devices that hang on BOS descriptor
    (stable-fixes).
  * usb: dwc3: Check for USB4 IP_NAME (stable-fixes).
  * USB: OHCI/UHCI: Add soft dependencies on ehci_platform (stable-fixes).
  * USB: serial: ftdi_sio: add support for PICAXE AXE027 cable (stable-fixes).
  * USB: serial: option: add Telit LE910 MBIM composition (stable-fixes).
  * usbnet: limit max_mtu based on device's hard_mtu (git-fixes).
  * w1: fix redundant counter decrement in w1_attach_slave_device() (git-fixes).
  * w1: therm: Fix off-by-one buffer overflow in alarms_store (git-fixes).
  * wifi: ath10k: fix dma_free_coherent() pointer (git-fixes).
  * wifi: ath12k: fix dma_free_coherent() pointer (git-fixes).
  * wifi: mac80211: correctly decode TTLM with default link map (git-fixes).
  * wifi: mac80211: don't perform DA check on S1G beacon (git-fixes).
  * wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).
  * wifi: rsi: Fix memory corruption due to not set vif driver data size (git-
    fixes).
  * x86: make page fault handling disable interrupts properly (git-fixes).
  * x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).
  * x86/microcode/AMD: Add more known models to entry sign checking
    (bsc#1256528).
  * x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).
  * x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).
  * x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).
  * x86/microcode/AMD: Clean the cache if update did not load microcode
    (bsc#1256528).
  * x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any
    unreleased standalone Zen5 microcode patches (bsc#1256528).
  * x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).
  * x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo
    (bsc#1256528).
  * x86/microcode/AMD: Limit Entrysign signature checking to known generations
    (bsc#1256528).
  * x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).
  * x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * Basesystem Module 15-SP7  
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-447=1

  * Development Tools Module 15-SP7  
    zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-447=1

  * Legacy Module 15-SP7  
    zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-447=1

  * SUSE Linux Enterprise High Availability Extension 15 SP7  
    zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2026-447=1

  * SUSE Linux Enterprise Workstation Extension 15 SP7  
    zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-447=1

  * SUSE Linux Enterprise Live Patching 15-SP7  
    zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-447=1  
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

## Package List:

  * Basesystem Module 15-SP7 (aarch64 nosrc)
    * kernel-64kb-6.4.0-150700.53.31.1
  * Basesystem Module 15-SP7 (aarch64)
    * kernel-64kb-debuginfo-6.4.0-150700.53.31.1
    * kernel-64kb-debugsource-6.4.0-150700.53.31.1
    * kernel-64kb-devel-debuginfo-6.4.0-150700.53.31.1
    * kernel-64kb-devel-6.4.0-150700.53.31.1
  * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64 nosrc)
    * kernel-default-6.4.0-150700.53.31.1
  * Basesystem Module 15-SP7 (aarch64 ppc64le x86_64)
    * kernel-default-base-6.4.0-150700.53.31.1.150700.17.21.1
  * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150700.53.31.1
    * kernel-default-devel-debuginfo-6.4.0-150700.53.31.1
    * kernel-default-devel-6.4.0-150700.53.31.1
    * kernel-default-debuginfo-6.4.0-150700.53.31.1
  * Basesystem Module 15-SP7 (noarch)
    * kernel-macros-6.4.0-150700.53.31.1
    * kernel-devel-6.4.0-150700.53.31.1
  * Basesystem Module 15-SP7 (nosrc s390x)
    * kernel-zfcpdump-6.4.0-150700.53.31.1
  * Basesystem Module 15-SP7 (s390x)
    * kernel-zfcpdump-debuginfo-6.4.0-150700.53.31.1
    * kernel-zfcpdump-debugsource-6.4.0-150700.53.31.1
  * Development Tools Module 15-SP7 (noarch nosrc)
    * kernel-docs-6.4.0-150700.53.31.1
  * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
    * kernel-obs-build-debugsource-6.4.0-150700.53.31.1
    * kernel-obs-build-6.4.0-150700.53.31.1
    * kernel-syms-6.4.0-150700.53.31.1
  * Development Tools Module 15-SP7 (noarch)
    * kernel-source-6.4.0-150700.53.31.1
  * Legacy Module 15-SP7 (nosrc)
    * kernel-default-6.4.0-150700.53.31.1
  * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150700.53.31.1
    * reiserfs-kmp-default-debuginfo-6.4.0-150700.53.31.1
    * reiserfs-kmp-default-6.4.0-150700.53.31.1
    * kernel-default-debuginfo-6.4.0-150700.53.31.1
  * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le
    s390x x86_64)
    * kernel-default-debugsource-6.4.0-150700.53.31.1
    * ocfs2-kmp-default-6.4.0-150700.53.31.1
    * dlm-kmp-default-6.4.0-150700.53.31.1
    * kernel-default-debuginfo-6.4.0-150700.53.31.1
    * cluster-md-kmp-default-debuginfo-6.4.0-150700.53.31.1
    * ocfs2-kmp-default-debuginfo-6.4.0-150700.53.31.1
    * gfs2-kmp-default-6.4.0-150700.53.31.1
    * gfs2-kmp-default-debuginfo-6.4.0-150700.53.31.1
    * cluster-md-kmp-default-6.4.0-150700.53.31.1
    * dlm-kmp-default-debuginfo-6.4.0-150700.53.31.1
  * SUSE Linux Enterprise High Availability Extension 15 SP7 (nosrc)
    * kernel-default-6.4.0-150700.53.31.1
  * SUSE Linux Enterprise Workstation Extension 15 SP7 (nosrc)
    * kernel-default-6.4.0-150700.53.31.1
  * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
    * kernel-default-debugsource-6.4.0-150700.53.31.1
    * kernel-default-extra-debuginfo-6.4.0-150700.53.31.1
    * kernel-default-extra-6.4.0-150700.53.31.1
    * kernel-default-debuginfo-6.4.0-150700.53.31.1
  * SUSE Linux Enterprise Live Patching 15-SP7 (nosrc)
    * kernel-default-6.4.0-150700.53.31.1
  * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64)
    * kernel-default-debugsource-6.4.0-150700.53.31.1
    * kernel-livepatch-6_4_0-150700_53_31-default-debuginfo-1-150700.15.3.1
    * kernel-default-debuginfo-6.4.0-150700.53.31.1
    * kernel-default-livepatch-6.4.0-150700.53.31.1
    * kernel-livepatch-SLE15-SP7_Update_9-debugsource-1-150700.15.3.1
    * kernel-livepatch-6_4_0-150700_53_31-default-1-150700.15.3.1
    * kernel-default-livepatch-devel-6.4.0-150700.53.31.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-53714.html
  * https://www.suse.com/security/cve/CVE-2023-54013.html
  * https://www.suse.com/security/cve/CVE-2024-27005.html
  * https://www.suse.com/security/cve/CVE-2024-42103.html
  * https://www.suse.com/security/cve/CVE-2024-53070.html
  * https://www.suse.com/security/cve/CVE-2024-53149.html
  * https://www.suse.com/security/cve/CVE-2024-56721.html
  * https://www.suse.com/security/cve/CVE-2025-22047.html
  * https://www.suse.com/security/cve/CVE-2025-37744.html
  * https://www.suse.com/security/cve/CVE-2025-37751.html
  * https://www.suse.com/security/cve/CVE-2025-37813.html
  * https://www.suse.com/security/cve/CVE-2025-38209.html
  * https://www.suse.com/security/cve/CVE-2025-38243.html
  * https://www.suse.com/security/cve/CVE-2025-38322.html
  * https://www.suse.com/security/cve/CVE-2025-38379.html
  * https://www.suse.com/security/cve/CVE-2025-38539.html
  * https://www.suse.com/security/cve/CVE-2025-39689.html
  * https://www.suse.com/security/cve/CVE-2025-39813.html
  * https://www.suse.com/security/cve/CVE-2025-39829.html
  * https://www.suse.com/security/cve/CVE-2025-39836.html
  * https://www.suse.com/security/cve/CVE-2025-39880.html
  * https://www.suse.com/security/cve/CVE-2025-39913.html
  * https://www.suse.com/security/cve/CVE-2025-40097.html
  * https://www.suse.com/security/cve/CVE-2025-40106.html
  * https://www.suse.com/security/cve/CVE-2025-40132.html
  * https://www.suse.com/security/cve/CVE-2025-40136.html
  * https://www.suse.com/security/cve/CVE-2025-40142.html
  * https://www.suse.com/security/cve/CVE-2025-40166.html
  * https://www.suse.com/security/cve/CVE-2025-40177.html
  * https://www.suse.com/security/cve/CVE-2025-40181.html
  * https://www.suse.com/security/cve/CVE-2025-40202.html
  * https://www.suse.com/security/cve/CVE-2025-40238.html
  * https://www.suse.com/security/cve/CVE-2025-40254.html
  * https://www.suse.com/security/cve/CVE-2025-40257.html
  * https://www.suse.com/security/cve/CVE-2025-40259.html
  * https://www.suse.com/security/cve/CVE-2025-40261.html
  * https://www.suse.com/security/cve/CVE-2025-40264.html
  * https://www.suse.com/security/cve/CVE-2025-40328.html
  * https://www.suse.com/security/cve/CVE-2025-40350.html
  * https://www.suse.com/security/cve/CVE-2025-40355.html
  * https://www.suse.com/security/cve/CVE-2025-40363.html
  * https://www.suse.com/security/cve/CVE-2025-68171.html
  * https://www.suse.com/security/cve/CVE-2025-68174.html
  * https://www.suse.com/security/cve/CVE-2025-68178.html
  * https://www.suse.com/security/cve/CVE-2025-68188.html
  * https://www.suse.com/security/cve/CVE-2025-68200.html
  * https://www.suse.com/security/cve/CVE-2025-68215.html
  * https://www.suse.com/security/cve/CVE-2025-68227.html
  * https://www.suse.com/security/cve/CVE-2025-68241.html
  * https://www.suse.com/security/cve/CVE-2025-68245.html
  * https://www.suse.com/security/cve/CVE-2025-68254.html
  * https://www.suse.com/security/cve/CVE-2025-68256.html
  * https://www.suse.com/security/cve/CVE-2025-68261.html
  * https://www.suse.com/security/cve/CVE-2025-68284.html
  * https://www.suse.com/security/cve/CVE-2025-68285.html
  * https://www.suse.com/security/cve/CVE-2025-68296.html
  * https://www.suse.com/security/cve/CVE-2025-68297.html
  * https://www.suse.com/security/cve/CVE-2025-68301.html
  * https://www.suse.com/security/cve/CVE-2025-68320.html
  * https://www.suse.com/security/cve/CVE-2025-68325.html
  * https://www.suse.com/security/cve/CVE-2025-68327.html
  * https://www.suse.com/security/cve/CVE-2025-68337.html
  * https://www.suse.com/security/cve/CVE-2025-68349.html
  * https://www.suse.com/security/cve/CVE-2025-68363.html
  * https://www.suse.com/security/cve/CVE-2025-68365.html
  * https://www.suse.com/security/cve/CVE-2025-68366.html
  * https://www.suse.com/security/cve/CVE-2025-68367.html
  * https://www.suse.com/security/cve/CVE-2025-68372.html
  * https://www.suse.com/security/cve/CVE-2025-68379.html
  * https://www.suse.com/security/cve/CVE-2025-68725.html
  * https://www.suse.com/security/cve/CVE-2025-68727.html
  * https://www.suse.com/security/cve/CVE-2025-68728.html
  * https://www.suse.com/security/cve/CVE-2025-68733.html
  * https://www.suse.com/security/cve/CVE-2025-68764.html
  * https://www.suse.com/security/cve/CVE-2025-68768.html
  * https://www.suse.com/security/cve/CVE-2025-68770.html
  * https://www.suse.com/security/cve/CVE-2025-68771.html
  * https://www.suse.com/security/cve/CVE-2025-68773.html
  * https://www.suse.com/security/cve/CVE-2025-68775.html
  * https://www.suse.com/security/cve/CVE-2025-68776.html
  * https://www.suse.com/security/cve/CVE-2025-68777.html
  * https://www.suse.com/security/cve/CVE-2025-68783.html
  * https://www.suse.com/security/cve/CVE-2025-68788.html
  * https://www.suse.com/security/cve/CVE-2025-68789.html
  * https://www.suse.com/security/cve/CVE-2025-68795.html
  * https://www.suse.com/security/cve/CVE-2025-68797.html
  * https://www.suse.com/security/cve/CVE-2025-68798.html
  * https://www.suse.com/security/cve/CVE-2025-68800.html
  * https://www.suse.com/security/cve/CVE-2025-68801.html
  * https://www.suse.com/security/cve/CVE-2025-68802.html
  * https://www.suse.com/security/cve/CVE-2025-68803.html
  * https://www.suse.com/security/cve/CVE-2025-68804.html
  * https://www.suse.com/security/cve/CVE-2025-68808.html
  * https://www.suse.com/security/cve/CVE-2025-68813.html
  * https://www.suse.com/security/cve/CVE-2025-68814.html
  * https://www.suse.com/security/cve/CVE-2025-68815.html
  * https://www.suse.com/security/cve/CVE-2025-68816.html
  * https://www.suse.com/security/cve/CVE-2025-68819.html
  * https://www.suse.com/security/cve/CVE-2025-68820.html
  * https://www.suse.com/security/cve/CVE-2025-71064.html
  * https://www.suse.com/security/cve/CVE-2025-71066.html
  * https://www.suse.com/security/cve/CVE-2025-71076.html
  * https://www.suse.com/security/cve/CVE-2025-71077.html
  * https://www.suse.com/security/cve/CVE-2025-71078.html
  * https://www.suse.com/security/cve/CVE-2025-71079.html
  * https://www.suse.com/security/cve/CVE-2025-71080.html
  * https://www.suse.com/security/cve/CVE-2025-71081.html
  * https://www.suse.com/security/cve/CVE-2025-71082.html
  * https://www.suse.com/security/cve/CVE-2025-71083.html
  * https://www.suse.com/security/cve/CVE-2025-71084.html
  * https://www.suse.com/security/cve/CVE-2025-71085.html
  * https://www.suse.com/security/cve/CVE-2025-71086.html
  * https://www.suse.com/security/cve/CVE-2025-71087.html
  * https://www.suse.com/security/cve/CVE-2025-71088.html
  * https://www.suse.com/security/cve/CVE-2025-71089.html
  * https://www.suse.com/security/cve/CVE-2025-71091.html
  * https://www.suse.com/security/cve/CVE-2025-71093.html
  * https://www.suse.com/security/cve/CVE-2025-71094.html
  * https://www.suse.com/security/cve/CVE-2025-71095.html
  * https://www.suse.com/security/cve/CVE-2025-71096.html
  * https://www.suse.com/security/cve/CVE-2025-71097.html
  * https://www.suse.com/security/cve/CVE-2025-71098.html
  * https://www.suse.com/security/cve/CVE-2025-71099.html
  * https://www.suse.com/security/cve/CVE-2025-71100.html
  * https://www.suse.com/security/cve/CVE-2025-71101.html
  * https://www.suse.com/security/cve/CVE-2025-71108.html
  * https://www.suse.com/security/cve/CVE-2025-71111.html
  * https://www.suse.com/security/cve/CVE-2025-71112.html
  * https://www.suse.com/security/cve/CVE-2025-71114.html
  * https://www.suse.com/security/cve/CVE-2025-71116.html
  * https://www.suse.com/security/cve/CVE-2025-71118.html
  * https://www.suse.com/security/cve/CVE-2025-71119.html
  * https://www.suse.com/security/cve/CVE-2025-71120.html
  * https://www.suse.com/security/cve/CVE-2025-71123.html
  * https://www.suse.com/security/cve/CVE-2025-71130.html
  * https://www.suse.com/security/cve/CVE-2025-71131.html
  * https://www.suse.com/security/cve/CVE-2025-71132.html
  * https://www.suse.com/security/cve/CVE-2025-71133.html
  * https://www.suse.com/security/cve/CVE-2025-71135.html
  * https://www.suse.com/security/cve/CVE-2025-71136.html
  * https://www.suse.com/security/cve/CVE-2025-71137.html
  * https://www.suse.com/security/cve/CVE-2025-71138.html
  * https://www.suse.com/security/cve/CVE-2025-71141.html
  * https://www.suse.com/security/cve/CVE-2025-71142.html
  * https://www.suse.com/security/cve/CVE-2025-71143.html
  * https://www.suse.com/security/cve/CVE-2025-71145.html
  * https://www.suse.com/security/cve/CVE-2025-71147.html
  * https://www.suse.com/security/cve/CVE-2025-71149.html
  * https://www.suse.com/security/cve/CVE-2025-71154.html
  * https://www.suse.com/security/cve/CVE-2025-71156.html
  * https://www.suse.com/security/cve/CVE-2025-71157.html
  * https://www.suse.com/security/cve/CVE-2025-71162.html
  * https://www.suse.com/security/cve/CVE-2025-71163.html
  * https://www.suse.com/security/cve/CVE-2026-22976.html
  * https://www.suse.com/security/cve/CVE-2026-22977.html
  * https://www.suse.com/security/cve/CVE-2026-22978.html
  * https://www.suse.com/security/cve/CVE-2026-22984.html
  * https://www.suse.com/security/cve/CVE-2026-22985.html
  * https://www.suse.com/security/cve/CVE-2026-22988.html
  * https://www.suse.com/security/cve/CVE-2026-22990.html
  * https://www.suse.com/security/cve/CVE-2026-22991.html
  * https://www.suse.com/security/cve/CVE-2026-22992.html
  * https://www.suse.com/security/cve/CVE-2026-22993.html
  * https://www.suse.com/security/cve/CVE-2026-22996.html
  * https://www.suse.com/security/cve/CVE-2026-22997.html
  * https://www.suse.com/security/cve/CVE-2026-22999.html
  * https://www.suse.com/security/cve/CVE-2026-23000.html
  * https://www.suse.com/security/cve/CVE-2026-23001.html
  * https://www.suse.com/security/cve/CVE-2026-23005.html
  * https://www.suse.com/security/cve/CVE-2026-23006.html
  * https://www.suse.com/security/cve/CVE-2026-23011.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1205462
  * https://bugzilla.suse.com/show_bug.cgi?id=1214285
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1223800
  * https://bugzilla.suse.com/show_bug.cgi?id=1228490
  * https://bugzilla.suse.com/show_bug.cgi?id=1233563
  * https://bugzilla.suse.com/show_bug.cgi?id=1234842
  * https://bugzilla.suse.com/show_bug.cgi?id=1235566
  * https://bugzilla.suse.com/show_bug.cgi?id=1241437
  * https://bugzilla.suse.com/show_bug.cgi?id=1242505
  * https://bugzilla.suse.com/show_bug.cgi?id=1242909
  * https://bugzilla.suse.com/show_bug.cgi?id=1243662
  * https://bugzilla.suse.com/show_bug.cgi?id=1243677
  * https://bugzilla.suse.com/show_bug.cgi?id=1243678
  * https://bugzilla.suse.com/show_bug.cgi?id=1245538
  * https://bugzilla.suse.com/show_bug.cgi?id=1246022
  * https://bugzilla.suse.com/show_bug.cgi?id=1246184
  * https://bugzilla.suse.com/show_bug.cgi?id=1246447
  * https://bugzilla.suse.com/show_bug.cgi?id=1247030
  * https://bugzilla.suse.com/show_bug.cgi?id=1247712
  * https://bugzilla.suse.com/show_bug.cgi?id=1248211
  * https://bugzilla.suse.com/show_bug.cgi?id=1249307
  * https://bugzilla.suse.com/show_bug.cgi?id=1249904
  * https://bugzilla.suse.com/show_bug.cgi?id=1250032
  * https://bugzilla.suse.com/show_bug.cgi?id=1250082
  * https://bugzilla.suse.com/show_bug.cgi?id=1250388
  * https://bugzilla.suse.com/show_bug.cgi?id=1250705
  * https://bugzilla.suse.com/show_bug.cgi?id=1250748
  * https://bugzilla.suse.com/show_bug.cgi?id=1252511
  * https://bugzilla.suse.com/show_bug.cgi?id=1252712
  * https://bugzilla.suse.com/show_bug.cgi?id=1252891
  * https://bugzilla.suse.com/show_bug.cgi?id=1252900
  * https://bugzilla.suse.com/show_bug.cgi?id=1253087
  * https://bugzilla.suse.com/show_bug.cgi?id=1253330
  * https://bugzilla.suse.com/show_bug.cgi?id=1253340
  * https://bugzilla.suse.com/show_bug.cgi?id=1253348
  * https://bugzilla.suse.com/show_bug.cgi?id=1253433
  * https://bugzilla.suse.com/show_bug.cgi?id=1253443
  * https://bugzilla.suse.com/show_bug.cgi?id=1253451
  * https://bugzilla.suse.com/show_bug.cgi?id=1253471
  * https://bugzilla.suse.com/show_bug.cgi?id=1253739
  * https://bugzilla.suse.com/show_bug.cgi?id=1254244
  * https://bugzilla.suse.com/show_bug.cgi?id=1254447
  * https://bugzilla.suse.com/show_bug.cgi?id=1254465
  * https://bugzilla.suse.com/show_bug.cgi?id=1254510
  * https://bugzilla.suse.com/show_bug.cgi?id=1254624
  * https://bugzilla.suse.com/show_bug.cgi?id=1254767
  * https://bugzilla.suse.com/show_bug.cgi?id=1254835
  * https://bugzilla.suse.com/show_bug.cgi?id=1254839
  * https://bugzilla.suse.com/show_bug.cgi?id=1254842
  * https://bugzilla.suse.com/show_bug.cgi?id=1254845
  * https://bugzilla.suse.com/show_bug.cgi?id=1254852
  * https://bugzilla.suse.com/show_bug.cgi?id=1254871
  * https://bugzilla.suse.com/show_bug.cgi?id=1255102
  * https://bugzilla.suse.com/show_bug.cgi?id=1255120
  * https://bugzilla.suse.com/show_bug.cgi?id=1255128
  * https://bugzilla.suse.com/show_bug.cgi?id=1255138
  * https://bugzilla.suse.com/show_bug.cgi?id=1255140
  * https://bugzilla.suse.com/show_bug.cgi?id=1255157
  * https://bugzilla.suse.com/show_bug.cgi?id=1255164
  * https://bugzilla.suse.com/show_bug.cgi?id=1255172
  * https://bugzilla.suse.com/show_bug.cgi?id=1255216
  * https://bugzilla.suse.com/show_bug.cgi?id=1255226
  * https://bugzilla.suse.com/show_bug.cgi?id=1255241
  * https://bugzilla.suse.com/show_bug.cgi?id=1255255
  * https://bugzilla.suse.com/show_bug.cgi?id=1255260
  * https://bugzilla.suse.com/show_bug.cgi?id=1255261
  * https://bugzilla.suse.com/show_bug.cgi?id=1255266
  * https://bugzilla.suse.com/show_bug.cgi?id=1255268
  * https://bugzilla.suse.com/show_bug.cgi?id=1255269
  * https://bugzilla.suse.com/show_bug.cgi?id=1255327
  * https://bugzilla.suse.com/show_bug.cgi?id=1255346
  * https://bugzilla.suse.com/show_bug.cgi?id=1255377
  * https://bugzilla.suse.com/show_bug.cgi?id=1255401
  * https://bugzilla.suse.com/show_bug.cgi?id=1255403
  * https://bugzilla.suse.com/show_bug.cgi?id=1255417
  * https://bugzilla.suse.com/show_bug.cgi?id=1255482
  * https://bugzilla.suse.com/show_bug.cgi?id=1255488
  * https://bugzilla.suse.com/show_bug.cgi?id=1255537
  * https://bugzilla.suse.com/show_bug.cgi?id=1255539
  * https://bugzilla.suse.com/show_bug.cgi?id=1255544
  * https://bugzilla.suse.com/show_bug.cgi?id=1255547
  * https://bugzilla.suse.com/show_bug.cgi?id=1255548
  * https://bugzilla.suse.com/show_bug.cgi?id=1255552
  * https://bugzilla.suse.com/show_bug.cgi?id=1255568
  * https://bugzilla.suse.com/show_bug.cgi?id=1255569
  * https://bugzilla.suse.com/show_bug.cgi?id=1255615
  * https://bugzilla.suse.com/show_bug.cgi?id=1255622
  * https://bugzilla.suse.com/show_bug.cgi?id=1255695
  * https://bugzilla.suse.com/show_bug.cgi?id=1255930
  * https://bugzilla.suse.com/show_bug.cgi?id=1256280
  * https://bugzilla.suse.com/show_bug.cgi?id=1256528
  * https://bugzilla.suse.com/show_bug.cgi?id=1256568
  * https://bugzilla.suse.com/show_bug.cgi?id=1256579
  * https://bugzilla.suse.com/show_bug.cgi?id=1256582
  * https://bugzilla.suse.com/show_bug.cgi?id=1256584
  * https://bugzilla.suse.com/show_bug.cgi?id=1256586
  * https://bugzilla.suse.com/show_bug.cgi?id=1256591
  * https://bugzilla.suse.com/show_bug.cgi?id=1256592
  * https://bugzilla.suse.com/show_bug.cgi?id=1256593
  * https://bugzilla.suse.com/show_bug.cgi?id=1256594
  * https://bugzilla.suse.com/show_bug.cgi?id=1256597
  * https://bugzilla.suse.com/show_bug.cgi?id=1256605
  * https://bugzilla.suse.com/show_bug.cgi?id=1256606
  * https://bugzilla.suse.com/show_bug.cgi?id=1256607
  * https://bugzilla.suse.com/show_bug.cgi?id=1256608
  * https://bugzilla.suse.com/show_bug.cgi?id=1256609
  * https://bugzilla.suse.com/show_bug.cgi?id=1256610
  * https://bugzilla.suse.com/show_bug.cgi?id=1256611
  * https://bugzilla.suse.com/show_bug.cgi?id=1256612
  * https://bugzilla.suse.com/show_bug.cgi?id=1256613
  * https://bugzilla.suse.com/show_bug.cgi?id=1256616
  * https://bugzilla.suse.com/show_bug.cgi?id=1256617
  * https://bugzilla.suse.com/show_bug.cgi?id=1256619
  * https://bugzilla.suse.com/show_bug.cgi?id=1256622
  * https://bugzilla.suse.com/show_bug.cgi?id=1256623
  * https://bugzilla.suse.com/show_bug.cgi?id=1256625
  * https://bugzilla.suse.com/show_bug.cgi?id=1256627
  * https://bugzilla.suse.com/show_bug.cgi?id=1256628
  * https://bugzilla.suse.com/show_bug.cgi?id=1256630
  * https://bugzilla.suse.com/show_bug.cgi?id=1256638
  * https://bugzilla.suse.com/show_bug.cgi?id=1256641
  * https://bugzilla.suse.com/show_bug.cgi?id=1256645
  * https://bugzilla.suse.com/show_bug.cgi?id=1256646
  * https://bugzilla.suse.com/show_bug.cgi?id=1256650
  * https://bugzilla.suse.com/show_bug.cgi?id=1256651
  * https://bugzilla.suse.com/show_bug.cgi?id=1256653
  * https://bugzilla.suse.com/show_bug.cgi?id=1256654
  * https://bugzilla.suse.com/show_bug.cgi?id=1256655
  * https://bugzilla.suse.com/show_bug.cgi?id=1256659
  * https://bugzilla.suse.com/show_bug.cgi?id=1256660
  * https://bugzilla.suse.com/show_bug.cgi?id=1256661
  * https://bugzilla.suse.com/show_bug.cgi?id=1256664
  * https://bugzilla.suse.com/show_bug.cgi?id=1256665
  * https://bugzilla.suse.com/show_bug.cgi?id=1256674
  * https://bugzilla.suse.com/show_bug.cgi?id=1256680
  * https://bugzilla.suse.com/show_bug.cgi?id=1256682
  * https://bugzilla.suse.com/show_bug.cgi?id=1256688
  * https://bugzilla.suse.com/show_bug.cgi?id=1256689
  * https://bugzilla.suse.com/show_bug.cgi?id=1256690
  * https://bugzilla.suse.com/show_bug.cgi?id=1256726
  * https://bugzilla.suse.com/show_bug.cgi?id=1256728
  * https://bugzilla.suse.com/show_bug.cgi?id=1256730
  * https://bugzilla.suse.com/show_bug.cgi?id=1256733
  * https://bugzilla.suse.com/show_bug.cgi?id=1256737
  * https://bugzilla.suse.com/show_bug.cgi?id=1256741
  * https://bugzilla.suse.com/show_bug.cgi?id=1256742
  * https://bugzilla.suse.com/show_bug.cgi?id=1256744
  * https://bugzilla.suse.com/show_bug.cgi?id=1256748
  * https://bugzilla.suse.com/show_bug.cgi?id=1256749
  * https://bugzilla.suse.com/show_bug.cgi?id=1256752
  * https://bugzilla.suse.com/show_bug.cgi?id=1256754
  * https://bugzilla.suse.com/show_bug.cgi?id=1256756
  * https://bugzilla.suse.com/show_bug.cgi?id=1256757
  * https://bugzilla.suse.com/show_bug.cgi?id=1256759
  * https://bugzilla.suse.com/show_bug.cgi?id=1256760
  * https://bugzilla.suse.com/show_bug.cgi?id=1256761
  * https://bugzilla.suse.com/show_bug.cgi?id=1256763
  * https://bugzilla.suse.com/show_bug.cgi?id=1256770
  * https://bugzilla.suse.com/show_bug.cgi?id=1256773
  * https://bugzilla.suse.com/show_bug.cgi?id=1256774
  * https://bugzilla.suse.com/show_bug.cgi?id=1256777
  * https://bugzilla.suse.com/show_bug.cgi?id=1256779
  * https://bugzilla.suse.com/show_bug.cgi?id=1256781
  * https://bugzilla.suse.com/show_bug.cgi?id=1256785
  * https://bugzilla.suse.com/show_bug.cgi?id=1256792
  * https://bugzilla.suse.com/show_bug.cgi?id=1256794
  * https://bugzilla.suse.com/show_bug.cgi?id=1256861
  * https://bugzilla.suse.com/show_bug.cgi?id=1256863
  * https://bugzilla.suse.com/show_bug.cgi?id=1257035
  * https://bugzilla.suse.com/show_bug.cgi?id=1257053
  * https://bugzilla.suse.com/show_bug.cgi?id=1257154
  * https://bugzilla.suse.com/show_bug.cgi?id=1257155
  * https://bugzilla.suse.com/show_bug.cgi?id=1257158
  * https://bugzilla.suse.com/show_bug.cgi?id=1257163
  * https://bugzilla.suse.com/show_bug.cgi?id=1257164
  * https://bugzilla.suse.com/show_bug.cgi?id=1257167
  * https://bugzilla.suse.com/show_bug.cgi?id=1257168
  * https://bugzilla.suse.com/show_bug.cgi?id=1257180
  * https://bugzilla.suse.com/show_bug.cgi?id=1257202
  * https://bugzilla.suse.com/show_bug.cgi?id=1257204
  * https://bugzilla.suse.com/show_bug.cgi?id=1257207
  * https://bugzilla.suse.com/show_bug.cgi?id=1257208
  * https://bugzilla.suse.com/show_bug.cgi?id=1257215
  * https://bugzilla.suse.com/show_bug.cgi?id=1257217
  * https://bugzilla.suse.com/show_bug.cgi?id=1257218
  * https://bugzilla.suse.com/show_bug.cgi?id=1257220
  * https://bugzilla.suse.com/show_bug.cgi?id=1257221
  * https://bugzilla.suse.com/show_bug.cgi?id=1257227
  * https://bugzilla.suse.com/show_bug.cgi?id=1257232
  * https://bugzilla.suse.com/show_bug.cgi?id=1257234
  * https://bugzilla.suse.com/show_bug.cgi?id=1257236
  * https://bugzilla.suse.com/show_bug.cgi?id=1257245
  * https://bugzilla.suse.com/show_bug.cgi?id=1257277
  * https://bugzilla.suse.com/show_bug.cgi?id=1257282
  * https://bugzilla.suse.com/show_bug.cgi?id=1257296
  * https://bugzilla.suse.com/show_bug.cgi?id=1257473
  * https://bugzilla.suse.com/show_bug.cgi?id=1257603
  * https://jira.suse.com/browse/PED-12554
  * https://jira.suse.com/browse/PED-3527
  * https://jira.suse.com/browse/PED-5065
  * https://jira.suse.com/browse/PED-5475
  * https://jira.suse.com/browse/PED-5477
  * https://jira.suse.com/browse/PED-5511
  * https://jira.suse.com/browse/PED-6041
  * https://jira.suse.com/browse/PED-6068
  * https://jira.suse.com/browse/PED-6069
  * https://jira.suse.com/browse/PED-6070
  * https://jira.suse.com/browse/PED-6071
  * https://jira.suse.com/browse/PED-6116
  * https://jira.suse.com/browse/PED-6120
  * https://jira.suse.com/browse/PED-6996

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260211/f7d5cf67/attachment.htm>


More information about the sle-security-updates mailing list