SUSE-SU-2026:0473-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Thu Feb 12 16:32:08 UTC 2026
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:0473-1
Release Date: 2026-02-12T11:26:39Z
Rating: important
References:
* bsc#1205462
* bsc#1214285
* bsc#1220840
* bsc#1223007
* bsc#1223675
* bsc#1225527
* bsc#1225741
* bsc#1227863
* bsc#1227988
* bsc#1231908
* bsc#1235428
* bsc#1236702
* bsc#1239346
* bsc#1240299
* bsc#1243471
* bsc#1244904
* bsc#1244938
* bsc#1245110
* bsc#1248211
* bsc#1248341
* bsc#1248363
* bsc#1248643
* bsc#1249307
* bsc#1249658
* bsc#1249827
* bsc#1249842
* bsc#1249854
* bsc#1249928
* bsc#1250032
* bsc#1250082
* bsc#1250705
* bsc#1250759
* bsc#1250868
* bsc#1251770
* bsc#1252542
* bsc#1252909
* bsc#1253318
* bsc#1253453
* bsc#1253739
* bsc#1254244
* bsc#1254572
* bsc#1254657
* bsc#1254673
* bsc#1254689
* bsc#1254707
* bsc#1254835
* bsc#1254839
* bsc#1254845
* bsc#1254986
* bsc#1255094
* bsc#1255102
* bsc#1255122
* bsc#1255128
* bsc#1255131
* bsc#1255157
* bsc#1255164
* bsc#1255169
* bsc#1255171
* bsc#1255246
* bsc#1255268
* bsc#1255269
* bsc#1255279
* bsc#1255297
* bsc#1255351
* bsc#1255380
* bsc#1255428
* bsc#1255482
* bsc#1255537
* bsc#1255544
* bsc#1255547
* bsc#1255553
* bsc#1255565
* bsc#1255571
* bsc#1255594
* bsc#1255611
* bsc#1255622
* bsc#1255695
* bsc#1255762
* bsc#1255773
* bsc#1255804
* bsc#1255810
* bsc#1255812
* bsc#1255839
* bsc#1255844
* bsc#1255874
* bsc#1255880
* bsc#1255905
* bsc#1255908
* bsc#1255925
* bsc#1255939
* bsc#1255943
* bsc#1255961
* bsc#1255970
* bsc#1255983
* bsc#1256038
* bsc#1256058
* bsc#1256106
* bsc#1256122
* bsc#1256125
* bsc#1256127
* bsc#1256130
* bsc#1256131
* bsc#1256132
* bsc#1256149
* bsc#1256155
* bsc#1256165
* bsc#1256168
* bsc#1256184
* bsc#1256191
* bsc#1256216
* bsc#1256219
* bsc#1256221
* bsc#1256229
* bsc#1256258
* bsc#1256267
* bsc#1256282
* bsc#1256305
* bsc#1256320
* bsc#1256354
* bsc#1256369
* bsc#1256386
* bsc#1256395
* bsc#1256398
* bsc#1256580
* bsc#1256582
* bsc#1256585
* bsc#1256591
* bsc#1256606
* bsc#1256611
* bsc#1256623
* bsc#1256628
* bsc#1256638
* bsc#1256641
* bsc#1256650
* bsc#1256654
* bsc#1256660
* bsc#1256674
* bsc#1256688
* bsc#1256726
* bsc#1256730
* bsc#1256757
* bsc#1256773
* bsc#1256774
* bsc#1256777
* bsc#1256779
* bsc#1256792
* bsc#1257035
* bsc#1257207
* bsc#1257227
* bsc#1257229
* bsc#1257232
* bsc#1257236
* bsc#1257282
Cross-References:
* CVE-2022-48838
* CVE-2022-49943
* CVE-2022-49980
* CVE-2022-50347
* CVE-2022-50580
* CVE-2022-50676
* CVE-2022-50697
* CVE-2022-50709
* CVE-2022-50716
* CVE-2022-50717
* CVE-2022-50719
* CVE-2022-50740
* CVE-2022-50744
* CVE-2022-50749
* CVE-2022-50751
* CVE-2022-50760
* CVE-2022-50770
* CVE-2022-50777
* CVE-2022-50780
* CVE-2022-50782
* CVE-2022-50786
* CVE-2022-50816
* CVE-2022-50834
* CVE-2022-50865
* CVE-2022-50868
* CVE-2022-50880
* CVE-2022-50881
* CVE-2022-50884
* CVE-2022-50885
* CVE-2022-50887
* CVE-2023-50756
* CVE-2023-52525
* CVE-2023-52999
* CVE-2023-53148
* CVE-2023-53178
* CVE-2023-53226
* CVE-2023-53464
* CVE-2023-53685
* CVE-2023-53747
* CVE-2023-53751
* CVE-2023-53825
* CVE-2023-53853
* CVE-2023-53863
* CVE-2023-53992
* CVE-2023-54012
* CVE-2023-54047
* CVE-2023-54048
* CVE-2023-54067
* CVE-2023-54111
* CVE-2023-54112
* CVE-2023-54118
* CVE-2023-54121
* CVE-2023-54134
* CVE-2023-54198
* CVE-2023-54202
* CVE-2023-54207
* CVE-2023-54218
* CVE-2023-54230
* CVE-2023-54243
* CVE-2023-54265
* CVE-2023-54274
* CVE-2023-54282
* CVE-2023-54287
* CVE-2023-54311
* CVE-2023-54321
* CVE-2024-26832
* CVE-2024-26935
* CVE-2024-36903
* CVE-2024-41007
* CVE-2024-50040
* CVE-2024-56690
* CVE-2024-58020
* CVE-2025-21681
* CVE-2025-37913
* CVE-2025-38007
* CVE-2025-38539
* CVE-2025-38591
* CVE-2025-38602
* CVE-2025-38656
* CVE-2025-39689
* CVE-2025-39813
* CVE-2025-39829
* CVE-2025-39913
* CVE-2025-40087
* CVE-2025-40088
* CVE-2025-40115
* CVE-2025-40198
* CVE-2025-40259
* CVE-2025-40261
* CVE-2025-40264
* CVE-2025-40271
* CVE-2025-40323
* CVE-2025-40339
* CVE-2025-40345
* CVE-2025-40363
* CVE-2025-68188
* CVE-2025-68190
* CVE-2025-68192
* CVE-2025-68241
* CVE-2025-68245
* CVE-2025-68261
* CVE-2025-68264
* CVE-2025-68286
* CVE-2025-68296
* CVE-2025-68303
* CVE-2025-68305
* CVE-2025-68312
* CVE-2025-68337
* CVE-2025-68349
* CVE-2025-68354
* CVE-2025-68362
* CVE-2025-68366
* CVE-2025-68367
* CVE-2025-68372
* CVE-2025-68379
* CVE-2025-68740
* CVE-2025-68757
* CVE-2025-68767
* CVE-2025-68771
* CVE-2025-68774
* CVE-2025-68783
* CVE-2025-68788
* CVE-2025-68795
* CVE-2025-68797
* CVE-2025-68813
* CVE-2025-68816
* CVE-2025-71064
* CVE-2025-71082
* CVE-2025-71085
* CVE-2025-71087
* CVE-2025-71091
* CVE-2025-71093
* CVE-2025-71096
* CVE-2025-71098
* CVE-2025-71108
* CVE-2025-71112
* CVE-2025-71119
* CVE-2025-71120
* CVE-2025-71123
* CVE-2026-22976
* CVE-2026-22978
* CVE-2026-22988
* CVE-2026-22999
* CVE-2026-23001
* CVE-2026-23011
CVSS scores:
* CVE-2022-48838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49943 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49943 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49980 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50347 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50347 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50580 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50580 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50697 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50697 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50709 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50709 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-50716 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50716 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50717 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50719 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50740 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50740 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-50751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50760 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50770 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50770 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50777 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50780 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50780 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2022-50782 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50816 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52525 ( SUSE ): 3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2023-52525 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53148 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53148 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53178 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53464 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53464 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53685 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53685 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53685 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53747 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54118 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54207 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54207 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54218 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54218 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-54230 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54243 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54265 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54265 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54274 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54274 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54282 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54282 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54287 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54311 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54321 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-26935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36903 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41007 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-41007 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56690 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56690 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21681 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2025-21681 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-21681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37913 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-37913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38539 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38591 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38602 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38656 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40088 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40088 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-40115 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40271 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40323 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40323 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40339 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40345 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40345 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40363 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40363 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-68188 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68188 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-68190 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68264 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68264 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68366 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68372 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68379 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68379 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68740 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68757 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68767 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68771 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68774 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68774 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68783 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68788 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68788 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-68795 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68795 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-68797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71082 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71087 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71087 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-71091 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71091 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71093 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-71093 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-71096 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71096 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2025-71098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71108 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71112 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71119 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-71119 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-71120 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71123 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71123 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2026-22976 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22988 ( SUSE ): 6.0
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22988 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-22999 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 145 vulnerabilities and has eight security fixes can now
be installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2022-50347: mmc: rtsx_usb_sdmmc: fix return value check of
mmc_add_host() (bsc#1249928).
* CVE-2022-50580: blk-throttle: prevent overflow while calculating wait time
(bsc#1252542).
* CVE-2022-50676: net: rds: don't hold sock lock when cancelling work from
rds_tcp_reset_callbacks() (bsc#1254689).
* CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
uninit (bsc#1255594).
* CVE-2022-50709: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
(bsc#1255565).
* CVE-2022-50716: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
(bsc#1255839).
* CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).
* CVE-2022-50719: ALSA: line6: fix stack overflow in line6_midi_transmit
(bsc#1255939).
* CVE-2022-50740: wifi: ath9k: hif_usb: fix memory leak of urbs in
ath9k_hif_usb_dealloc_tx_urbs() (bsc#1256155).
* CVE-2022-50744: scsi: lpfc: Fix hard lockup when reading the rx_monitor from
debugfs (bsc#1256165).
* CVE-2022-50749: acct: fix potential integer overflow in encode_comp_t()
(bsc#1256191).
* CVE-2022-50751: configfs: fix possible memory leak in configfs_create_dir()
(bsc#1256184).
* CVE-2022-50760: drm/amdgpu: Fix PCI device refcount leak in
amdgpu_atrm_get_bios() (bsc#1255983).
* CVE-2022-50770: ocfs2: fix memory leak in ocfs2_mount_volume()
(bsc#1256221).
* CVE-2022-50777: net: phy: xgmiitorgmii: Fix refcount leak in
xgmiitorgmii_probe (bsc#1256320).
* CVE-2022-50780: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init()
failed (bsc#1256305).
* CVE-2022-50782: ext4: fix bug_on in __es_tree_search caused by bad quota
inode (bsc#1256282).
* CVE-2022-50786: media: s5p-mfc: Clear workbit to handle error condition
(bsc#1256258).
* CVE-2022-50816: ipv6: ensure sane device mtu in tunnels (bsc#1256038).
* CVE-2022-50834: nfc: Fix potential resource leaks (bsc#1256219).
* CVE-2022-50865: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
(bsc#1256168).
* CVE-2022-50868: hwrng: amd - Fix PCI device refcount leak (bsc#1256386).
* CVE-2022-50880: wifi: ath10k: add peer map clean up for peer delete in
ath10k_sta_state() (bsc#1256132).
* CVE-2022-50881: ath9k: Fix typo in function name (bsc#1256130).
* CVE-2022-50884: drm: Prevent drm_copy_field() to attempt copying a NULL
pointer (bsc#1256127).
* CVE-2022-50885: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when
socket create failed (bsc#1256122).
* CVE-2022-50887: regulator: core: fix unbalanced of node refcount in
regulator_dev_lookup() (bsc#1256125).
* CVE-2023-50756: nvme-pci: fix mempool alloc size (bsc#1256216).
* CVE-2023-53685: tun: Fix memory leak for detached NAPI queue (bsc#1251770).
* CVE-2023-53747: vc_screen: reload load of struct vc_data pointer in
vcs_write() to avoid UAF (bsc#1254572).
* CVE-2023-53751: cifs: fix potential use-after-free bugs in
TCP_Server_Info::hostname (bsc#1254986).
* CVE-2023-53825: kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg()
(bsc#1254707).
* CVE-2023-53853: netlink: annotate accesses to nlk->cb_running (bsc#1254673).
* CVE-2023-53863: netlink: do not hard code device address lenth in fdb dumps
(bsc#1254657).
* CVE-2023-53992: wifi: cfg80211: ocb: don't leave if not joined
(bsc#1256058).
* CVE-2023-54012: net: fix stack overflow when LRO is disabled for virtual
interfaces (bsc#1255571).
* CVE-2023-54047: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind
(bsc#1256398).
* CVE-2023-54048: RDMA/bnxt_re: Prevent handling any completions after qp
destroy (bsc#1256395).
* CVE-2023-54067: btrfs: fix race when deleting free space root from the dirty
cow roots list (bsc#1256369).
* CVE-2023-54111: pinctrl: rockchip: Fix refcount leak in
rockchip_pinctrl_parse_groups (bsc#1256149).
* CVE-2023-54112: kcm: Fix memory leak in error path of kcm_sendmsg()
(bsc#1256354).
* CVE-2023-54118: serial: sc16is7xx: setup GPIO controller later in probe
(bsc#1256131).
* CVE-2023-54121: btrfs: fix incorrect splitting in
btrfs_drop_extent_map_range (bsc#1256267).
* CVE-2023-54134: autofs: fix memory leak of waitqueues in
autofs_catatonic_mode (bsc#1256106).
* CVE-2023-54198: tty: fix out-of-bounds access in tty_driver_lookup_tty()
(bsc#1255970).
* CVE-2023-54202: drm/i915: fix race condition UAF in
i915_perf_add_config_ioctl (bsc#1255880).
* CVE-2023-54207: HID: uclogic: Correct devm device reference for hidinput
input_dev name (bsc#1255961).
* CVE-2023-54218: sock: Make sock->sk_stamp thread-safe (bsc#1256229).
* CVE-2023-54230: amba: bus: fix refcount leak (bsc#1255925).
* CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free
(bsc#1255908).
* CVE-2023-54265: ipv6: Fix an uninit variable access bug in __ip6_make_skb()
(bsc#1255874).
* CVE-2023-54274: RDMA/srpt: Add a check for valid 'mad_agent' pointer
(bsc#1255905).
* CVE-2023-54282: media: tuners: qt1010: replace BUG_ON with a regular error
(bsc#1255810).
* CVE-2023-54287: tty: serial: imx: disable Ageing Timer interrupt request irq
(bsc#1255804).
* CVE-2023-54311: ext4: fix deadlock when converting an inline directory in
nojournal mode (bsc#1255773).
* CVE-2023-54321: driver core: fix potential null-ptr-deref in device_add()
(bsc#1255762).
* CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out()
(bsc#1227863).
* CVE-2025-40115: scsi: mpt3sas: Fix crash in transport port remove by using
ioc_info() (bsc#1253318).
* CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
* CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in
nvme_fc_delete_ctrl() (bsc#1254839).
* CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
* CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
* CVE-2025-40323: fbcon: Set fb_display[i]->mode to NULL when the mode is
released (bsc#1255094).
* CVE-2025-40339: drm/amdgpu: fix nullptr err of vm_handle_moved
(bsc#1255428).
* CVE-2025-40345: usb: storage: sddr55: Reject out-of-bound new_pba
(bsc#1255279).
* CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output
(bsc#1255102).
* CVE-2025-68188: tcp: use dst_dev_rcu() in
tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
* CVE-2025-68190: drm/amdgpu/atom: Check kcalloc() for WS buffer in
amdgpu_atom_execute_table_locked() (bsc#1255131).
* CVE-2025-68192: net: usb: qmi_wwan: initialize MAC header offset in
qmimux_rx_fixup (bsc#1255246).
* CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding
stale fnhe (bsc#1255157).
* CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing
incorrect cleanup (bsc#1255268).
* CVE-2025-68261: ext4: add i_data_sem protection in
ext4_destroy_inline_data_nolock() (bsc#1255164).
* CVE-2025-68264: ext4: refresh inline data size before write operations
(bsc#1255380).
* CVE-2025-68286: drm/amd/display: Check NULL before accessing (bsc#1255351).
* CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon
setup (bsc#1255128).
* CVE-2025-68303: platform/x86: intel: punit_ipc: fix memory corruption
(bsc#1255122).
* CVE-2025-68305: Bluetooth: hci_sock: Prevent race in socket write iter and
sock bind (bsc#1255169).
* CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
* CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when
file system corrupted (bsc#1255482).
* CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in
pnfs_mark_layout_stateid_invalid (bsc#1255544).
* CVE-2025-68354: regulator: core: Protect regulator_supply_alias_list with
regulator_list_mutex (bsc#1255553).
* CVE-2025-68362: wifi: rtl818x: rtl8187: Fix potential buffer underflow in
rtl8187_rx_cb() (bsc#1255611).
* CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
* CVE-2025-68367: macintosh/mac_hid: fix race condition in
mac_hid_toggle_emumouse (bsc#1255547).
* CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
* CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize
failure (bsc#1255695).
* CVE-2025-68740: ima: Handle error code returned by ima_filter_rule_match()
(bsc#1255812).
* CVE-2025-68757: drm/vgem-fence: Fix potential deadlock on release
(bsc#1255943).
* CVE-2025-68767: hfsplus: Verify inode mode when loading from disk
(bsc#1256580).
* CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
(bsc#1256582).
* CVE-2025-68774: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create
(bsc#1256585).
* CVE-2025-68783: ALSA: usb-mixer: us16x08: validate meter packet indices
(bsc#1256650).
* CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for
special files (bsc#1256638).
* CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query
(bsc#1256688).
* CVE-2025-68797: char: applicom: fix NULL pointer dereference in ac_ioctl
(bsc#1256660).
* CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
(bsc#1256641).
* CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters
(bsc#1256674).
* CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for
resources (bsc#1256654).
* CVE-2025-71082: Bluetooth: btusb: revert use of devm_kzalloc in btusb
(bsc#1256611).
* CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
calipso_skbuff_setattr() (bsc#1256623).
* CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg()
(bsc#1256628).
* CVE-2025-71091: team: fix check for port enabled in
team_queue_override_port_prio_changed() (bsc#1256773).
* CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
* CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID
correctly (bsc#1256606).
* CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
* CVE-2025-71108: usb: typec: ucsi: Handle incorrect num_connectors capability
(bsc#1256774).
* CVE-2025-71112: net: hns3: add VLAN id validation before using
(bsc#1256726).
* CVE-2025-71119: powerpc/kexec: Enable SMT before waking offline CPUs
(bsc#1205462).
* CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
gss_token in gss_read_proxy_verf (bsc#1256779).
* CVE-2026-22976: net_sched: qfq: Fix double list add in class with netem as
child qdisc (bsc#1257035).
* CVE-2026-22978: wifi: avoid kernel-infoleak from struct iw_point
(bsc#1257227).
* CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
qfq_change_class() (bsc#1257236).
* CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code
(bsc#1257232).
* CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).
The following non security issues were fixed:
* RDMA/rxe: Fix the error caused by qp->sk (bsc#1256122).
* RDMA/srpt: Fix disabling device management (bsc#1255905).
* RDMA/srpt: Fix handling of SR-IOV and iWARP ports (bsc#1255905).
* configfs: factor dirent removal into helpers (bsc#1256184).
* drm/amdgpu: Remove explicit wait after VM validate (bsc#1255428).
* drm/amdgpu: update mappings not managed by KFD (bsc#1255428).
* hwrng: amd - Convert PCIBIOS_* return codes to errnos (bsc#1256386).
* nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu
(bsc#1255844).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-473=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-473=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-473=1
## Package List:
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.293.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-kgraft-devel-4.12.14-122.293.1
* kernel-default-debugsource-4.12.14-122.293.1
* kernel-default-debuginfo-4.12.14-122.293.1
* kernel-default-kgraft-4.12.14-122.293.1
* kgraft-patch-4_12_14-122_293-default-1-8.3.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-4.12.14-122.293.1
* kernel-default-base-debuginfo-4.12.14-122.293.1
* gfs2-kmp-default-4.12.14-122.293.1
* dlm-kmp-default-debuginfo-4.12.14-122.293.1
* dlm-kmp-default-4.12.14-122.293.1
* cluster-md-kmp-default-4.12.14-122.293.1
* kernel-default-debugsource-4.12.14-122.293.1
* kernel-default-base-4.12.14-122.293.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.293.1
* kernel-default-debuginfo-4.12.14-122.293.1
* ocfs2-kmp-default-4.12.14-122.293.1
* kernel-default-devel-4.12.14-122.293.1
* kernel-syms-4.12.14-122.293.1
* gfs2-kmp-default-debuginfo-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-source-4.12.14-122.293.1
* kernel-devel-4.12.14-122.293.1
* kernel-macros-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* cluster-md-kmp-default-debuginfo-4.12.14-122.293.1
* kernel-default-base-debuginfo-4.12.14-122.293.1
* dlm-kmp-default-4.12.14-122.293.1
* kernel-default-devel-debuginfo-4.12.14-122.293.1
* dlm-kmp-default-debuginfo-4.12.14-122.293.1
* cluster-md-kmp-default-4.12.14-122.293.1
* kernel-default-debugsource-4.12.14-122.293.1
* gfs2-kmp-default-4.12.14-122.293.1
* kernel-default-base-4.12.14-122.293.1
* kernel-default-debuginfo-4.12.14-122.293.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.293.1
* ocfs2-kmp-default-4.12.14-122.293.1
* kernel-default-devel-4.12.14-122.293.1
* kernel-syms-4.12.14-122.293.1
* gfs2-kmp-default-debuginfo-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-source-4.12.14-122.293.1
* kernel-devel-4.12.14-122.293.1
* kernel-macros-4.12.14-122.293.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.293.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48838.html
* https://www.suse.com/security/cve/CVE-2022-49943.html
* https://www.suse.com/security/cve/CVE-2022-49980.html
* https://www.suse.com/security/cve/CVE-2022-50347.html
* https://www.suse.com/security/cve/CVE-2022-50580.html
* https://www.suse.com/security/cve/CVE-2022-50676.html
* https://www.suse.com/security/cve/CVE-2022-50697.html
* https://www.suse.com/security/cve/CVE-2022-50709.html
* https://www.suse.com/security/cve/CVE-2022-50716.html
* https://www.suse.com/security/cve/CVE-2022-50717.html
* https://www.suse.com/security/cve/CVE-2022-50719.html
* https://www.suse.com/security/cve/CVE-2022-50740.html
* https://www.suse.com/security/cve/CVE-2022-50744.html
* https://www.suse.com/security/cve/CVE-2022-50749.html
* https://www.suse.com/security/cve/CVE-2022-50751.html
* https://www.suse.com/security/cve/CVE-2022-50760.html
* https://www.suse.com/security/cve/CVE-2022-50770.html
* https://www.suse.com/security/cve/CVE-2022-50777.html
* https://www.suse.com/security/cve/CVE-2022-50780.html
* https://www.suse.com/security/cve/CVE-2022-50782.html
* https://www.suse.com/security/cve/CVE-2022-50786.html
* https://www.suse.com/security/cve/CVE-2022-50816.html
* https://www.suse.com/security/cve/CVE-2022-50834.html
* https://www.suse.com/security/cve/CVE-2022-50865.html
* https://www.suse.com/security/cve/CVE-2022-50868.html
* https://www.suse.com/security/cve/CVE-2022-50880.html
* https://www.suse.com/security/cve/CVE-2022-50881.html
* https://www.suse.com/security/cve/CVE-2022-50884.html
* https://www.suse.com/security/cve/CVE-2022-50885.html
* https://www.suse.com/security/cve/CVE-2022-50887.html
* https://www.suse.com/security/cve/CVE-2023-50756.html
* https://www.suse.com/security/cve/CVE-2023-52525.html
* https://www.suse.com/security/cve/CVE-2023-52999.html
* https://www.suse.com/security/cve/CVE-2023-53148.html
* https://www.suse.com/security/cve/CVE-2023-53178.html
* https://www.suse.com/security/cve/CVE-2023-53226.html
* https://www.suse.com/security/cve/CVE-2023-53464.html
* https://www.suse.com/security/cve/CVE-2023-53685.html
* https://www.suse.com/security/cve/CVE-2023-53747.html
* https://www.suse.com/security/cve/CVE-2023-53751.html
* https://www.suse.com/security/cve/CVE-2023-53825.html
* https://www.suse.com/security/cve/CVE-2023-53853.html
* https://www.suse.com/security/cve/CVE-2023-53863.html
* https://www.suse.com/security/cve/CVE-2023-53992.html
* https://www.suse.com/security/cve/CVE-2023-54012.html
* https://www.suse.com/security/cve/CVE-2023-54047.html
* https://www.suse.com/security/cve/CVE-2023-54048.html
* https://www.suse.com/security/cve/CVE-2023-54067.html
* https://www.suse.com/security/cve/CVE-2023-54111.html
* https://www.suse.com/security/cve/CVE-2023-54112.html
* https://www.suse.com/security/cve/CVE-2023-54118.html
* https://www.suse.com/security/cve/CVE-2023-54121.html
* https://www.suse.com/security/cve/CVE-2023-54134.html
* https://www.suse.com/security/cve/CVE-2023-54198.html
* https://www.suse.com/security/cve/CVE-2023-54202.html
* https://www.suse.com/security/cve/CVE-2023-54207.html
* https://www.suse.com/security/cve/CVE-2023-54218.html
* https://www.suse.com/security/cve/CVE-2023-54230.html
* https://www.suse.com/security/cve/CVE-2023-54243.html
* https://www.suse.com/security/cve/CVE-2023-54265.html
* https://www.suse.com/security/cve/CVE-2023-54274.html
* https://www.suse.com/security/cve/CVE-2023-54282.html
* https://www.suse.com/security/cve/CVE-2023-54287.html
* https://www.suse.com/security/cve/CVE-2023-54311.html
* https://www.suse.com/security/cve/CVE-2023-54321.html
* https://www.suse.com/security/cve/CVE-2024-26832.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-36903.html
* https://www.suse.com/security/cve/CVE-2024-41007.html
* https://www.suse.com/security/cve/CVE-2024-50040.html
* https://www.suse.com/security/cve/CVE-2024-56690.html
* https://www.suse.com/security/cve/CVE-2024-58020.html
* https://www.suse.com/security/cve/CVE-2025-21681.html
* https://www.suse.com/security/cve/CVE-2025-37913.html
* https://www.suse.com/security/cve/CVE-2025-38007.html
* https://www.suse.com/security/cve/CVE-2025-38539.html
* https://www.suse.com/security/cve/CVE-2025-38591.html
* https://www.suse.com/security/cve/CVE-2025-38602.html
* https://www.suse.com/security/cve/CVE-2025-38656.html
* https://www.suse.com/security/cve/CVE-2025-39689.html
* https://www.suse.com/security/cve/CVE-2025-39813.html
* https://www.suse.com/security/cve/CVE-2025-39829.html
* https://www.suse.com/security/cve/CVE-2025-39913.html
* https://www.suse.com/security/cve/CVE-2025-40087.html
* https://www.suse.com/security/cve/CVE-2025-40088.html
* https://www.suse.com/security/cve/CVE-2025-40115.html
* https://www.suse.com/security/cve/CVE-2025-40198.html
* https://www.suse.com/security/cve/CVE-2025-40259.html
* https://www.suse.com/security/cve/CVE-2025-40261.html
* https://www.suse.com/security/cve/CVE-2025-40264.html
* https://www.suse.com/security/cve/CVE-2025-40271.html
* https://www.suse.com/security/cve/CVE-2025-40323.html
* https://www.suse.com/security/cve/CVE-2025-40339.html
* https://www.suse.com/security/cve/CVE-2025-40345.html
* https://www.suse.com/security/cve/CVE-2025-40363.html
* https://www.suse.com/security/cve/CVE-2025-68188.html
* https://www.suse.com/security/cve/CVE-2025-68190.html
* https://www.suse.com/security/cve/CVE-2025-68192.html
* https://www.suse.com/security/cve/CVE-2025-68241.html
* https://www.suse.com/security/cve/CVE-2025-68245.html
* https://www.suse.com/security/cve/CVE-2025-68261.html
* https://www.suse.com/security/cve/CVE-2025-68264.html
* https://www.suse.com/security/cve/CVE-2025-68286.html
* https://www.suse.com/security/cve/CVE-2025-68296.html
* https://www.suse.com/security/cve/CVE-2025-68303.html
* https://www.suse.com/security/cve/CVE-2025-68305.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-68337.html
* https://www.suse.com/security/cve/CVE-2025-68349.html
* https://www.suse.com/security/cve/CVE-2025-68354.html
* https://www.suse.com/security/cve/CVE-2025-68362.html
* https://www.suse.com/security/cve/CVE-2025-68366.html
* https://www.suse.com/security/cve/CVE-2025-68367.html
* https://www.suse.com/security/cve/CVE-2025-68372.html
* https://www.suse.com/security/cve/CVE-2025-68379.html
* https://www.suse.com/security/cve/CVE-2025-68740.html
* https://www.suse.com/security/cve/CVE-2025-68757.html
* https://www.suse.com/security/cve/CVE-2025-68767.html
* https://www.suse.com/security/cve/CVE-2025-68771.html
* https://www.suse.com/security/cve/CVE-2025-68774.html
* https://www.suse.com/security/cve/CVE-2025-68783.html
* https://www.suse.com/security/cve/CVE-2025-68788.html
* https://www.suse.com/security/cve/CVE-2025-68795.html
* https://www.suse.com/security/cve/CVE-2025-68797.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-68816.html
* https://www.suse.com/security/cve/CVE-2025-71064.html
* https://www.suse.com/security/cve/CVE-2025-71082.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71087.html
* https://www.suse.com/security/cve/CVE-2025-71091.html
* https://www.suse.com/security/cve/CVE-2025-71093.html
* https://www.suse.com/security/cve/CVE-2025-71096.html
* https://www.suse.com/security/cve/CVE-2025-71098.html
* https://www.suse.com/security/cve/CVE-2025-71108.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2025-71119.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2025-71123.html
* https://www.suse.com/security/cve/CVE-2026-22976.html
* https://www.suse.com/security/cve/CVE-2026-22978.html
* https://www.suse.com/security/cve/CVE-2026-22988.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://www.suse.com/security/cve/CVE-2026-23011.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1220840
* https://bugzilla.suse.com/show_bug.cgi?id=1223007
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1225527
* https://bugzilla.suse.com/show_bug.cgi?id=1225741
* https://bugzilla.suse.com/show_bug.cgi?id=1227863
* https://bugzilla.suse.com/show_bug.cgi?id=1227988
* https://bugzilla.suse.com/show_bug.cgi?id=1231908
* https://bugzilla.suse.com/show_bug.cgi?id=1235428
* https://bugzilla.suse.com/show_bug.cgi?id=1236702
* https://bugzilla.suse.com/show_bug.cgi?id=1239346
* https://bugzilla.suse.com/show_bug.cgi?id=1240299
* https://bugzilla.suse.com/show_bug.cgi?id=1243471
* https://bugzilla.suse.com/show_bug.cgi?id=1244904
* https://bugzilla.suse.com/show_bug.cgi?id=1244938
* https://bugzilla.suse.com/show_bug.cgi?id=1245110
* https://bugzilla.suse.com/show_bug.cgi?id=1248211
* https://bugzilla.suse.com/show_bug.cgi?id=1248341
* https://bugzilla.suse.com/show_bug.cgi?id=1248363
* https://bugzilla.suse.com/show_bug.cgi?id=1248643
* https://bugzilla.suse.com/show_bug.cgi?id=1249307
* https://bugzilla.suse.com/show_bug.cgi?id=1249658
* https://bugzilla.suse.com/show_bug.cgi?id=1249827
* https://bugzilla.suse.com/show_bug.cgi?id=1249842
* https://bugzilla.suse.com/show_bug.cgi?id=1249854
* https://bugzilla.suse.com/show_bug.cgi?id=1249928
* https://bugzilla.suse.com/show_bug.cgi?id=1250032
* https://bugzilla.suse.com/show_bug.cgi?id=1250082
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1250759
* https://bugzilla.suse.com/show_bug.cgi?id=1250868
* https://bugzilla.suse.com/show_bug.cgi?id=1251770
* https://bugzilla.suse.com/show_bug.cgi?id=1252542
* https://bugzilla.suse.com/show_bug.cgi?id=1252909
* https://bugzilla.suse.com/show_bug.cgi?id=1253318
* https://bugzilla.suse.com/show_bug.cgi?id=1253453
* https://bugzilla.suse.com/show_bug.cgi?id=1253739
* https://bugzilla.suse.com/show_bug.cgi?id=1254244
* https://bugzilla.suse.com/show_bug.cgi?id=1254572
* https://bugzilla.suse.com/show_bug.cgi?id=1254657
* https://bugzilla.suse.com/show_bug.cgi?id=1254673
* https://bugzilla.suse.com/show_bug.cgi?id=1254689
* https://bugzilla.suse.com/show_bug.cgi?id=1254707
* https://bugzilla.suse.com/show_bug.cgi?id=1254835
* https://bugzilla.suse.com/show_bug.cgi?id=1254839
* https://bugzilla.suse.com/show_bug.cgi?id=1254845
* https://bugzilla.suse.com/show_bug.cgi?id=1254986
* https://bugzilla.suse.com/show_bug.cgi?id=1255094
* https://bugzilla.suse.com/show_bug.cgi?id=1255102
* https://bugzilla.suse.com/show_bug.cgi?id=1255122
* https://bugzilla.suse.com/show_bug.cgi?id=1255128
* https://bugzilla.suse.com/show_bug.cgi?id=1255131
* https://bugzilla.suse.com/show_bug.cgi?id=1255157
* https://bugzilla.suse.com/show_bug.cgi?id=1255164
* https://bugzilla.suse.com/show_bug.cgi?id=1255169
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255246
* https://bugzilla.suse.com/show_bug.cgi?id=1255268
* https://bugzilla.suse.com/show_bug.cgi?id=1255269
* https://bugzilla.suse.com/show_bug.cgi?id=1255279
* https://bugzilla.suse.com/show_bug.cgi?id=1255297
* https://bugzilla.suse.com/show_bug.cgi?id=1255351
* https://bugzilla.suse.com/show_bug.cgi?id=1255380
* https://bugzilla.suse.com/show_bug.cgi?id=1255428
* https://bugzilla.suse.com/show_bug.cgi?id=1255482
* https://bugzilla.suse.com/show_bug.cgi?id=1255537
* https://bugzilla.suse.com/show_bug.cgi?id=1255544
* https://bugzilla.suse.com/show_bug.cgi?id=1255547
* https://bugzilla.suse.com/show_bug.cgi?id=1255553
* https://bugzilla.suse.com/show_bug.cgi?id=1255565
* https://bugzilla.suse.com/show_bug.cgi?id=1255571
* https://bugzilla.suse.com/show_bug.cgi?id=1255594
* https://bugzilla.suse.com/show_bug.cgi?id=1255611
* https://bugzilla.suse.com/show_bug.cgi?id=1255622
* https://bugzilla.suse.com/show_bug.cgi?id=1255695
* https://bugzilla.suse.com/show_bug.cgi?id=1255762
* https://bugzilla.suse.com/show_bug.cgi?id=1255773
* https://bugzilla.suse.com/show_bug.cgi?id=1255804
* https://bugzilla.suse.com/show_bug.cgi?id=1255810
* https://bugzilla.suse.com/show_bug.cgi?id=1255812
* https://bugzilla.suse.com/show_bug.cgi?id=1255839
* https://bugzilla.suse.com/show_bug.cgi?id=1255844
* https://bugzilla.suse.com/show_bug.cgi?id=1255874
* https://bugzilla.suse.com/show_bug.cgi?id=1255880
* https://bugzilla.suse.com/show_bug.cgi?id=1255905
* https://bugzilla.suse.com/show_bug.cgi?id=1255908
* https://bugzilla.suse.com/show_bug.cgi?id=1255925
* https://bugzilla.suse.com/show_bug.cgi?id=1255939
* https://bugzilla.suse.com/show_bug.cgi?id=1255943
* https://bugzilla.suse.com/show_bug.cgi?id=1255961
* https://bugzilla.suse.com/show_bug.cgi?id=1255970
* https://bugzilla.suse.com/show_bug.cgi?id=1255983
* https://bugzilla.suse.com/show_bug.cgi?id=1256038
* https://bugzilla.suse.com/show_bug.cgi?id=1256058
* https://bugzilla.suse.com/show_bug.cgi?id=1256106
* https://bugzilla.suse.com/show_bug.cgi?id=1256122
* https://bugzilla.suse.com/show_bug.cgi?id=1256125
* https://bugzilla.suse.com/show_bug.cgi?id=1256127
* https://bugzilla.suse.com/show_bug.cgi?id=1256130
* https://bugzilla.suse.com/show_bug.cgi?id=1256131
* https://bugzilla.suse.com/show_bug.cgi?id=1256132
* https://bugzilla.suse.com/show_bug.cgi?id=1256149
* https://bugzilla.suse.com/show_bug.cgi?id=1256155
* https://bugzilla.suse.com/show_bug.cgi?id=1256165
* https://bugzilla.suse.com/show_bug.cgi?id=1256168
* https://bugzilla.suse.com/show_bug.cgi?id=1256184
* https://bugzilla.suse.com/show_bug.cgi?id=1256191
* https://bugzilla.suse.com/show_bug.cgi?id=1256216
* https://bugzilla.suse.com/show_bug.cgi?id=1256219
* https://bugzilla.suse.com/show_bug.cgi?id=1256221
* https://bugzilla.suse.com/show_bug.cgi?id=1256229
* https://bugzilla.suse.com/show_bug.cgi?id=1256258
* https://bugzilla.suse.com/show_bug.cgi?id=1256267
* https://bugzilla.suse.com/show_bug.cgi?id=1256282
* https://bugzilla.suse.com/show_bug.cgi?id=1256305
* https://bugzilla.suse.com/show_bug.cgi?id=1256320
* https://bugzilla.suse.com/show_bug.cgi?id=1256354
* https://bugzilla.suse.com/show_bug.cgi?id=1256369
* https://bugzilla.suse.com/show_bug.cgi?id=1256386
* https://bugzilla.suse.com/show_bug.cgi?id=1256395
* https://bugzilla.suse.com/show_bug.cgi?id=1256398
* https://bugzilla.suse.com/show_bug.cgi?id=1256580
* https://bugzilla.suse.com/show_bug.cgi?id=1256582
* https://bugzilla.suse.com/show_bug.cgi?id=1256585
* https://bugzilla.suse.com/show_bug.cgi?id=1256591
* https://bugzilla.suse.com/show_bug.cgi?id=1256606
* https://bugzilla.suse.com/show_bug.cgi?id=1256611
* https://bugzilla.suse.com/show_bug.cgi?id=1256623
* https://bugzilla.suse.com/show_bug.cgi?id=1256628
* https://bugzilla.suse.com/show_bug.cgi?id=1256638
* https://bugzilla.suse.com/show_bug.cgi?id=1256641
* https://bugzilla.suse.com/show_bug.cgi?id=1256650
* https://bugzilla.suse.com/show_bug.cgi?id=1256654
* https://bugzilla.suse.com/show_bug.cgi?id=1256660
* https://bugzilla.suse.com/show_bug.cgi?id=1256674
* https://bugzilla.suse.com/show_bug.cgi?id=1256688
* https://bugzilla.suse.com/show_bug.cgi?id=1256726
* https://bugzilla.suse.com/show_bug.cgi?id=1256730
* https://bugzilla.suse.com/show_bug.cgi?id=1256757
* https://bugzilla.suse.com/show_bug.cgi?id=1256773
* https://bugzilla.suse.com/show_bug.cgi?id=1256774
* https://bugzilla.suse.com/show_bug.cgi?id=1256777
* https://bugzilla.suse.com/show_bug.cgi?id=1256779
* https://bugzilla.suse.com/show_bug.cgi?id=1256792
* https://bugzilla.suse.com/show_bug.cgi?id=1257035
* https://bugzilla.suse.com/show_bug.cgi?id=1257207
* https://bugzilla.suse.com/show_bug.cgi?id=1257227
* https://bugzilla.suse.com/show_bug.cgi?id=1257229
* https://bugzilla.suse.com/show_bug.cgi?id=1257232
* https://bugzilla.suse.com/show_bug.cgi?id=1257236
* https://bugzilla.suse.com/show_bug.cgi?id=1257282
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260212/860ee334/attachment.htm>
More information about the sle-security-updates
mailing list