SUSE-SU-2026:0278-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Fri Jan 23 20:35:18 UTC 2026
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:0278-1
Release Date: 2026-01-23T15:08:33Z
Rating: important
References:
* bsc#1012628
* bsc#1065729
* bsc#1194869
* bsc#1205462
* bsc#1214285
* bsc#1214635
* bsc#1214847
* bsc#1215146
* bsc#1215211
* bsc#1215344
* bsc#1216062
* bsc#1216436
* bsc#1219165
* bsc#1220419
* bsc#1223731
* bsc#1232223
* bsc#1234163
* bsc#1243112
* bsc#1245193
* bsc#1245449
* bsc#1246328
* bsc#1247500
* bsc#1248886
* bsc#1249256
* bsc#1251752
* bsc#1252046
* bsc#1252342
* bsc#1252686
* bsc#1252776
* bsc#1252808
* bsc#1252824
* bsc#1252861
* bsc#1252919
* bsc#1252973
* bsc#1253155
* bsc#1253262
* bsc#1253342
* bsc#1253365
* bsc#1253386
* bsc#1253400
* bsc#1253402
* bsc#1253408
* bsc#1253413
* bsc#1253442
* bsc#1253458
* bsc#1253463
* bsc#1253623
* bsc#1253647
* bsc#1253674
* bsc#1253739
* bsc#1254119
* bsc#1254126
* bsc#1254235
* bsc#1254244
* bsc#1254363
* bsc#1254373
* bsc#1254378
* bsc#1254477
* bsc#1254518
* bsc#1254520
* bsc#1254599
* bsc#1254606
* bsc#1254611
* bsc#1254613
* bsc#1254615
* bsc#1254616
* bsc#1254621
* bsc#1254623
* bsc#1254626
* bsc#1254648
* bsc#1254649
* bsc#1254653
* bsc#1254655
* bsc#1254657
* bsc#1254660
* bsc#1254661
* bsc#1254663
* bsc#1254669
* bsc#1254677
* bsc#1254678
* bsc#1254688
* bsc#1254690
* bsc#1254691
* bsc#1254693
* bsc#1254695
* bsc#1254698
* bsc#1254701
* bsc#1254704
* bsc#1254705
* bsc#1254707
* bsc#1254712
* bsc#1254715
* bsc#1254717
* bsc#1254723
* bsc#1254724
* bsc#1254732
* bsc#1254733
* bsc#1254737
* bsc#1254739
* bsc#1254742
* bsc#1254743
* bsc#1254749
* bsc#1254750
* bsc#1254753
* bsc#1254754
* bsc#1254758
* bsc#1254761
* bsc#1254762
* bsc#1254765
* bsc#1254782
* bsc#1254791
* bsc#1254793
* bsc#1254794
* bsc#1254795
* bsc#1254796
* bsc#1254797
* bsc#1254798
* bsc#1254813
* bsc#1254815
* bsc#1254824
* bsc#1254825
* bsc#1254827
* bsc#1254828
* bsc#1254829
* bsc#1254830
* bsc#1254832
* bsc#1254840
* bsc#1254843
* bsc#1254846
* bsc#1254847
* bsc#1254849
* bsc#1254850
* bsc#1254851
* bsc#1254854
* bsc#1254856
* bsc#1254858
* bsc#1254860
* bsc#1254864
* bsc#1254869
* bsc#1254894
* bsc#1254918
* bsc#1254957
* bsc#1254959
* bsc#1254983
* bsc#1254996
* bsc#1255005
* bsc#1255009
* bsc#1255025
* bsc#1255026
* bsc#1255030
* bsc#1255033
* bsc#1255034
* bsc#1255035
* bsc#1255039
* bsc#1255041
* bsc#1255042
* bsc#1255046
* bsc#1255057
* bsc#1255062
* bsc#1255064
* bsc#1255065
* bsc#1255068
* bsc#1255071
* bsc#1255072
* bsc#1255075
* bsc#1255077
* bsc#1255081
* bsc#1255082
* bsc#1255083
* bsc#1255085
* bsc#1255087
* bsc#1255092
* bsc#1255094
* bsc#1255095
* bsc#1255097
* bsc#1255100
* bsc#1255101
* bsc#1255116
* bsc#1255121
* bsc#1255122
* bsc#1255124
* bsc#1255131
* bsc#1255134
* bsc#1255135
* bsc#1255136
* bsc#1255142
* bsc#1255145
* bsc#1255146
* bsc#1255149
* bsc#1255152
* bsc#1255154
* bsc#1255155
* bsc#1255163
* bsc#1255167
* bsc#1255169
* bsc#1255171
* bsc#1255175
* bsc#1255179
* bsc#1255181
* bsc#1255182
* bsc#1255187
* bsc#1255190
* bsc#1255193
* bsc#1255196
* bsc#1255197
* bsc#1255199
* bsc#1255202
* bsc#1255203
* bsc#1255206
* bsc#1255209
* bsc#1255218
* bsc#1255220
* bsc#1255221
* bsc#1255224
* bsc#1255227
* bsc#1255230
* bsc#1255233
* bsc#1255234
* bsc#1255242
* bsc#1255245
* bsc#1255246
* bsc#1255247
* bsc#1255251
* bsc#1255252
* bsc#1255253
* bsc#1255256
* bsc#1255259
* bsc#1255262
* bsc#1255272
* bsc#1255273
* bsc#1255274
* bsc#1255276
* bsc#1255279
* bsc#1255280
* bsc#1255281
* bsc#1255297
* bsc#1255316
* bsc#1255318
* bsc#1255325
* bsc#1255329
* bsc#1255346
* bsc#1255349
* bsc#1255351
* bsc#1255357
* bsc#1255380
* bsc#1255395
* bsc#1255415
* bsc#1255428
* bsc#1255433
* bsc#1255434
* bsc#1255463
* bsc#1255480
* bsc#1255483
* bsc#1255489
* bsc#1255493
* bsc#1255495
* bsc#1255505
* bsc#1255507
* bsc#1255538
* bsc#1255540
* bsc#1255545
* bsc#1255549
* bsc#1255550
* bsc#1255553
* bsc#1255557
* bsc#1255558
* bsc#1255563
* bsc#1255564
* bsc#1255567
* bsc#1255570
* bsc#1255578
* bsc#1255579
* bsc#1255580
* bsc#1255583
* bsc#1255591
* bsc#1255601
* bsc#1255603
* bsc#1255605
* bsc#1255611
* bsc#1255614
* bsc#1255616
* bsc#1255617
* bsc#1255618
* bsc#1255621
* bsc#1255628
* bsc#1255629
* bsc#1255630
* bsc#1255632
* bsc#1255636
* bsc#1255688
* bsc#1255691
* bsc#1255702
* bsc#1255704
* bsc#1255706
* bsc#1255707
* bsc#1255709
* bsc#1255722
* bsc#1255723
* bsc#1255724
* bsc#1255758
* bsc#1255759
* bsc#1255760
* bsc#1255763
* bsc#1255769
* bsc#1255770
* bsc#1255772
* bsc#1255774
* bsc#1255775
* bsc#1255776
* bsc#1255780
* bsc#1255785
* bsc#1255786
* bsc#1255789
* bsc#1255790
* bsc#1255792
* bsc#1255793
* bsc#1255795
* bsc#1255798
* bsc#1255800
* bsc#1255801
* bsc#1255806
* bsc#1255807
* bsc#1255809
* bsc#1255810
* bsc#1255812
* bsc#1255814
* bsc#1255820
* bsc#1255838
* bsc#1255842
* bsc#1255843
* bsc#1255872
* bsc#1255875
* bsc#1255879
* bsc#1255883
* bsc#1255884
* bsc#1255886
* bsc#1255888
* bsc#1255890
* bsc#1255891
* bsc#1255892
* bsc#1255899
* bsc#1255902
* bsc#1255907
* bsc#1255911
* bsc#1255915
* bsc#1255918
* bsc#1255921
* bsc#1255924
* bsc#1255925
* bsc#1255931
* bsc#1255932
* bsc#1255934
* bsc#1255943
* bsc#1255944
* bsc#1255949
* bsc#1255951
* bsc#1255952
* bsc#1255955
* bsc#1255957
* bsc#1255961
* bsc#1255963
* bsc#1255964
* bsc#1255967
* bsc#1255974
* bsc#1255978
* bsc#1255984
* bsc#1255988
* bsc#1255990
* bsc#1255992
* bsc#1255993
* bsc#1255994
* bsc#1255996
* bsc#1256033
* bsc#1256034
* bsc#1256045
* bsc#1256050
* bsc#1256058
* bsc#1256071
* bsc#1256074
* bsc#1256081
* bsc#1256082
* bsc#1256083
* bsc#1256084
* bsc#1256085
* bsc#1256090
* bsc#1256093
* bsc#1256094
* bsc#1256095
* bsc#1256096
* bsc#1256099
* bsc#1256100
* bsc#1256104
* bsc#1256106
* bsc#1256107
* bsc#1256117
* bsc#1256119
* bsc#1256121
* bsc#1256145
* bsc#1256153
* bsc#1256178
* bsc#1256197
* bsc#1256231
* bsc#1256233
* bsc#1256234
* bsc#1256238
* bsc#1256263
* bsc#1256267
* bsc#1256268
* bsc#1256271
* bsc#1256273
* bsc#1256274
* bsc#1256279
* bsc#1256285
* bsc#1256291
* bsc#1256292
* bsc#1256300
* bsc#1256301
* bsc#1256302
* bsc#1256335
* bsc#1256348
* bsc#1256351
* bsc#1256354
* bsc#1256358
* bsc#1256361
* bsc#1256364
* bsc#1256366
* bsc#1256367
* bsc#1256368
* bsc#1256369
* bsc#1256370
* bsc#1256371
* bsc#1256373
* bsc#1256375
* bsc#1256379
* bsc#1256387
* bsc#1256394
* bsc#1256395
* bsc#1256396
* bsc#1256528
* jsc#PED-13611
* jsc#PED-14062
* jsc#PED-14280
* jsc#PED-14353
* jsc#PED-3527
* jsc#PED-4866
* jsc#PED-5065
* jsc#PED-5453
* jsc#PED-5475
* jsc#PED-5477
* jsc#PED-5511
* jsc#PED-6036
* jsc#PED-6041
* jsc#PED-6045
* jsc#PED-6067
* jsc#PED-6068
* jsc#PED-6069
* jsc#PED-6070
* jsc#PED-6071
* jsc#PED-6104
* jsc#PED-6114
* jsc#PED-6116
* jsc#PED-6120
* jsc#PED-6123
* jsc#PED-6811
* jsc#PED-7514
* jsc#PED-7542
* jsc#PED-7779
* jsc#PED-7780
Cross-References:
* CVE-2023-42752
* CVE-2023-53743
* CVE-2023-53750
* CVE-2023-53752
* CVE-2023-53759
* CVE-2023-53762
* CVE-2023-53766
* CVE-2023-53768
* CVE-2023-53777
* CVE-2023-53778
* CVE-2023-53782
* CVE-2023-53784
* CVE-2023-53785
* CVE-2023-53787
* CVE-2023-53791
* CVE-2023-53792
* CVE-2023-53793
* CVE-2023-53794
* CVE-2023-53795
* CVE-2023-53797
* CVE-2023-53799
* CVE-2023-53807
* CVE-2023-53808
* CVE-2023-53813
* CVE-2023-53815
* CVE-2023-53819
* CVE-2023-53821
* CVE-2023-53823
* CVE-2023-53825
* CVE-2023-53828
* CVE-2023-53831
* CVE-2023-53834
* CVE-2023-53836
* CVE-2023-53839
* CVE-2023-53841
* CVE-2023-53842
* CVE-2023-53843
* CVE-2023-53844
* CVE-2023-53846
* CVE-2023-53847
* CVE-2023-53848
* CVE-2023-53850
* CVE-2023-53851
* CVE-2023-53852
* CVE-2023-53855
* CVE-2023-53856
* CVE-2023-53857
* CVE-2023-53858
* CVE-2023-53860
* CVE-2023-53861
* CVE-2023-53863
* CVE-2023-53864
* CVE-2023-53865
* CVE-2023-53989
* CVE-2023-53992
* CVE-2023-53994
* CVE-2023-53995
* CVE-2023-53996
* CVE-2023-53997
* CVE-2023-53998
* CVE-2023-53999
* CVE-2023-54000
* CVE-2023-54001
* CVE-2023-54005
* CVE-2023-54006
* CVE-2023-54008
* CVE-2023-54014
* CVE-2023-54016
* CVE-2023-54017
* CVE-2023-54019
* CVE-2023-54022
* CVE-2023-54023
* CVE-2023-54025
* CVE-2023-54026
* CVE-2023-54027
* CVE-2023-54030
* CVE-2023-54031
* CVE-2023-54032
* CVE-2023-54035
* CVE-2023-54037
* CVE-2023-54038
* CVE-2023-54042
* CVE-2023-54045
* CVE-2023-54048
* CVE-2023-54049
* CVE-2023-54051
* CVE-2023-54052
* CVE-2023-54060
* CVE-2023-54064
* CVE-2023-54066
* CVE-2023-54067
* CVE-2023-54069
* CVE-2023-54070
* CVE-2023-54072
* CVE-2023-54076
* CVE-2023-54080
* CVE-2023-54081
* CVE-2023-54083
* CVE-2023-54088
* CVE-2023-54089
* CVE-2023-54091
* CVE-2023-54092
* CVE-2023-54093
* CVE-2023-54094
* CVE-2023-54095
* CVE-2023-54096
* CVE-2023-54099
* CVE-2023-54101
* CVE-2023-54104
* CVE-2023-54106
* CVE-2023-54112
* CVE-2023-54113
* CVE-2023-54115
* CVE-2023-54117
* CVE-2023-54121
* CVE-2023-54125
* CVE-2023-54127
* CVE-2023-54133
* CVE-2023-54134
* CVE-2023-54135
* CVE-2023-54136
* CVE-2023-54137
* CVE-2023-54140
* CVE-2023-54141
* CVE-2023-54142
* CVE-2023-54143
* CVE-2023-54145
* CVE-2023-54148
* CVE-2023-54149
* CVE-2023-54153
* CVE-2023-54154
* CVE-2023-54155
* CVE-2023-54156
* CVE-2023-54164
* CVE-2023-54166
* CVE-2023-54169
* CVE-2023-54170
* CVE-2023-54171
* CVE-2023-54172
* CVE-2023-54173
* CVE-2023-54177
* CVE-2023-54178
* CVE-2023-54179
* CVE-2023-54181
* CVE-2023-54183
* CVE-2023-54185
* CVE-2023-54189
* CVE-2023-54194
* CVE-2023-54201
* CVE-2023-54204
* CVE-2023-54207
* CVE-2023-54209
* CVE-2023-54210
* CVE-2023-54211
* CVE-2023-54215
* CVE-2023-54219
* CVE-2023-54220
* CVE-2023-54221
* CVE-2023-54223
* CVE-2023-54224
* CVE-2023-54225
* CVE-2023-54227
* CVE-2023-54229
* CVE-2023-54230
* CVE-2023-54235
* CVE-2023-54240
* CVE-2023-54241
* CVE-2023-54246
* CVE-2023-54247
* CVE-2023-54251
* CVE-2023-54253
* CVE-2023-54254
* CVE-2023-54255
* CVE-2023-54258
* CVE-2023-54261
* CVE-2023-54263
* CVE-2023-54264
* CVE-2023-54266
* CVE-2023-54267
* CVE-2023-54271
* CVE-2023-54276
* CVE-2023-54278
* CVE-2023-54281
* CVE-2023-54282
* CVE-2023-54283
* CVE-2023-54285
* CVE-2023-54289
* CVE-2023-54291
* CVE-2023-54292
* CVE-2023-54293
* CVE-2023-54296
* CVE-2023-54297
* CVE-2023-54299
* CVE-2023-54300
* CVE-2023-54302
* CVE-2023-54303
* CVE-2023-54304
* CVE-2023-54309
* CVE-2023-54312
* CVE-2023-54313
* CVE-2023-54314
* CVE-2023-54315
* CVE-2023-54316
* CVE-2023-54318
* CVE-2023-54319
* CVE-2023-54322
* CVE-2023-54324
* CVE-2023-54326
* CVE-2024-26944
* CVE-2025-38321
* CVE-2025-38728
* CVE-2025-39977
* CVE-2025-40006
* CVE-2025-40024
* CVE-2025-40033
* CVE-2025-40042
* CVE-2025-40053
* CVE-2025-40081
* CVE-2025-40102
* CVE-2025-40123
* CVE-2025-40134
* CVE-2025-40135
* CVE-2025-40153
* CVE-2025-40158
* CVE-2025-40160
* CVE-2025-40167
* CVE-2025-40170
* CVE-2025-40178
* CVE-2025-40179
* CVE-2025-40187
* CVE-2025-40190
* CVE-2025-40211
* CVE-2025-40213
* CVE-2025-40215
* CVE-2025-40219
* CVE-2025-40220
* CVE-2025-40223
* CVE-2025-40225
* CVE-2025-40231
* CVE-2025-40233
* CVE-2025-40240
* CVE-2025-40242
* CVE-2025-40244
* CVE-2025-40248
* CVE-2025-40250
* CVE-2025-40251
* CVE-2025-40252
* CVE-2025-40256
* CVE-2025-40258
* CVE-2025-40262
* CVE-2025-40263
* CVE-2025-40268
* CVE-2025-40269
* CVE-2025-40271
* CVE-2025-40272
* CVE-2025-40273
* CVE-2025-40274
* CVE-2025-40275
* CVE-2025-40276
* CVE-2025-40277
* CVE-2025-40278
* CVE-2025-40279
* CVE-2025-40280
* CVE-2025-40282
* CVE-2025-40283
* CVE-2025-40284
* CVE-2025-40287
* CVE-2025-40288
* CVE-2025-40289
* CVE-2025-40292
* CVE-2025-40293
* CVE-2025-40294
* CVE-2025-40297
* CVE-2025-40301
* CVE-2025-40302
* CVE-2025-40304
* CVE-2025-40306
* CVE-2025-40307
* CVE-2025-40308
* CVE-2025-40309
* CVE-2025-40310
* CVE-2025-40311
* CVE-2025-40312
* CVE-2025-40314
* CVE-2025-40315
* CVE-2025-40316
* CVE-2025-40317
* CVE-2025-40318
* CVE-2025-40319
* CVE-2025-40320
* CVE-2025-40321
* CVE-2025-40322
* CVE-2025-40323
* CVE-2025-40324
* CVE-2025-40329
* CVE-2025-40330
* CVE-2025-40331
* CVE-2025-40332
* CVE-2025-40337
* CVE-2025-40338
* CVE-2025-40339
* CVE-2025-40340
* CVE-2025-40342
* CVE-2025-40343
* CVE-2025-40345
* CVE-2025-40346
* CVE-2025-40347
* CVE-2025-40349
* CVE-2025-40351
* CVE-2025-40354
* CVE-2025-40357
* CVE-2025-40359
* CVE-2025-40360
* CVE-2025-68168
* CVE-2025-68170
* CVE-2025-68172
* CVE-2025-68176
* CVE-2025-68180
* CVE-2025-68181
* CVE-2025-68183
* CVE-2025-68184
* CVE-2025-68185
* CVE-2025-68190
* CVE-2025-68192
* CVE-2025-68194
* CVE-2025-68195
* CVE-2025-68197
* CVE-2025-68201
* CVE-2025-68204
* CVE-2025-68206
* CVE-2025-68207
* CVE-2025-68208
* CVE-2025-68209
* CVE-2025-68217
* CVE-2025-68218
* CVE-2025-68222
* CVE-2025-68223
* CVE-2025-68230
* CVE-2025-68233
* CVE-2025-68235
* CVE-2025-68237
* CVE-2025-68238
* CVE-2025-68239
* CVE-2025-68244
* CVE-2025-68249
* CVE-2025-68252
* CVE-2025-68255
* CVE-2025-68257
* CVE-2025-68258
* CVE-2025-68259
* CVE-2025-68264
* CVE-2025-68286
* CVE-2025-68287
* CVE-2025-68289
* CVE-2025-68290
* CVE-2025-68298
* CVE-2025-68302
* CVE-2025-68303
* CVE-2025-68305
* CVE-2025-68306
* CVE-2025-68307
* CVE-2025-68308
* CVE-2025-68312
* CVE-2025-68313
* CVE-2025-68328
* CVE-2025-68330
* CVE-2025-68331
* CVE-2025-68332
* CVE-2025-68335
* CVE-2025-68339
* CVE-2025-68340
* CVE-2025-68345
* CVE-2025-68346
* CVE-2025-68347
* CVE-2025-68351
* CVE-2025-68354
* CVE-2025-68362
* CVE-2025-68378
* CVE-2025-68380
* CVE-2025-68724
* CVE-2025-68732
* CVE-2025-68734
* CVE-2025-68740
* CVE-2025-68742
* CVE-2025-68744
* CVE-2025-68746
* CVE-2025-68747
* CVE-2025-68749
* CVE-2025-68750
* CVE-2025-68753
* CVE-2025-68757
* CVE-2025-68758
* CVE-2025-68759
* CVE-2025-68765
* CVE-2025-68766
CVSS scores:
* CVE-2023-42752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53759 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53766 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53777 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53782 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53782 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-53784 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53794 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53841 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53841 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53995 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53995 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53996 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-53997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54016 ( SUSE ): 5.3
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54016 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54017 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54023 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54030 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54030 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54042 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54045 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54072 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54076 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54080 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54080 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54083 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54088 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54089 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54091 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54092 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54093 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54095 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54099 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54101 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54101 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54125 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54125 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2023-54127 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54133 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54133 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54135 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54135 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54136 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54137 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54137 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54143 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54143 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54145 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54145 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54148 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2023-54149 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54149 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54153 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54154 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54155 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54166 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54173 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54178 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54179 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54183 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54185 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54185 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54189 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54194 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54201 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54207 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54207 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54209 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54209 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54215 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54215 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54219 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54220 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54221 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54221 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54223 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54224 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54225 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54225 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54227 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54229 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54230 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54235 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54235 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54241 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54247 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54247 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54253 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54253 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2023-54254 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54255 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54255 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54258 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54261 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54263 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54266 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54267 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54271 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54278 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54278 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54281 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54282 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54282 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54283 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54283 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54285 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54285 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54289 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54291 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54292 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54293 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54296 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54297 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54297 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54300 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54302 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54303 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54303 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54309 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54312 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54312 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54314 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54316 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54316 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54318 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54322 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54324 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54324 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54326 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38321 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38728 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40024 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40033 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40053 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40102 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-40123 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40135 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40153 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40158 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40160 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40160 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40167 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40170 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40170 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40179 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40179 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40190 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40190 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40211 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40211 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40213 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40215 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40219 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40220 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40242 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40258 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40263 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40268 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40269 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40271 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40279 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40279 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-40280 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40282 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40282 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40283 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40283 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40284 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40284 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40288 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40289 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40292 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40292 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-40293 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40293 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40294 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40294 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-40297 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40301 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40301 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-40302 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40302 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40306 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40307 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40308 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40309 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40310 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40311 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40314 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40314 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40322 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40322 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-40323 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40323 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40338 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40338 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40339 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40340 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40342 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40342 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40343 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40343 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40345 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40345 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40346 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40349 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40351 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40354 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40357 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40357 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40359 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40360 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68168 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68183 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68184 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68190 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68194 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68201 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68206 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68208 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68208 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-68209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68223 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68223 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68255 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68255 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68264 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68264 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68306 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68307 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68307 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68308 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68313 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68313 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68328 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68328 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68330 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68331 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68331 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68339 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68339 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68340 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68340 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-68345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68347 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68347 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68732 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68734 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68740 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68742 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68742 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68744 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68746 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68747 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68747 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68749 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68750 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68750 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-68753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-68757 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68758 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68758 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68759 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68766 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68766 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
Affected Products:
* SUSE Linux Enterprise Live Patching 15-SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Real Time Module 15-SP7
An update that solves 395 vulnerabilities, contains 29 features and has 44
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP7 RT kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails
(bsc#1246328).
* CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd
(bsc#1249256).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252046).
* CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted
(bsc#1252342).
* CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task
(bsc#1252686).
* CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in
pru_rproc_set_ctable() (bsc#1252824).
* CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing
NULL pointer dereference (bsc#1252861).
* CVE-2025-40053: net: dlink: handle copy_thresh allocation failure
(bsc#1252808).
* CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
(bsc#1252776).
* CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init
(bsc#1252919).
* CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend()
(bsc#1253386).
* CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
* CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory
area (bsc#1253408).
* CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
* CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).
* CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination
(bsc#1253458).
* CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
* CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
* CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
* CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition
sctp_sf_do_5_1D_ce() (bsc#1253647).
* CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr
update (bsc#1253623).
* CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
* CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
workers (bsc#1254520).
* CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport()
(bsc#1254815).
* CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
(bsc#1254813).
* CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is
missing (bsc#1254869).
* CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
* CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already
established (bsc#1254864).
* CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq()
failure (bsc#1254854).
* CVE-2025-40251: devlink: rate: Unset parent pointer in
devl_rate_nodes_destroy (bsc#1254856).
* CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in
qede_tpa_cont() and qede_tpa_end() (bsc#1254849).
* CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
(bsc#1254843).
* CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param
(bsc#1255082).
* CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
* CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when
gmem is dying (bsc#1254830).
* CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN
kernel-infoleak (bsc#1254825).
* CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix
kernel leak (bsc#1254846).
* CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
(bsc#1254847).
* CVE-2025-40287: exfat: fix improper check of dentry.stream.valid_size
(bsc#1255030).
* CVE-2025-40289: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
(bsc#1255042).
* CVE-2025-40292: virtio-net: fix received length check in big packets
(bsc#1255175).
* CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking
(bsc#1255179).
* CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass
(bsc#1255187).
* CVE-2025-40307: exfat: validate cluster allocation bits of the allocation
bitmap (bsc#1255039).
* CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer
(bsc#1254794).
* CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616).
* CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
* CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors
(bsc#1255081).
* CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between
components (bsc#1255273).
* CVE-2025-40346: arch_topology: Fix incorrect error check in
topology_parse_cpu_capacity() (bsc#1255318).
* CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump
(bsc#1255097).
* CVE-2025-68197: bnxt_en: Fix null pointer dereference in
bnxt_bs_trace_check_wrap() (bsc#1255242).
* CVE-2025-68204: pmdomain: arm: scmi: Fix genpd leak on provider registration
failure (bsc#1255224).
* CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted
connections (bsc#1255142).
* CVE-2025-68208: bpf: account for current allocated stack depth in
widen_imprecise_scalars() (bsc#1255227).
* CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230).
* CVE-2025-68239: binfmt_misc: restore write access before closing files
opened by open_exec() (bsc#1255272).
* CVE-2025-68255: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq
IE parsing (bsc#1255395).
* CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is
replaced (bsc#1255199).
* CVE-2025-68264: ext4: refresh inline data size before write operations
(bsc#1255380).
* CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx()
(bsc#1255121).
* CVE-2025-68340: team: Move team device type change at the end of
team_port_add (bsc#1255507).
* CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper
function (bsc#1255614).
* CVE-2025-68742: bpf: Improve program stats run-time calculation
(bsc#1255707).
* CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps
(bsc#1255709).
The following non security issues were fixed:
* ACPI: CPPC: Fix missing PCC check for guaranteed_perf (git-fixes).
* ACPI: PCC: Fix race condition by removing static qualifier (git-fixes).
* ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).
* ACPI: property: Fix fwnode refcount leak in
acpi_fwnode_graph_parse_endpoint() (git-fixes).
* ACPI: property: Use ACPI functions in acpi_graph_get_next_endpoint() only
(stable-fixes).
* ACPICA: Avoid walking the Namespace if start_node is NULL (stable-fixes).
* ALSA: ac97: fix a double free in snd_ac97_controller_register() (git-fixes).
* ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).
* ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-
fixes).
* ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-
fixes).
* ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()
(git-fixes).
* ALSA: pcmcia: Fix resource leak in snd_pdacf_probe error path (git-fixes).
* ALSA: uapi: Fix typo in asound.h comment (git-fixes).
* ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).
* ALSA: usb-audio: Add native DSD quirks for PureAudio DAC series (stable-
fixes).
* ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).
* ALSA: usb-mixer: us16x08: validate meter packet indices (git-fixes).
* ALSA: vxpocket: Fix resource leak in vxpocket_probe error path (git-fixes).
* ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).
* ASoC: ak4458: Disable regulator when error happens (git-fixes).
* ASoC: ak4458: remove the reset operation in probe and remove (git-fixes).
* ASoC: ak5558: Disable regulator when error happens (git-fixes).
* ASoC: bcm: bcm63xx-pcm-whistler: Check return value of of_dma_configure()
(git-fixes).
* ASoC: codecs: lpass-tx-macro: fix SM6115 support (git-fixes).
* ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).
* ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).
* ASoC: qcom: q6adm: the the copp device only during last instance (git-
fixes).
* ASoC: qcom: q6apm-dai: set flags to reflect correct operation of appl_ptr
(git-fixes).
* ASoC: qcom: q6asm-dai: perform correct state check before closing (git-
fixes).
* ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-
fixes).
* ASoC: stm32: sai: fix OF node leak on probe (git-fixes).
* ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).
* ASoC: stm32: sai: fix device leak on probe (git-fixes).
* ASoC: sun4i-spdif: Add missing kerneldoc fields for sun4i_spdif_quirks (git-
fixes).
* Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).
* Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete (git-
fixes).
* Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-
fixes).
* Bluetooth: btrtl: Avoid loading the config file on security chips (stable-
fixes).
* Bluetooth: btusb: Add new VID/PID 13d3/3533 for RTL8821CE (stable-fixes).
* Bluetooth: btusb: Add new VID/PID 2b89/6275 for RTL8761BUV (stable-fixes).
* Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref
(git-fixes).
* Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso
interface (git-fixes).
* Bluetooth: btusb: revert use of devm_kzalloc in btusb (git-fixes).
* Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-
fixes).
* Documentation/kernel-parameters: fix typo in retbleed= kernel parameter
description (git-fixes).
* Documentation: hid-alps: Fix packet format section headings (git-fixes).
* Documentation: parport-lowlevel: Separate function listing code blocks (git-
fixes).
* HID: apple: Add SONiX AK870 PRO to non_apple_keyboards quirk list (stable-
fixes).
* HID: elecom: Add support for ELECOM M-XT3URBK (018F) (stable-fixes).
* HID: hid-input: Extend Elan ignore battery quirk to USB (stable-fixes).
* HID: input: map HID_GD_Z to ABS_DISTANCE for stylus/pen (stable-fixes).
* HID: logitech-dj: Remove duplicate error logging (git-fixes).
* HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-
fixes).
* HID: quirks: work around VID/PID conflict for appledisplay (git-fixes).
* Input: atkbd - skip deactivate for HONOR FMB-P's internal keyboard (git-
fixes).
* Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).
* Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).
* Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).
* Input: i8042 - add TUXEDO InfinityBook Max Gen10 AMD to i8042 quirk table
(stable-fixes).
* Input: ti_am335x_tsc - fix off-by-one error in wire_order validation (git-
fixes).
* KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).
* KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
* KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255463).
* PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-
fixes).
* PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).
* PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).
* PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).
* PM: runtime: Do not clear needs_force_resume with enabled runtime PM (git-
fixes).
* Revert "drm/amd/display: Fix pbn to kbps Conversion" (stable-fixes).
* Revert "drm/amd/display: Move setup_stream_attribute" (stable-fixes).
* Revert "drm/amd: Skip power ungate during suspend for VPE" (git-fixes).
* Revert "mtd: rawnand: marvell: fix layouts" (git-fixes).
* Revert "net: r8169: Disable multicast filter for RTL8168H and RTL8107E"
(jsc#PED-14353).
* Revert "r8169: don't try to disable interrupts if NAPI is, scheduled
already" (jsc#PED-14353).
* USB: Fix descriptor count when handling invalid MBIM extended descriptor
(git-fixes).
* USB: lpc32xx_udc: Fix error handling in probe (git-fixes).
* USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).
* USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).
* USB: serial: ftdi_sio: match on interface number for jtag (stable-fixes).
* USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).
* USB: serial: option: add Foxconn T99W760 (stable-fixes).
* USB: serial: option: add Quectel RG255C (stable-fixes).
* USB: serial: option: add Telit Cinterion FE910C04 new compositions (stable-
fixes).
* USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).
* USB: serial: option: add UNISOC UIS7720 (stable-fixes).
* USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).
* USB: serial: option: move Telit 0x10c7 composition in the right place
(stable-fixes).
* USB: storage: Remove subclass and protocol overrides from Novatek quirk
(git-fixes).
* accel/ivpu: Fix DCT active percent format (git-fixes).
* accel/ivpu: Fix race condition when unbinding BOs (git-fixes).
* arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes).
* arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes).
* atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).
* atm: Fix dma_free_coherent() size (git-fixes).
* atm: idt77252: Add missing `dma_map_error()` (stable-fixes).
* backlight: led-bl: Add devlink to supplier LEDs (git-fixes).
* backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).
* bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433).
* bpf: Reject bpf_timer for PREEMPT_RT (git-fixes).
* broadcom: b44: prevent uninitialized value usage (git-fixes).
* btrfs: make sure extent and csum paths are always released in
scrub_raid56_parity_stripe() (git-fixes).
* can: gs_usb: gs_can_open(): fix error handling (git-fixes).
* can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs
(git-fixes).
* can: j1939: make j1939_sk_bind() fail if device is no longer registered
(git-fixes).
* can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-
fixes).
* can: sja1000: fix max irq loop handling (git-fixes).
* can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-
fixes).
* cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434).
* char: applicom: fix NULL pointer dereference in ac_ioctl (stable-fixes).
* cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).
* clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).
* clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to
other (git-fixes).
* clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback
(git-fixes).
* clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).
* clk: samsung: exynos-clkout: Assign .num before accessing .hws (git-fixes).
* comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).
* comedi: check device's attached status in compat ioctls (git-fixes).
* comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).
* comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).
* cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-
fixes).
* cpufreq: nforce2: fix reference count leak in nforce2 (git-fixes).
* cpuidle: menu: Use residency threshold in polling state override decisions
(bsc#1255026).
* crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
(git-fixes).
* crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-
fixes).
* crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).
* crypto: hisilicon/qm - restore original qos values (git-fixes).
* crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).
* crypto: qat - fix duplicate restarting msg during AER error (git-fixes).
* crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-
fixes).
* crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (git-fixes).
* dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).
* dm-verity: fix unreliable memory allocation (git-fixes).
* dm: fix queue start/stop imbalance under suspend/load/resume races
(bsc#1253386).
* drivers/usb/dwc3: fix PCI parent check (git-fixes).
* drm/amd/amdgpu: reserve vm invalidation engine for uni_mes (stable-fixes).
* drm/amd/display: Check NULL before accessing (stable-fixes).
* drm/amd/display: Clear the CUR_ENABLE register on DCN20 on DPP5 (stable-
fixes).
* drm/amd/display: Don't change brightness for disabled connectors (stable-
fixes).
* drm/amd/display: Fix logical vs bitwise bug in
get_embedded_panel_info_v2_1() (git-fixes).
* drm/amd/display: Fix pbn to kbps Conversion (stable-fixes).
* drm/amd/display: Fix scratch registers offsets for DCN35 (stable-fixes).
* drm/amd/display: Fix scratch registers offsets for DCN351 (stable-fixes).
* drm/amd/display: Increase DPCD read retries (stable-fixes).
* drm/amd/display: Insert dccg log for easy debug (stable-fixes).
* drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-
fixes).
* drm/amd/display: Prevent Gating DTBCLK before It Is Properly Latched (git-
fixes).
* drm/amd/display: Use GFP_ATOMIC in dc_create_plane_state() (stable-fixes).
* drm/amd/display: avoid reset DTBCLK at clock init (stable-fixes).
* drm/amd/display: disable DPP RCG before DPP CLK enable (stable-fixes).
* drm/amd: Skip power ungate during suspend for VPE (stable-fixes).
* drm/amdgpu/gmc11: add amdgpu_vm_handle_fault() handling (stable-fixes).
* drm/amdgpu/gmc12: add amdgpu_vm_handle_fault() handling (stable-fixes).
* drm/amdgpu: Forward VMID reservation errors (git-fixes).
* drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-
fixes).
* drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).
* drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).
* drm/amdgpu: fix gpu page fault after hibernation on PF passthrough (stable-
fixes).
* drm/amdkfd: Export the cwsr_size and ctl_stack_size to userspace (stable-
fixes).
* drm/amdkfd: Fix GPU mappings for APU after prefetch (stable-fixes).
* drm/amdkfd: Trap handler support for expert scheduling mode (stable-fixes).
* drm/amdkfd: Use huge page size to check split svm range alignment (git-
fixes).
* drm/amdkfd: bump minimum vgpr size for gfx1151 (stable-fixes).
* drm/displayid: add quirk to ignore DisplayID checksum errors (stable-fixes).
* drm/displayid: pass iter to drm_find_displayid_extension() (stable-fixes).
* drm/edid: add DRM_EDID_IDENT_INIT() to initialize struct drm_edid_ident
(stable-fixes).
* drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).
* drm/i915/dp: Initialize the source OUI write timestamp always (stable-
fixes).
* drm/i915/dp_mst: Disable Panel Replay (git-fixes).
* drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer
(git-fixes).
* drm/i915: Fix format string truncation warning (git-fixes).
* drm/imagination: Disallow exporting of PM/FW protected objects (git-fixes).
* drm/imagination: Fix reference to devm_platform_get_and_ioremap_resource()
(git-fixes).
* drm/me/gsc: mei interrupt top half should be in irq disabled context (git-
fixes).
* drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).
* drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-
fixes).
* drm/mediatek: Fix probe device leaks (git-fixes).
* drm/mediatek: Fix probe memory leak (git-fixes).
* drm/mediatek: Fix probe resource leaks (git-fixes).
* drm/mediatek: ovl_adaptor: Fix probe device leaks (git-fixes).
* drm/mgag200: Fix big-endian support (git-fixes).
* drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).
* drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-
fixes).
* drm/msm/a6xx: Fix the gemnoc workaround (git-fixes).
* drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).
* drm/msm/a6xx: Improve MX rail fallback in RPMH vote init (git-fixes).
* drm/msm/dpu: Add missing NULL pointer check for pingpong interface (git-
fixes).
* drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-
fixes).
* drm/msm/dpu: drop dpu_hw_dsc_destroy() prototype (git-fixes).
* drm/nouveau/dispnv50: Don't call drm_atomic_get_crtc_state() in prepare_fb
(git-fixes).
* drm/nouveau: refactor deprecated strcpy (git-fixes).
* drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).
* drm/panel: sony-td4353-jdi: Enable prepare_prev_first (git-fixes).
* drm/panel: visionox-rm69299: Don't clear all mode flags (git-fixes).
* drm/panthor: Avoid adding of kernel BOs to extobj list (git-fixes).
* drm/panthor: Fix UAF on kernel BO VA nodes (git-fixes).
* drm/panthor: Fix group_free_queue() for partially initialized queues (git-
fixes).
* drm/panthor: Fix potential memleak of vma structure (git-fixes).
* drm/panthor: Fix race with suspend during unplug (git-fixes).
* drm/panthor: Flush shmem writes before mapping buffers CPU-uncached (git-
fixes).
* drm/panthor: Handle errors returned by drm_sched_entity_init() (git-fixes).
* drm/pl111: Fix error handling in pl111_amba_probe (git-fixes).
* drm/plane: Fix IS_ERR() vs NULL check in
drm_plane_create_hotspot_properties() (git-fixes).
* drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-
fixes).
* drm/sched: Fix race in drm_sched_entity_select_rq() (git-fixes).
* drm/tilcdc: Fix removal actions in case of failed probe (git-fixes).
* drm/tilcdc: request and mapp iomem with devres (stable-fixes).
* drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).
* drm/vgem-fence: Fix potential deadlock on release (git-fixes).
* drm/vmwgfx: Use kref in vmw_bo_dirty (stable-fixes).
* drm/xe/bo: Don't include the CCS metadata in the dma-buf sg-table (git-
fixes).
* drm/xe/oa: Disallow 0 OA property values (git-fixes).
* drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl() (git-fixes).
* drm/xe/oa: Limit num_syncs to prevent oversized allocations (git-fixes).
* drm/xe: Adjust long-running workload timeslices to reasonable values (git-
fixes).
* drm/xe: Drop preempt-fences when destroying imported dma-bufs (git-fixes).
* drm/xe: Fix conversion from clock ticks to milliseconds (git-fixes).
* drm/xe: Limit num_syncs to prevent oversized allocations (git-fixes).
* drm/xe: Prevent BIT() overflow when handling invalid prefetch region (git-
fixes).
* drm/xe: Restore engine registers before restarting schedulers after GT reset
(git-fixes).
* drm/xe: Use usleep_range for accurate long-running workload timeslicing
(git-fixes).
* drm: atmel-hlcdc: fix atmel_xlcdc_plane_setup_scaler() (git-fixes).
* drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).
* drm: sti: fix device leaks at component probe (git-fixes).
* efi/libstub: Avoid physical address 0x0 when doing random allocation
(stable-fixes).
* efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-
fixes).
* efi/libstub: Fix page table access in 5-level to 4-level paging transition
(git-fixes).
* efi: stmm: Fix incorrect buffer allocation method (git-fixes).
* efi: stmm: fix kernel-doc "bad line" warnings (git-fixes).
* exfat: add a check for invalid data size (git-fixes).
* exfat: using hweight instead of internal logic (git-fixes).
* ext4: use optimized mballoc scanning regardless of inode format
(bsc#1254378).
* ext4: wait for ongoing I/O to complete before freeing blocks (bsc#1256366).
* fbdev: gbefb: fix to use physical address instead of dma address (stable-
fixes).
* fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-
fixes).
* fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).
* fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).
* firewire: nosy: Fix dma_free_coherent() size (git-fixes).
* firmware: imx: scu-irq: Init workqueue before request mbox channel (stable-
fixes).
* firmware: imx: scu-irq: fix OF node leak in (git-fixes).
* firmware: stratix10-svc: Add mutex in stratix10 memory management (git-
fixes).
* firmware: stratix10-svc: fix bug in saving controller data (git-fixes).
* firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-
fixes).
* fs: dlm: allow to F_SETLKW getting interrupted (bsc#1255025).
* ftrace: bpf: Fix IPMODIFY + DIRECT in modify_ftrace_direct() (git-fixes).
* genalloc.h: fix htmldocs warning (git-fixes).
* gpio: rockchip: mark the GPIO controller as sleeping (git-fixes).
* gpu: host1x: Fix race in syncpt alloc/free (git-fixes).
* hwmon: (ibmpex) fix use-after-free in high/low store (git-fixes).
* hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).
* hwmon: (tmp401) fix overflow caused by default conversion rate value (git-
fixes).
* hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).
* hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).
* hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-
fixes).
* i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).
* i2c: designware: Disable SMBus interrupts to prevent storms from mis-
configured firmware (stable-fixes).
* i2c: i2c.h: fix a bad kernel-doc line (git-fixes).
* i3c: fix refcount inconsistency in i3c_master_register (git-fixes).
* i3c: master: Inherit DMA masks and parameters from parent device (stable-
fixes).
* i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).
* idr: fix idr_alloc() returning an ID out of range (git-fixes).
* iio: accel: bmc150: Fix irq assumption regression (stable-fixes).
* iio: accel: fix ADXL355 startup race condition (git-fixes).
* iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).
* iio: adc: ti_am335x_adc: Limit step_avg to valid range for gcc complains
(stable-fixes).
* iio: core: Clean up device correctly on iio_device_alloc() failure (git-
fixes).
* iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).
* iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-
fixes).
* iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-
fixes).
* iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).
* ima: Handle error code returned by ima_filter_rule_match() (git-fixes).
* intel_th: Fix error handling in intel_th_output_open (git-fixes).
* ipmi: Fix __scan_channels() failing to rescan channels (stable-fixes).
* ipmi: Fix handling of messages with provided receive message pointer (git-
fixes).
* ipmi: Fix the race between __scan_channels() and deliver_response() (stable-
fixes).
* ipmi: Rework user message limit handling (git-fixes).
* irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).
* kconfig/mconf: Initialize the default locale at startup (stable-fixes).
* kconfig/nconf: Initialize the default locale at startup (stable-fixes).
* leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).
* leds: leds-lp50xx: Enable chip before any communication (git-fixes).
* leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-
fixes).
* leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).
* lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-
fixes).
* mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).
* media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).
* media: adv7842: Avoid possible out-of-bounds array accesses in
adv7842_cp_log_status() (git-fixes).
* media: amphion: Add a frame flush mode for decoder (stable-fixes).
* media: amphion: Cancel message work before releasing the VPU core (git-
fixes).
* media: amphion: Make some vpu_v4l2 functions static (stable-fixes).
* media: amphion: Remove vpu_vb_is_codecconfig (git-fixes).
* media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973).
* media: atomisp: Remove firmware_name module parameter (bsc#1252973).
* media: cec: Fix debugfs leak on bus_register() failure (git-fixes).
* media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).
* media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-
fixes).
* media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-
fixes).
* media: imx-mipi-csis: Drop extra clock enable at probe() (git-fixes).
* media: msp3400: Avoid possible out-of-bounds array accesses in
msp3400c_thread() (git-fixes).
* media: nxp: imx8-isi: Mark all crossbar sink pads as MUST_CONNECT (stable-
fixes).
* media: ov5640: fix vblank unchange issue when work at dvp mode (git-fixes).
* media: pci: ivtv: Don't create fake v4l2_fh (stable-fixes).
* media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).
* media: qcom: camss: Fix genpd cleanup (git-fixes).
* media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes).
* media: qcom: camss: cleanup media device allocated resource on error path
(git-fixes).
* media: qcom: venus: fix incorrect return value (stable-fixes).
* media: radio-isa: use dev_name to fill in bus_info (stable-fixes).
* media: rc: st_rc: Fix reset control resource leak (git-fixes).
* media: renesas: rcar_drif: fix device node reference leak in
rcar_drif_bond_enabled (git-fixes).
* media: s5p-mfc: Fix potential deadlock on condlock (stable-fixes).
* media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).
* media: uvcvideo: Force UVC version to 1.0a for 0408:4033 (stable-fixes).
* media: v4l2-mem2mem: Fix outdated documentation (git-fixes).
* media: verisilicon: Fix CPU stalls on G2 bus error (git-fixes).
* media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-
fixes).
* media: verisilicon: Store chroma and motion vectors offset (stable-fixes).
* media: verisilicon: g2: Use common helpers to compute chroma and mv offsets
(stable-fixes).
* media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-
fixes).
* media: vidtv: initialize local pointers upon transfer of memory ownership
(git-fixes).
* media: vpif_capture: fix section mismatch (git-fixes).
* media: vpif_display: fix section mismatch (git-fixes).
* mei: gsc: add dependency on Xe driver (git-fixes).
* mei: me: add wildcat lake P DID (stable-fixes).
* mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).
* mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).
* mfd: max77620: Fix potential IRQ chip conflict when probing two devices
(git-fixes).
* mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).
* mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).
* mmc: sdhci-esdhc-imx: add alternate ARCH_S32 dependency to Kconfig (git-
fixes).
* mmc: sdhci-msm: Avoid early clock doubling during HS400 transition (stable-
fixes).
* most: usb: fix double free on late probe failure (git-fixes).
* mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).
* mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).
* mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-
fixes).
* mtd: nand: relax ECC parameter validation check (git-fixes).
* mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and
remove (git-fixes).
* mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).
* net: mdio: aspeed: add dummy read to avoid read-after-write issue (git-
fixes).
* net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
(git-fixes).
* net: phy: adin1100: Fix software power-down ready condition (git-fixes).
* net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-
fixes).
* net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-
fixes).
* net: r8169: Disable multicast filter for RTL8168H and RTL8107E
(jsc#PED-14353).
* net: rose: fix invalid array index in rose_kill_by_device() (git-fixes).
* net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes).
* net: usb: rtl8150: fix memory leak on usb_submit_urb() failure (git-fixes).
* net: usb: sr9700: fix incorrect command used to write single register (git-
fixes).
* net: wwan: iosm: Fix memory leak in ipc_mux_deinit() (git-fixes).
* netdevsim: print human readable IP address (bsc#1255071).
* nfc: pn533: Fix error code in pn533_acr122_poweron_rdr() (git-fixes).
* nfsd: do not defer requests during idmap lookup in v4 compound decode
(bsc#1232223).
* nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).
* nvme: Use non zero KATO for persistent discovery connections (git-fixes).
* orangefs: fix xattr related buffer overflow.. (git-fixes).
* perf list: Add IBM z17 event descriptions (jsc#PED-13611).
* perf/x86/intel: Fix KASAN global-out-of-bounds warning (git-fixes).
* phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).
* phy: renesas: rcar-gen3-usb2: Fix an error handling path in
rcar_gen3_phy_usb2_probe() (git-fixes).
* pinctrl: qcom: lpass-lpi: mark the GPIO controller as sleeping (git-fixes).
* pinctrl: qcom: msm: Fix deadlock in pinmux configuration (stable-fixes).
* pinctrl: single: Fix PIN_CONFIG_BIAS_DISABLE handling (stable-fixes).
* pinctrl: single: Fix incorrect type for error return variable (git-fixes).
* pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).
* platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).
* platform/mellanox: mlxbf-pmc: Remove trailing whitespaces from event names
(git-fixes).
* platform/x86/amd/pmc: Add spurious_8042 to Xbox Ally (stable-fixes).
* platform/x86/amd: pmc: Add Lenovo Legion Go 2 to pmc quirk list (stable-
fixes).
* platform/x86/intel/hid: Add Dell Pro Rugged 10/12 tablet to VGBS DMI quirks
(stable-fixes).
* platform/x86: acer-wmi: Ignore backlight event (stable-fixes).
* platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-
fixes).
* platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package
parsing (git-fixes).
* platform/x86: huawei-wmi: add keys for HONOR models (stable-fixes).
* platform/x86: ibm_rtl: fix EBDA signature search pointer arithmetic (git-
fixes).
* platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git-
fixes).
* platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).
* platform/x86: msi-laptop: add missing sysfs_remove_group() (git-fixes).
* power: supply: apm_power: only unset own apm_get_power_status (git-fixes).
* power: supply: cw2015: Check devm_delayed_work_autocancel() return code
(git-fixes).
* power: supply: rt9467: Prevent using uninitialized local variable in
rt9467_set_value_from_ranges() (git-fixes).
* power: supply: rt9467: Return error on failure in
rt9467_set_value_from_ranges() (git-fixes).
* power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).
* powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022
ltc#211187).
* powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event
handling (bsc#1253262 ltc#216029).
* powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285
bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493
bsc#1254244 ltc#216496).
* pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-
fixes).
* r8169: Fix spelling mistake: "tx_underun" -> "tx_underrun" (jsc#PED-14353).
* r8169: Use PCI_IRQ_INTX instead of PCI_IRQ_LEGACY (jsc#PED-14353).
* r8169: add MODULE_FIRMWARE entry for RTL8126A (jsc#PED-14353).
* r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).
* r8169: add generic rtl_set_eee_txidle_timer function (jsc#PED-14353).
* r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b (jsc#PED-14353).
* r8169: add support for Intel Killer E5000 (jsc#PED-14353).
* r8169: add support for RTL8125BP rev.b (jsc#PED-14353).
* r8169: add support for RTL8125D (jsc#PED-14353).
* r8169: add support for RTL8125D rev.b (jsc#PED-14353).
* r8169: add support for RTL8126A rev.b (jsc#PED-14353).
* r8169: add support for RTL8168M (jsc#PED-14353).
* r8169: add support for returning tx_lpi_timer in ethtool get_eee
(jsc#PED-14353).
* r8169: add support for the temperature sensor being available from RTL8125B
(jsc#PED-14353).
* r8169: adjust version numbering for RTL8126 (jsc#PED-14353).
* r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).
* r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).
* r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).
* r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers
(jsc#PED-14353).
* r8169: avoid duplicated messages if loading firmware fails and switch to
warn level (jsc#PED-14353).
* r8169: avoid unsolicited interrupts (jsc#PED-14353).
* r8169: check for PCI read error in probe (jsc#PED-14353).
* r8169: disable ALDPS per default for RTL8125 (jsc#PED-14353).
* r8169: disable RTL8126 ZRX-DC timeout (jsc#PED-14353).
* r8169: disable interrupt source RxOverflow (jsc#PED-14353).
* r8169: don't apply UDP padding quirk on RTL8126A (jsc#PED-14353).
* r8169: don't increment tx_dropped in case of NETDEV_TX_BUSY (jsc#PED-14353).
* r8169: don't scan PHY addresses > 0 (jsc#PED-14353).
* r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353).
* r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).
* r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).
* r8169: fix RTL8117 Wake-on-Lan in DASH mode (git-fixes).
* r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats
(jsc#PED-14353).
* r8169: implement additional ethtool stats ops (jsc#PED-14353).
* r8169: improve RTL8411b phy-down fixup (jsc#PED-14353).
* r8169: improve __rtl8169_set_wol (jsc#PED-14353).
* r8169: improve handling task scheduling (jsc#PED-14353).
* r8169: improve initialization of RSS registers on RTL8125/RTL8126
(jsc#PED-14353).
* r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).
* r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).
* r8169: remove detection of chip version 11 (early RTL8168b) (jsc#PED-14353).
* r8169: remove leftover locks after reverted change (jsc#PED-14353).
* r8169: remove multicast filter limit (jsc#PED-14353).
* r8169: remove not needed check in rtl_fw_write_firmware (jsc#PED-14353).
* r8169: remove original workaround for RTL8125 broken rx issue
(jsc#PED-14353).
* r8169: remove redundant hwmon support (jsc#PED-14353).
* r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).
* r8169: remove support for chip version 11 (jsc#PED-14353).
* r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).
* r8169: set EEE speed down ratio to 1 (stable-fixes).
* r8169: simplify EEE handling (jsc#PED-14353).
* r8169: simplify code by using core-provided pcpu stats allocation
(jsc#PED-14353).
* r8169: support setting the EEE tx idle timer on RTL8168h (jsc#PED-14353).
* r8169: use dev_err_probe in all appropriate places in rtl_init_one()
(jsc#PED-14353).
* r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config
(jsc#PED-14353).
* regulator: core: Protect regulator_supply_alias_list with
regulator_list_mutex (git-fixes).
* regulator: core: disable supply if enabling main regulator fails (git-
fixes).
* reset: fix BIT macro reference (stable-fixes).
* rpmsg: glink: fix rpmsg device leak (git-fixes).
* rtc: gamecube: Check the return value of ioremap() (git-fixes).
* scsi: lpfc: Add capability to register Platform Name ID to fabric
(bsc#1254119).
* scsi: lpfc: Allow support for BB credit recovery in point-to-point topology
(bsc#1254119).
* scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
* scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology
(bsc#1254119).
* scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI
(bsc#1254119).
* scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
* scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb()
(bsc#1254119).
* scsi: lpfc: Revise discovery related function headers and comments
(bsc#1254119).
* scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
* scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
* scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251752
jsc#PED-14280).
* scsi: mpi3mr: Fix controller init failure on fault during queue creation
(bsc#1251752 jsc#PED-14280).
* scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed
(bsc#1251752 jsc#PED-14280).
* scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251752
jsc#PED-14280).
* scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251752 jsc#PED-14280).
* scsi: mpi3mr: Update driver version to 8.14.0.5.50 (bsc#1251752
jsc#PED-14280).
* scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251752
jsc#PED-14280).
* selftests/bpf: Skip timer cases when bpf_timer is not supported (git-fixes).
* selftests/net: calibrate txtimestamp (bsc#1255085).
* selftests/net: convert fcnal-test.sh to run it in unique namespace
(bsc#1254235).
* selftests/net: convert fib-onlink-tests.sh to run it in unique namespace
(bsc#1254235).
* selftests/net: convert fib_nexthop_multiprefix to run it in unique namespace
(bsc#1254235).
* selftests/net: convert fib_nexthop_nongw.sh to run it in unique namespace
(bsc#1254235).
* selftests/net: convert fib_nexthops.sh to run it in unique namespace
(bsc#1254235).
* selftests/net: convert fib_rule_tests.sh to run it in unique namespace
(bsc#1254235).
* selftests/net: convert fib_tests.sh to run it in unique namespace
(bsc#1254235).
* selftests/net: convert srv6_end_dt46_l3vpn_test.sh to run it in unique
namespace (bsc#1254235).
* selftests/net: convert srv6_end_dt4_l3vpn_test.sh to run it in unique
namespace (bsc#1254235).
* selftests/net: convert srv6_end_dt6_l3vpn_test.sh to run it in unique
namespace (bsc#1254235).
* selftests/net: convert test_vxlan_vnifiltering.sh to run it in unique
namespace (bsc#1255349).
* selftests/net: convert vrf_route_leaking.sh to run it in unique namespace
(bsc#1255349).
* selftests/net: synchronize udpgro tests' tx and rx connection (bsc#1254235).
* selftests: Introduce Makefile variable to list shared bash scripts
(bsc#1254235).
* selftests: bonding: Add net/forwarding/lib.sh to TEST_INCLUDES
(bsc#1254235).
* selftests: dsa: Replace test symlinks by wrapper script (bsc#1254235).
* selftests: net: Remove executable bits from library scripts (bsc#1254235).
* selftests: net: explicitly wait for listener ready (bsc#1254235).
* selftests: net: fib-onlink-tests: Set high metric for default IPv6 route
(bsc#1255346).
* selftests: net: include forwarding lib (bsc#1254235).
* selftests: net: included needed helper in the install targets (bsc#1254235).
* selftests: net: more strict check in net_helper (bsc#1254235).
* selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349).
* selftests: net: use slowwait to stabilize vrf_route_leaking test
(bsc#1255349).
* selftests: net: veth: test the ability to independently manipulate GRO and
XDP (bsc#1255101).
* selftests: team: Add shared library scripts to TEST_INCLUDES (bsc#1254235).
* selftests: vrf_route_leaking: remove ipv6_ping_frag from default testing
(bsc#1255349).
* serial: add support of CPCI cards (stable-fixes).
* serial: amba-pl011: prefer dma_mapping_error() over explicit address
checking (git-fixes).
* serial: core: Fix serial device initialization (git-fixes).
* serial: core: Restore sysfs fwnode information (git-fixes).
* serial: sprd: Return -EPROBE_DEFER when uart clock is not ready (stable-
fixes).
* slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-
fixes).
* smc91x: fix broken irq-context in PREEMPT_RT (git-fixes).
* soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
* soc: amlogic: canvas: fix device leak on lookup (git-fixes).
* soc: qcom: ocmem: fix device leak on lookup (git-fixes).
* soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-
fixes).
* spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).
* spi: bcm63xx: drop wrong casts in probe() (git-fixes).
* spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-
fixes).
* spi: fsl-cpm: Check length parity before switching to 16 bit mode (git-
fixes).
* spi: imx: keep dma request disabled before dma transfer setup (stable-
fixes).
* spi: tegra210-qspi: Remove cache operations (git-fixes).
* spi: tegra210-quad: Add support for internal DMA (git-fixes).
* spi: tegra210-quad: Check hardware status on timeout (bsc#1253155).
* spi: tegra210-quad: Fix timeout handling (bsc#1253155).
* spi: tegra210-quad: Fix timeout handling (git-fixes).
* spi: tegra210-quad: Refactor error handling into helper functions
(bsc#1253155).
* spi: tegra210-quad: Update dummy sequence configuration (git-fixes).
* spi: xilinx: increase number of retries before declaring stall (stable-
fixes).
* staging: fbtft: core: fix potential memory leak in fbtft_probe_common()
(git-fixes).
* staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing
(stable-fixes).
* staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser (stable-
fixes).
* thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).
* tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477).
* tracing: Fix access to trace_event_file (bsc#1254373).
* uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe
(git-fixes).
* usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).
* usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).
* usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).
* usb: dwc2: disable platform lowlevel hw resources during shutdown (stable-
fixes).
* usb: dwc2: fix hang during shutdown if set as peripheral (git-fixes).
* usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).
* usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).
* usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call
paths (git-fixes).
* usb: dwc3: keep susphy enabled during exit to avoid controller faults (git-
fixes).
* usb: dwc3: of-simple: fix clock resource leak in dwc3_of_simple_probe (git-
fixes).
* usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).
* usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).
* usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
* usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).
* usb: gadget: lpc32xx_udc: fix clock imbalance in error path (git-fixes).
* usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-
fixes).
* usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt
(git-fixes).
* usb: ohci-nxp: Use helper function devm_clk_get_enabled() (stable-fixes).
* usb: ohci-nxp: fix device leak on probe failure (git-fixes).
* usb: phy: Initialize struct usb_phy list_head (git-fixes).
* usb: phy: isp1301: fix non-OF device reference imbalance (git-fixes).
* usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).
* usb: raw-gadget: do not limit transfer length (git-fixes).
* usb: renesas_usbhs: Fix a resource leak in usbhs_pipe_malloc() (git-fixes).
* usb: storage: Fix memory leak in USB bulk transport (git-fixes).
* usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).
* usb: typec: tipd: Clear interrupts first (git-fixes).
* usb: typec: ucsi: Handle incorrect num_connectors capability (stable-fixes).
* usb: typec: ucsi: psy: Set max current to zero when disconnected (git-
fixes).
* usb: uas: fix urb unmapping issue when the uas device is remove during
ongoing data transfer (git-fixes).
* usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).
* usb: usb-storage: Maintain minimal modifications to the bcdDevice range
(git-fixes).
* usb: usb-storage: No additional quirks need to be added to the EL-R12
optical drive (stable-fixes).
* usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
* usb: xhci: limit run_graceperiod for only usb 3.0 devices (stable-fixes).
* usbip: Fix locking bug in RT-enabled kernels (stable-fixes).
* via_wdt: fix critical boot hang due to unnamed resource allocation (stable-
fixes).
* virtio_console: fix order of fields cols and rows (stable-fixes).
* watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).
* wifi: ath10k: Add missing include of export.h (stable-fixes).
* wifi: ath10k: Avoid vdev delete timeout when firmware is already down
(stable-fixes).
* wifi: ath10k: move recovery check logic into a new work (git-fixes).
* wifi: ath11k: fix peer HE MCS assignment (git-fixes).
* wifi: ath11k: restore register window after global reset (git-fixes).
* wifi: ath12k: fix potential memory leak in ath12k_wow_arp_ns_offload() (git-
fixes).
* wifi: avoid kernel-infoleak from struct iw_point (git-fixes).
* wifi: brcmfmac: Add DMI nvram filename quirk for Acer A1 840 tablet (stable-
fixes).
* wifi: cfg80211: sme: store capped length in __cfg80211_connect_result()
(git-fixes).
* wifi: cfg80211: stop radar detection in cfg80211_leave() (stable-fixes).
* wifi: cfg80211: use cfg80211_leave() in iftype change (stable-fixes).
* wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-
fixes).
* wifi: ieee80211: correct FILS status codes (git-fixes).
* wifi: mac80211: do not use old MBSSID elements (git-fixes).
* wifi: mac80211: fix CMAC functions not handling errors (git-fixes).
* wifi: mac80211: restore non-chanctx injection behaviour (git-fixes).
* wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).
* wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (stable-
fixes).
* wifi: mt76: mt7925: fix the unfinished command of regd_notifier before
suspend (stable-fixes).
* wifi: mt76: mt792x: fix wifi init fail by setting MCU_RUNNING after CLC load
(stable-fixes).
* wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-
fixes).
* wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-
fixes).
* wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()
(git-fixes).
* wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() (git-
fixes).
* wifi: rtw88: Add USB ID 2001:3329 for D-Link AC13U rev. A1 (stable-fixes).
* wifi: rtw88: limit indirect IO under powered off for RTL8822CS (git-fixes).
* x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-
fixes).
* x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).
* x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).
* x86/microcode/AMD: Add more known models to entry sign checking
(bsc#1256528).
* x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).
* x86/microcode/AMD: Clean the cache if update did not load microcode
(bsc#1256528).
* x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any
unreleased standalone Zen5 microcode patches (bsc#1256528).
* x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo
(bsc#1256528).
* x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).
* x86/microcode/AMD: Limit Entrysign signature checking to known generations
(bsc#1256528).
* x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).
* x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).
* x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).
* x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).
* xhci: dbgtty: fix device unregister (git-fixes).
* xhci: fix stale flag preventig URBs after link state error is cleared (git-
fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP7
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-278=1
* SUSE Real Time Module 15-SP7
zypper in -t patch SUSE-SLE-Module-RT-15-SP7-2026-278=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP7 (x86_64)
* kernel-livepatch-6_4_0-150700_7_28-rt-debuginfo-1-150700.1.3.1
* kernel-livepatch-6_4_0-150700_7_28-rt-1-150700.1.3.1
* kernel-livepatch-SLE15-SP7-RT_Update_8-debugsource-1-150700.1.3.1
* SUSE Real Time Module 15-SP7 (x86_64)
* cluster-md-kmp-rt-debuginfo-6.4.0-150700.7.28.1
* kernel-syms-rt-6.4.0-150700.7.28.1
* ocfs2-kmp-rt-6.4.0-150700.7.28.1
* kernel-rt-devel-6.4.0-150700.7.28.1
* kernel-rt-debuginfo-6.4.0-150700.7.28.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150700.7.28.1
* dlm-kmp-rt-debuginfo-6.4.0-150700.7.28.1
* cluster-md-kmp-rt-6.4.0-150700.7.28.1
* gfs2-kmp-rt-6.4.0-150700.7.28.1
* gfs2-kmp-rt-debuginfo-6.4.0-150700.7.28.1
* kernel-rt-debugsource-6.4.0-150700.7.28.1
* kernel-rt-devel-debuginfo-6.4.0-150700.7.28.1
* dlm-kmp-rt-6.4.0-150700.7.28.1
* SUSE Real Time Module 15-SP7 (noarch)
* kernel-devel-rt-6.4.0-150700.7.28.1
* kernel-source-rt-6.4.0-150700.7.28.1
* SUSE Real Time Module 15-SP7 (nosrc x86_64)
* kernel-rt-6.4.0-150700.7.28.1
## References:
* https://www.suse.com/security/cve/CVE-2023-42752.html
* https://www.suse.com/security/cve/CVE-2023-53743.html
* https://www.suse.com/security/cve/CVE-2023-53750.html
* https://www.suse.com/security/cve/CVE-2023-53752.html
* https://www.suse.com/security/cve/CVE-2023-53759.html
* https://www.suse.com/security/cve/CVE-2023-53762.html
* https://www.suse.com/security/cve/CVE-2023-53766.html
* https://www.suse.com/security/cve/CVE-2023-53768.html
* https://www.suse.com/security/cve/CVE-2023-53777.html
* https://www.suse.com/security/cve/CVE-2023-53778.html
* https://www.suse.com/security/cve/CVE-2023-53782.html
* https://www.suse.com/security/cve/CVE-2023-53784.html
* https://www.suse.com/security/cve/CVE-2023-53785.html
* https://www.suse.com/security/cve/CVE-2023-53787.html
* https://www.suse.com/security/cve/CVE-2023-53791.html
* https://www.suse.com/security/cve/CVE-2023-53792.html
* https://www.suse.com/security/cve/CVE-2023-53793.html
* https://www.suse.com/security/cve/CVE-2023-53794.html
* https://www.suse.com/security/cve/CVE-2023-53795.html
* https://www.suse.com/security/cve/CVE-2023-53797.html
* https://www.suse.com/security/cve/CVE-2023-53799.html
* https://www.suse.com/security/cve/CVE-2023-53807.html
* https://www.suse.com/security/cve/CVE-2023-53808.html
* https://www.suse.com/security/cve/CVE-2023-53813.html
* https://www.suse.com/security/cve/CVE-2023-53815.html
* https://www.suse.com/security/cve/CVE-2023-53819.html
* https://www.suse.com/security/cve/CVE-2023-53821.html
* https://www.suse.com/security/cve/CVE-2023-53823.html
* https://www.suse.com/security/cve/CVE-2023-53825.html
* https://www.suse.com/security/cve/CVE-2023-53828.html
* https://www.suse.com/security/cve/CVE-2023-53831.html
* https://www.suse.com/security/cve/CVE-2023-53834.html
* https://www.suse.com/security/cve/CVE-2023-53836.html
* https://www.suse.com/security/cve/CVE-2023-53839.html
* https://www.suse.com/security/cve/CVE-2023-53841.html
* https://www.suse.com/security/cve/CVE-2023-53842.html
* https://www.suse.com/security/cve/CVE-2023-53843.html
* https://www.suse.com/security/cve/CVE-2023-53844.html
* https://www.suse.com/security/cve/CVE-2023-53846.html
* https://www.suse.com/security/cve/CVE-2023-53847.html
* https://www.suse.com/security/cve/CVE-2023-53848.html
* https://www.suse.com/security/cve/CVE-2023-53850.html
* https://www.suse.com/security/cve/CVE-2023-53851.html
* https://www.suse.com/security/cve/CVE-2023-53852.html
* https://www.suse.com/security/cve/CVE-2023-53855.html
* https://www.suse.com/security/cve/CVE-2023-53856.html
* https://www.suse.com/security/cve/CVE-2023-53857.html
* https://www.suse.com/security/cve/CVE-2023-53858.html
* https://www.suse.com/security/cve/CVE-2023-53860.html
* https://www.suse.com/security/cve/CVE-2023-53861.html
* https://www.suse.com/security/cve/CVE-2023-53863.html
* https://www.suse.com/security/cve/CVE-2023-53864.html
* https://www.suse.com/security/cve/CVE-2023-53865.html
* https://www.suse.com/security/cve/CVE-2023-53989.html
* https://www.suse.com/security/cve/CVE-2023-53992.html
* https://www.suse.com/security/cve/CVE-2023-53994.html
* https://www.suse.com/security/cve/CVE-2023-53995.html
* https://www.suse.com/security/cve/CVE-2023-53996.html
* https://www.suse.com/security/cve/CVE-2023-53997.html
* https://www.suse.com/security/cve/CVE-2023-53998.html
* https://www.suse.com/security/cve/CVE-2023-53999.html
* https://www.suse.com/security/cve/CVE-2023-54000.html
* https://www.suse.com/security/cve/CVE-2023-54001.html
* https://www.suse.com/security/cve/CVE-2023-54005.html
* https://www.suse.com/security/cve/CVE-2023-54006.html
* https://www.suse.com/security/cve/CVE-2023-54008.html
* https://www.suse.com/security/cve/CVE-2023-54014.html
* https://www.suse.com/security/cve/CVE-2023-54016.html
* https://www.suse.com/security/cve/CVE-2023-54017.html
* https://www.suse.com/security/cve/CVE-2023-54019.html
* https://www.suse.com/security/cve/CVE-2023-54022.html
* https://www.suse.com/security/cve/CVE-2023-54023.html
* https://www.suse.com/security/cve/CVE-2023-54025.html
* https://www.suse.com/security/cve/CVE-2023-54026.html
* https://www.suse.com/security/cve/CVE-2023-54027.html
* https://www.suse.com/security/cve/CVE-2023-54030.html
* https://www.suse.com/security/cve/CVE-2023-54031.html
* https://www.suse.com/security/cve/CVE-2023-54032.html
* https://www.suse.com/security/cve/CVE-2023-54035.html
* https://www.suse.com/security/cve/CVE-2023-54037.html
* https://www.suse.com/security/cve/CVE-2023-54038.html
* https://www.suse.com/security/cve/CVE-2023-54042.html
* https://www.suse.com/security/cve/CVE-2023-54045.html
* https://www.suse.com/security/cve/CVE-2023-54048.html
* https://www.suse.com/security/cve/CVE-2023-54049.html
* https://www.suse.com/security/cve/CVE-2023-54051.html
* https://www.suse.com/security/cve/CVE-2023-54052.html
* https://www.suse.com/security/cve/CVE-2023-54060.html
* https://www.suse.com/security/cve/CVE-2023-54064.html
* https://www.suse.com/security/cve/CVE-2023-54066.html
* https://www.suse.com/security/cve/CVE-2023-54067.html
* https://www.suse.com/security/cve/CVE-2023-54069.html
* https://www.suse.com/security/cve/CVE-2023-54070.html
* https://www.suse.com/security/cve/CVE-2023-54072.html
* https://www.suse.com/security/cve/CVE-2023-54076.html
* https://www.suse.com/security/cve/CVE-2023-54080.html
* https://www.suse.com/security/cve/CVE-2023-54081.html
* https://www.suse.com/security/cve/CVE-2023-54083.html
* https://www.suse.com/security/cve/CVE-2023-54088.html
* https://www.suse.com/security/cve/CVE-2023-54089.html
* https://www.suse.com/security/cve/CVE-2023-54091.html
* https://www.suse.com/security/cve/CVE-2023-54092.html
* https://www.suse.com/security/cve/CVE-2023-54093.html
* https://www.suse.com/security/cve/CVE-2023-54094.html
* https://www.suse.com/security/cve/CVE-2023-54095.html
* https://www.suse.com/security/cve/CVE-2023-54096.html
* https://www.suse.com/security/cve/CVE-2023-54099.html
* https://www.suse.com/security/cve/CVE-2023-54101.html
* https://www.suse.com/security/cve/CVE-2023-54104.html
* https://www.suse.com/security/cve/CVE-2023-54106.html
* https://www.suse.com/security/cve/CVE-2023-54112.html
* https://www.suse.com/security/cve/CVE-2023-54113.html
* https://www.suse.com/security/cve/CVE-2023-54115.html
* https://www.suse.com/security/cve/CVE-2023-54117.html
* https://www.suse.com/security/cve/CVE-2023-54121.html
* https://www.suse.com/security/cve/CVE-2023-54125.html
* https://www.suse.com/security/cve/CVE-2023-54127.html
* https://www.suse.com/security/cve/CVE-2023-54133.html
* https://www.suse.com/security/cve/CVE-2023-54134.html
* https://www.suse.com/security/cve/CVE-2023-54135.html
* https://www.suse.com/security/cve/CVE-2023-54136.html
* https://www.suse.com/security/cve/CVE-2023-54137.html
* https://www.suse.com/security/cve/CVE-2023-54140.html
* https://www.suse.com/security/cve/CVE-2023-54141.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2023-54143.html
* https://www.suse.com/security/cve/CVE-2023-54145.html
* https://www.suse.com/security/cve/CVE-2023-54148.html
* https://www.suse.com/security/cve/CVE-2023-54149.html
* https://www.suse.com/security/cve/CVE-2023-54153.html
* https://www.suse.com/security/cve/CVE-2023-54154.html
* https://www.suse.com/security/cve/CVE-2023-54155.html
* https://www.suse.com/security/cve/CVE-2023-54156.html
* https://www.suse.com/security/cve/CVE-2023-54164.html
* https://www.suse.com/security/cve/CVE-2023-54166.html
* https://www.suse.com/security/cve/CVE-2023-54169.html
* https://www.suse.com/security/cve/CVE-2023-54170.html
* https://www.suse.com/security/cve/CVE-2023-54171.html
* https://www.suse.com/security/cve/CVE-2023-54172.html
* https://www.suse.com/security/cve/CVE-2023-54173.html
* https://www.suse.com/security/cve/CVE-2023-54177.html
* https://www.suse.com/security/cve/CVE-2023-54178.html
* https://www.suse.com/security/cve/CVE-2023-54179.html
* https://www.suse.com/security/cve/CVE-2023-54181.html
* https://www.suse.com/security/cve/CVE-2023-54183.html
* https://www.suse.com/security/cve/CVE-2023-54185.html
* https://www.suse.com/security/cve/CVE-2023-54189.html
* https://www.suse.com/security/cve/CVE-2023-54194.html
* https://www.suse.com/security/cve/CVE-2023-54201.html
* https://www.suse.com/security/cve/CVE-2023-54204.html
* https://www.suse.com/security/cve/CVE-2023-54207.html
* https://www.suse.com/security/cve/CVE-2023-54209.html
* https://www.suse.com/security/cve/CVE-2023-54210.html
* https://www.suse.com/security/cve/CVE-2023-54211.html
* https://www.suse.com/security/cve/CVE-2023-54215.html
* https://www.suse.com/security/cve/CVE-2023-54219.html
* https://www.suse.com/security/cve/CVE-2023-54220.html
* https://www.suse.com/security/cve/CVE-2023-54221.html
* https://www.suse.com/security/cve/CVE-2023-54223.html
* https://www.suse.com/security/cve/CVE-2023-54224.html
* https://www.suse.com/security/cve/CVE-2023-54225.html
* https://www.suse.com/security/cve/CVE-2023-54227.html
* https://www.suse.com/security/cve/CVE-2023-54229.html
* https://www.suse.com/security/cve/CVE-2023-54230.html
* https://www.suse.com/security/cve/CVE-2023-54235.html
* https://www.suse.com/security/cve/CVE-2023-54240.html
* https://www.suse.com/security/cve/CVE-2023-54241.html
* https://www.suse.com/security/cve/CVE-2023-54246.html
* https://www.suse.com/security/cve/CVE-2023-54247.html
* https://www.suse.com/security/cve/CVE-2023-54251.html
* https://www.suse.com/security/cve/CVE-2023-54253.html
* https://www.suse.com/security/cve/CVE-2023-54254.html
* https://www.suse.com/security/cve/CVE-2023-54255.html
* https://www.suse.com/security/cve/CVE-2023-54258.html
* https://www.suse.com/security/cve/CVE-2023-54261.html
* https://www.suse.com/security/cve/CVE-2023-54263.html
* https://www.suse.com/security/cve/CVE-2023-54264.html
* https://www.suse.com/security/cve/CVE-2023-54266.html
* https://www.suse.com/security/cve/CVE-2023-54267.html
* https://www.suse.com/security/cve/CVE-2023-54271.html
* https://www.suse.com/security/cve/CVE-2023-54276.html
* https://www.suse.com/security/cve/CVE-2023-54278.html
* https://www.suse.com/security/cve/CVE-2023-54281.html
* https://www.suse.com/security/cve/CVE-2023-54282.html
* https://www.suse.com/security/cve/CVE-2023-54283.html
* https://www.suse.com/security/cve/CVE-2023-54285.html
* https://www.suse.com/security/cve/CVE-2023-54289.html
* https://www.suse.com/security/cve/CVE-2023-54291.html
* https://www.suse.com/security/cve/CVE-2023-54292.html
* https://www.suse.com/security/cve/CVE-2023-54293.html
* https://www.suse.com/security/cve/CVE-2023-54296.html
* https://www.suse.com/security/cve/CVE-2023-54297.html
* https://www.suse.com/security/cve/CVE-2023-54299.html
* https://www.suse.com/security/cve/CVE-2023-54300.html
* https://www.suse.com/security/cve/CVE-2023-54302.html
* https://www.suse.com/security/cve/CVE-2023-54303.html
* https://www.suse.com/security/cve/CVE-2023-54304.html
* https://www.suse.com/security/cve/CVE-2023-54309.html
* https://www.suse.com/security/cve/CVE-2023-54312.html
* https://www.suse.com/security/cve/CVE-2023-54313.html
* https://www.suse.com/security/cve/CVE-2023-54314.html
* https://www.suse.com/security/cve/CVE-2023-54315.html
* https://www.suse.com/security/cve/CVE-2023-54316.html
* https://www.suse.com/security/cve/CVE-2023-54318.html
* https://www.suse.com/security/cve/CVE-2023-54319.html
* https://www.suse.com/security/cve/CVE-2023-54322.html
* https://www.suse.com/security/cve/CVE-2023-54324.html
* https://www.suse.com/security/cve/CVE-2023-54326.html
* https://www.suse.com/security/cve/CVE-2024-26944.html
* https://www.suse.com/security/cve/CVE-2025-38321.html
* https://www.suse.com/security/cve/CVE-2025-38728.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-40006.html
* https://www.suse.com/security/cve/CVE-2025-40024.html
* https://www.suse.com/security/cve/CVE-2025-40033.html
* https://www.suse.com/security/cve/CVE-2025-40042.html
* https://www.suse.com/security/cve/CVE-2025-40053.html
* https://www.suse.com/security/cve/CVE-2025-40081.html
* https://www.suse.com/security/cve/CVE-2025-40102.html
* https://www.suse.com/security/cve/CVE-2025-40123.html
* https://www.suse.com/security/cve/CVE-2025-40134.html
* https://www.suse.com/security/cve/CVE-2025-40135.html
* https://www.suse.com/security/cve/CVE-2025-40153.html
* https://www.suse.com/security/cve/CVE-2025-40158.html
* https://www.suse.com/security/cve/CVE-2025-40160.html
* https://www.suse.com/security/cve/CVE-2025-40167.html
* https://www.suse.com/security/cve/CVE-2025-40170.html
* https://www.suse.com/security/cve/CVE-2025-40178.html
* https://www.suse.com/security/cve/CVE-2025-40179.html
* https://www.suse.com/security/cve/CVE-2025-40187.html
* https://www.suse.com/security/cve/CVE-2025-40190.html
* https://www.suse.com/security/cve/CVE-2025-40211.html
* https://www.suse.com/security/cve/CVE-2025-40213.html
* https://www.suse.com/security/cve/CVE-2025-40215.html
* https://www.suse.com/security/cve/CVE-2025-40219.html
* https://www.suse.com/security/cve/CVE-2025-40220.html
* https://www.suse.com/security/cve/CVE-2025-40223.html
* https://www.suse.com/security/cve/CVE-2025-40225.html
* https://www.suse.com/security/cve/CVE-2025-40231.html
* https://www.suse.com/security/cve/CVE-2025-40233.html
* https://www.suse.com/security/cve/CVE-2025-40240.html
* https://www.suse.com/security/cve/CVE-2025-40242.html
* https://www.suse.com/security/cve/CVE-2025-40244.html
* https://www.suse.com/security/cve/CVE-2025-40248.html
* https://www.suse.com/security/cve/CVE-2025-40250.html
* https://www.suse.com/security/cve/CVE-2025-40251.html
* https://www.suse.com/security/cve/CVE-2025-40252.html
* https://www.suse.com/security/cve/CVE-2025-40256.html
* https://www.suse.com/security/cve/CVE-2025-40258.html
* https://www.suse.com/security/cve/CVE-2025-40262.html
* https://www.suse.com/security/cve/CVE-2025-40263.html
* https://www.suse.com/security/cve/CVE-2025-40268.html
* https://www.suse.com/security/cve/CVE-2025-40269.html
* https://www.suse.com/security/cve/CVE-2025-40271.html
* https://www.suse.com/security/cve/CVE-2025-40272.html
* https://www.suse.com/security/cve/CVE-2025-40273.html
* https://www.suse.com/security/cve/CVE-2025-40274.html
* https://www.suse.com/security/cve/CVE-2025-40275.html
* https://www.suse.com/security/cve/CVE-2025-40276.html
* https://www.suse.com/security/cve/CVE-2025-40277.html
* https://www.suse.com/security/cve/CVE-2025-40278.html
* https://www.suse.com/security/cve/CVE-2025-40279.html
* https://www.suse.com/security/cve/CVE-2025-40280.html
* https://www.suse.com/security/cve/CVE-2025-40282.html
* https://www.suse.com/security/cve/CVE-2025-40283.html
* https://www.suse.com/security/cve/CVE-2025-40284.html
* https://www.suse.com/security/cve/CVE-2025-40287.html
* https://www.suse.com/security/cve/CVE-2025-40288.html
* https://www.suse.com/security/cve/CVE-2025-40289.html
* https://www.suse.com/security/cve/CVE-2025-40292.html
* https://www.suse.com/security/cve/CVE-2025-40293.html
* https://www.suse.com/security/cve/CVE-2025-40294.html
* https://www.suse.com/security/cve/CVE-2025-40297.html
* https://www.suse.com/security/cve/CVE-2025-40301.html
* https://www.suse.com/security/cve/CVE-2025-40302.html
* https://www.suse.com/security/cve/CVE-2025-40304.html
* https://www.suse.com/security/cve/CVE-2025-40306.html
* https://www.suse.com/security/cve/CVE-2025-40307.html
* https://www.suse.com/security/cve/CVE-2025-40308.html
* https://www.suse.com/security/cve/CVE-2025-40309.html
* https://www.suse.com/security/cve/CVE-2025-40310.html
* https://www.suse.com/security/cve/CVE-2025-40311.html
* https://www.suse.com/security/cve/CVE-2025-40312.html
* https://www.suse.com/security/cve/CVE-2025-40314.html
* https://www.suse.com/security/cve/CVE-2025-40315.html
* https://www.suse.com/security/cve/CVE-2025-40316.html
* https://www.suse.com/security/cve/CVE-2025-40317.html
* https://www.suse.com/security/cve/CVE-2025-40318.html
* https://www.suse.com/security/cve/CVE-2025-40319.html
* https://www.suse.com/security/cve/CVE-2025-40320.html
* https://www.suse.com/security/cve/CVE-2025-40321.html
* https://www.suse.com/security/cve/CVE-2025-40322.html
* https://www.suse.com/security/cve/CVE-2025-40323.html
* https://www.suse.com/security/cve/CVE-2025-40324.html
* https://www.suse.com/security/cve/CVE-2025-40329.html
* https://www.suse.com/security/cve/CVE-2025-40330.html
* https://www.suse.com/security/cve/CVE-2025-40331.html
* https://www.suse.com/security/cve/CVE-2025-40332.html
* https://www.suse.com/security/cve/CVE-2025-40337.html
* https://www.suse.com/security/cve/CVE-2025-40338.html
* https://www.suse.com/security/cve/CVE-2025-40339.html
* https://www.suse.com/security/cve/CVE-2025-40340.html
* https://www.suse.com/security/cve/CVE-2025-40342.html
* https://www.suse.com/security/cve/CVE-2025-40343.html
* https://www.suse.com/security/cve/CVE-2025-40345.html
* https://www.suse.com/security/cve/CVE-2025-40346.html
* https://www.suse.com/security/cve/CVE-2025-40347.html
* https://www.suse.com/security/cve/CVE-2025-40349.html
* https://www.suse.com/security/cve/CVE-2025-40351.html
* https://www.suse.com/security/cve/CVE-2025-40354.html
* https://www.suse.com/security/cve/CVE-2025-40357.html
* https://www.suse.com/security/cve/CVE-2025-40359.html
* https://www.suse.com/security/cve/CVE-2025-40360.html
* https://www.suse.com/security/cve/CVE-2025-68168.html
* https://www.suse.com/security/cve/CVE-2025-68170.html
* https://www.suse.com/security/cve/CVE-2025-68172.html
* https://www.suse.com/security/cve/CVE-2025-68176.html
* https://www.suse.com/security/cve/CVE-2025-68180.html
* https://www.suse.com/security/cve/CVE-2025-68181.html
* https://www.suse.com/security/cve/CVE-2025-68183.html
* https://www.suse.com/security/cve/CVE-2025-68184.html
* https://www.suse.com/security/cve/CVE-2025-68185.html
* https://www.suse.com/security/cve/CVE-2025-68190.html
* https://www.suse.com/security/cve/CVE-2025-68192.html
* https://www.suse.com/security/cve/CVE-2025-68194.html
* https://www.suse.com/security/cve/CVE-2025-68195.html
* https://www.suse.com/security/cve/CVE-2025-68197.html
* https://www.suse.com/security/cve/CVE-2025-68201.html
* https://www.suse.com/security/cve/CVE-2025-68204.html
* https://www.suse.com/security/cve/CVE-2025-68206.html
* https://www.suse.com/security/cve/CVE-2025-68207.html
* https://www.suse.com/security/cve/CVE-2025-68208.html
* https://www.suse.com/security/cve/CVE-2025-68209.html
* https://www.suse.com/security/cve/CVE-2025-68217.html
* https://www.suse.com/security/cve/CVE-2025-68218.html
* https://www.suse.com/security/cve/CVE-2025-68222.html
* https://www.suse.com/security/cve/CVE-2025-68223.html
* https://www.suse.com/security/cve/CVE-2025-68230.html
* https://www.suse.com/security/cve/CVE-2025-68233.html
* https://www.suse.com/security/cve/CVE-2025-68235.html
* https://www.suse.com/security/cve/CVE-2025-68237.html
* https://www.suse.com/security/cve/CVE-2025-68238.html
* https://www.suse.com/security/cve/CVE-2025-68239.html
* https://www.suse.com/security/cve/CVE-2025-68244.html
* https://www.suse.com/security/cve/CVE-2025-68249.html
* https://www.suse.com/security/cve/CVE-2025-68252.html
* https://www.suse.com/security/cve/CVE-2025-68255.html
* https://www.suse.com/security/cve/CVE-2025-68257.html
* https://www.suse.com/security/cve/CVE-2025-68258.html
* https://www.suse.com/security/cve/CVE-2025-68259.html
* https://www.suse.com/security/cve/CVE-2025-68264.html
* https://www.suse.com/security/cve/CVE-2025-68286.html
* https://www.suse.com/security/cve/CVE-2025-68287.html
* https://www.suse.com/security/cve/CVE-2025-68289.html
* https://www.suse.com/security/cve/CVE-2025-68290.html
* https://www.suse.com/security/cve/CVE-2025-68298.html
* https://www.suse.com/security/cve/CVE-2025-68302.html
* https://www.suse.com/security/cve/CVE-2025-68303.html
* https://www.suse.com/security/cve/CVE-2025-68305.html
* https://www.suse.com/security/cve/CVE-2025-68306.html
* https://www.suse.com/security/cve/CVE-2025-68307.html
* https://www.suse.com/security/cve/CVE-2025-68308.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-68313.html
* https://www.suse.com/security/cve/CVE-2025-68328.html
* https://www.suse.com/security/cve/CVE-2025-68330.html
* https://www.suse.com/security/cve/CVE-2025-68331.html
* https://www.suse.com/security/cve/CVE-2025-68332.html
* https://www.suse.com/security/cve/CVE-2025-68335.html
* https://www.suse.com/security/cve/CVE-2025-68339.html
* https://www.suse.com/security/cve/CVE-2025-68340.html
* https://www.suse.com/security/cve/CVE-2025-68345.html
* https://www.suse.com/security/cve/CVE-2025-68346.html
* https://www.suse.com/security/cve/CVE-2025-68347.html
* https://www.suse.com/security/cve/CVE-2025-68351.html
* https://www.suse.com/security/cve/CVE-2025-68354.html
* https://www.suse.com/security/cve/CVE-2025-68362.html
* https://www.suse.com/security/cve/CVE-2025-68378.html
* https://www.suse.com/security/cve/CVE-2025-68380.html
* https://www.suse.com/security/cve/CVE-2025-68724.html
* https://www.suse.com/security/cve/CVE-2025-68732.html
* https://www.suse.com/security/cve/CVE-2025-68734.html
* https://www.suse.com/security/cve/CVE-2025-68740.html
* https://www.suse.com/security/cve/CVE-2025-68742.html
* https://www.suse.com/security/cve/CVE-2025-68744.html
* https://www.suse.com/security/cve/CVE-2025-68746.html
* https://www.suse.com/security/cve/CVE-2025-68747.html
* https://www.suse.com/security/cve/CVE-2025-68749.html
* https://www.suse.com/security/cve/CVE-2025-68750.html
* https://www.suse.com/security/cve/CVE-2025-68753.html
* https://www.suse.com/security/cve/CVE-2025-68757.html
* https://www.suse.com/security/cve/CVE-2025-68758.html
* https://www.suse.com/security/cve/CVE-2025-68759.html
* https://www.suse.com/security/cve/CVE-2025-68765.html
* https://www.suse.com/security/cve/CVE-2025-68766.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1205462
* https://bugzilla.suse.com/show_bug.cgi?id=1214285
* https://bugzilla.suse.com/show_bug.cgi?id=1214635
* https://bugzilla.suse.com/show_bug.cgi?id=1214847
* https://bugzilla.suse.com/show_bug.cgi?id=1215146
* https://bugzilla.suse.com/show_bug.cgi?id=1215211
* https://bugzilla.suse.com/show_bug.cgi?id=1215344
* https://bugzilla.suse.com/show_bug.cgi?id=1216062
* https://bugzilla.suse.com/show_bug.cgi?id=1216436
* https://bugzilla.suse.com/show_bug.cgi?id=1219165
* https://bugzilla.suse.com/show_bug.cgi?id=1220419
* https://bugzilla.suse.com/show_bug.cgi?id=1223731
* https://bugzilla.suse.com/show_bug.cgi?id=1232223
* https://bugzilla.suse.com/show_bug.cgi?id=1234163
* https://bugzilla.suse.com/show_bug.cgi?id=1243112
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1245449
* https://bugzilla.suse.com/show_bug.cgi?id=1246328
* https://bugzilla.suse.com/show_bug.cgi?id=1247500
* https://bugzilla.suse.com/show_bug.cgi?id=1248886
* https://bugzilla.suse.com/show_bug.cgi?id=1249256
* https://bugzilla.suse.com/show_bug.cgi?id=1251752
* https://bugzilla.suse.com/show_bug.cgi?id=1252046
* https://bugzilla.suse.com/show_bug.cgi?id=1252342
* https://bugzilla.suse.com/show_bug.cgi?id=1252686
* https://bugzilla.suse.com/show_bug.cgi?id=1252776
* https://bugzilla.suse.com/show_bug.cgi?id=1252808
* https://bugzilla.suse.com/show_bug.cgi?id=1252824
* https://bugzilla.suse.com/show_bug.cgi?id=1252861
* https://bugzilla.suse.com/show_bug.cgi?id=1252919
* https://bugzilla.suse.com/show_bug.cgi?id=1252973
* https://bugzilla.suse.com/show_bug.cgi?id=1253155
* https://bugzilla.suse.com/show_bug.cgi?id=1253262
* https://bugzilla.suse.com/show_bug.cgi?id=1253342
* https://bugzilla.suse.com/show_bug.cgi?id=1253365
* https://bugzilla.suse.com/show_bug.cgi?id=1253386
* https://bugzilla.suse.com/show_bug.cgi?id=1253400
* https://bugzilla.suse.com/show_bug.cgi?id=1253402
* https://bugzilla.suse.com/show_bug.cgi?id=1253408
* https://bugzilla.suse.com/show_bug.cgi?id=1253413
* https://bugzilla.suse.com/show_bug.cgi?id=1253442
* https://bugzilla.suse.com/show_bug.cgi?id=1253458
* https://bugzilla.suse.com/show_bug.cgi?id=1253463
* https://bugzilla.suse.com/show_bug.cgi?id=1253623
* https://bugzilla.suse.com/show_bug.cgi?id=1253647
* https://bugzilla.suse.com/show_bug.cgi?id=1253674
* https://bugzilla.suse.com/show_bug.cgi?id=1253739
* https://bugzilla.suse.com/show_bug.cgi?id=1254119
* https://bugzilla.suse.com/show_bug.cgi?id=1254126
* https://bugzilla.suse.com/show_bug.cgi?id=1254235
* https://bugzilla.suse.com/show_bug.cgi?id=1254244
* https://bugzilla.suse.com/show_bug.cgi?id=1254363
* https://bugzilla.suse.com/show_bug.cgi?id=1254373
* https://bugzilla.suse.com/show_bug.cgi?id=1254378
* https://bugzilla.suse.com/show_bug.cgi?id=1254477
* https://bugzilla.suse.com/show_bug.cgi?id=1254518
* https://bugzilla.suse.com/show_bug.cgi?id=1254520
* https://bugzilla.suse.com/show_bug.cgi?id=1254599
* https://bugzilla.suse.com/show_bug.cgi?id=1254606
* https://bugzilla.suse.com/show_bug.cgi?id=1254611
* https://bugzilla.suse.com/show_bug.cgi?id=1254613
* https://bugzilla.suse.com/show_bug.cgi?id=1254615
* https://bugzilla.suse.com/show_bug.cgi?id=1254616
* https://bugzilla.suse.com/show_bug.cgi?id=1254621
* https://bugzilla.suse.com/show_bug.cgi?id=1254623
* https://bugzilla.suse.com/show_bug.cgi?id=1254626
* https://bugzilla.suse.com/show_bug.cgi?id=1254648
* https://bugzilla.suse.com/show_bug.cgi?id=1254649
* https://bugzilla.suse.com/show_bug.cgi?id=1254653
* https://bugzilla.suse.com/show_bug.cgi?id=1254655
* https://bugzilla.suse.com/show_bug.cgi?id=1254657
* https://bugzilla.suse.com/show_bug.cgi?id=1254660
* https://bugzilla.suse.com/show_bug.cgi?id=1254661
* https://bugzilla.suse.com/show_bug.cgi?id=1254663
* https://bugzilla.suse.com/show_bug.cgi?id=1254669
* https://bugzilla.suse.com/show_bug.cgi?id=1254677
* https://bugzilla.suse.com/show_bug.cgi?id=1254678
* https://bugzilla.suse.com/show_bug.cgi?id=1254688
* https://bugzilla.suse.com/show_bug.cgi?id=1254690
* https://bugzilla.suse.com/show_bug.cgi?id=1254691
* https://bugzilla.suse.com/show_bug.cgi?id=1254693
* https://bugzilla.suse.com/show_bug.cgi?id=1254695
* https://bugzilla.suse.com/show_bug.cgi?id=1254698
* https://bugzilla.suse.com/show_bug.cgi?id=1254701
* https://bugzilla.suse.com/show_bug.cgi?id=1254704
* https://bugzilla.suse.com/show_bug.cgi?id=1254705
* https://bugzilla.suse.com/show_bug.cgi?id=1254707
* https://bugzilla.suse.com/show_bug.cgi?id=1254712
* https://bugzilla.suse.com/show_bug.cgi?id=1254715
* https://bugzilla.suse.com/show_bug.cgi?id=1254717
* https://bugzilla.suse.com/show_bug.cgi?id=1254723
* https://bugzilla.suse.com/show_bug.cgi?id=1254724
* https://bugzilla.suse.com/show_bug.cgi?id=1254732
* https://bugzilla.suse.com/show_bug.cgi?id=1254733
* https://bugzilla.suse.com/show_bug.cgi?id=1254737
* https://bugzilla.suse.com/show_bug.cgi?id=1254739
* https://bugzilla.suse.com/show_bug.cgi?id=1254742
* https://bugzilla.suse.com/show_bug.cgi?id=1254743
* https://bugzilla.suse.com/show_bug.cgi?id=1254749
* https://bugzilla.suse.com/show_bug.cgi?id=1254750
* https://bugzilla.suse.com/show_bug.cgi?id=1254753
* https://bugzilla.suse.com/show_bug.cgi?id=1254754
* https://bugzilla.suse.com/show_bug.cgi?id=1254758
* https://bugzilla.suse.com/show_bug.cgi?id=1254761
* https://bugzilla.suse.com/show_bug.cgi?id=1254762
* https://bugzilla.suse.com/show_bug.cgi?id=1254765
* https://bugzilla.suse.com/show_bug.cgi?id=1254782
* https://bugzilla.suse.com/show_bug.cgi?id=1254791
* https://bugzilla.suse.com/show_bug.cgi?id=1254793
* https://bugzilla.suse.com/show_bug.cgi?id=1254794
* https://bugzilla.suse.com/show_bug.cgi?id=1254795
* https://bugzilla.suse.com/show_bug.cgi?id=1254796
* https://bugzilla.suse.com/show_bug.cgi?id=1254797
* https://bugzilla.suse.com/show_bug.cgi?id=1254798
* https://bugzilla.suse.com/show_bug.cgi?id=1254813
* https://bugzilla.suse.com/show_bug.cgi?id=1254815
* https://bugzilla.suse.com/show_bug.cgi?id=1254824
* https://bugzilla.suse.com/show_bug.cgi?id=1254825
* https://bugzilla.suse.com/show_bug.cgi?id=1254827
* https://bugzilla.suse.com/show_bug.cgi?id=1254828
* https://bugzilla.suse.com/show_bug.cgi?id=1254829
* https://bugzilla.suse.com/show_bug.cgi?id=1254830
* https://bugzilla.suse.com/show_bug.cgi?id=1254832
* https://bugzilla.suse.com/show_bug.cgi?id=1254840
* https://bugzilla.suse.com/show_bug.cgi?id=1254843
* https://bugzilla.suse.com/show_bug.cgi?id=1254846
* https://bugzilla.suse.com/show_bug.cgi?id=1254847
* https://bugzilla.suse.com/show_bug.cgi?id=1254849
* https://bugzilla.suse.com/show_bug.cgi?id=1254850
* https://bugzilla.suse.com/show_bug.cgi?id=1254851
* https://bugzilla.suse.com/show_bug.cgi?id=1254854
* https://bugzilla.suse.com/show_bug.cgi?id=1254856
* https://bugzilla.suse.com/show_bug.cgi?id=1254858
* https://bugzilla.suse.com/show_bug.cgi?id=1254860
* https://bugzilla.suse.com/show_bug.cgi?id=1254864
* https://bugzilla.suse.com/show_bug.cgi?id=1254869
* https://bugzilla.suse.com/show_bug.cgi?id=1254894
* https://bugzilla.suse.com/show_bug.cgi?id=1254918
* https://bugzilla.suse.com/show_bug.cgi?id=1254957
* https://bugzilla.suse.com/show_bug.cgi?id=1254959
* https://bugzilla.suse.com/show_bug.cgi?id=1254983
* https://bugzilla.suse.com/show_bug.cgi?id=1254996
* https://bugzilla.suse.com/show_bug.cgi?id=1255005
* https://bugzilla.suse.com/show_bug.cgi?id=1255009
* https://bugzilla.suse.com/show_bug.cgi?id=1255025
* https://bugzilla.suse.com/show_bug.cgi?id=1255026
* https://bugzilla.suse.com/show_bug.cgi?id=1255030
* https://bugzilla.suse.com/show_bug.cgi?id=1255033
* https://bugzilla.suse.com/show_bug.cgi?id=1255034
* https://bugzilla.suse.com/show_bug.cgi?id=1255035
* https://bugzilla.suse.com/show_bug.cgi?id=1255039
* https://bugzilla.suse.com/show_bug.cgi?id=1255041
* https://bugzilla.suse.com/show_bug.cgi?id=1255042
* https://bugzilla.suse.com/show_bug.cgi?id=1255046
* https://bugzilla.suse.com/show_bug.cgi?id=1255057
* https://bugzilla.suse.com/show_bug.cgi?id=1255062
* https://bugzilla.suse.com/show_bug.cgi?id=1255064
* https://bugzilla.suse.com/show_bug.cgi?id=1255065
* https://bugzilla.suse.com/show_bug.cgi?id=1255068
* https://bugzilla.suse.com/show_bug.cgi?id=1255071
* https://bugzilla.suse.com/show_bug.cgi?id=1255072
* https://bugzilla.suse.com/show_bug.cgi?id=1255075
* https://bugzilla.suse.com/show_bug.cgi?id=1255077
* https://bugzilla.suse.com/show_bug.cgi?id=1255081
* https://bugzilla.suse.com/show_bug.cgi?id=1255082
* https://bugzilla.suse.com/show_bug.cgi?id=1255083
* https://bugzilla.suse.com/show_bug.cgi?id=1255085
* https://bugzilla.suse.com/show_bug.cgi?id=1255087
* https://bugzilla.suse.com/show_bug.cgi?id=1255092
* https://bugzilla.suse.com/show_bug.cgi?id=1255094
* https://bugzilla.suse.com/show_bug.cgi?id=1255095
* https://bugzilla.suse.com/show_bug.cgi?id=1255097
* https://bugzilla.suse.com/show_bug.cgi?id=1255100
* https://bugzilla.suse.com/show_bug.cgi?id=1255101
* https://bugzilla.suse.com/show_bug.cgi?id=1255116
* https://bugzilla.suse.com/show_bug.cgi?id=1255121
* https://bugzilla.suse.com/show_bug.cgi?id=1255122
* https://bugzilla.suse.com/show_bug.cgi?id=1255124
* https://bugzilla.suse.com/show_bug.cgi?id=1255131
* https://bugzilla.suse.com/show_bug.cgi?id=1255134
* https://bugzilla.suse.com/show_bug.cgi?id=1255135
* https://bugzilla.suse.com/show_bug.cgi?id=1255136
* https://bugzilla.suse.com/show_bug.cgi?id=1255142
* https://bugzilla.suse.com/show_bug.cgi?id=1255145
* https://bugzilla.suse.com/show_bug.cgi?id=1255146
* https://bugzilla.suse.com/show_bug.cgi?id=1255149
* https://bugzilla.suse.com/show_bug.cgi?id=1255152
* https://bugzilla.suse.com/show_bug.cgi?id=1255154
* https://bugzilla.suse.com/show_bug.cgi?id=1255155
* https://bugzilla.suse.com/show_bug.cgi?id=1255163
* https://bugzilla.suse.com/show_bug.cgi?id=1255167
* https://bugzilla.suse.com/show_bug.cgi?id=1255169
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255175
* https://bugzilla.suse.com/show_bug.cgi?id=1255179
* https://bugzilla.suse.com/show_bug.cgi?id=1255181
* https://bugzilla.suse.com/show_bug.cgi?id=1255182
* https://bugzilla.suse.com/show_bug.cgi?id=1255187
* https://bugzilla.suse.com/show_bug.cgi?id=1255190
* https://bugzilla.suse.com/show_bug.cgi?id=1255193
* https://bugzilla.suse.com/show_bug.cgi?id=1255196
* https://bugzilla.suse.com/show_bug.cgi?id=1255197
* https://bugzilla.suse.com/show_bug.cgi?id=1255199
* https://bugzilla.suse.com/show_bug.cgi?id=1255202
* https://bugzilla.suse.com/show_bug.cgi?id=1255203
* https://bugzilla.suse.com/show_bug.cgi?id=1255206
* https://bugzilla.suse.com/show_bug.cgi?id=1255209
* https://bugzilla.suse.com/show_bug.cgi?id=1255218
* https://bugzilla.suse.com/show_bug.cgi?id=1255220
* https://bugzilla.suse.com/show_bug.cgi?id=1255221
* https://bugzilla.suse.com/show_bug.cgi?id=1255224
* https://bugzilla.suse.com/show_bug.cgi?id=1255227
* https://bugzilla.suse.com/show_bug.cgi?id=1255230
* https://bugzilla.suse.com/show_bug.cgi?id=1255233
* https://bugzilla.suse.com/show_bug.cgi?id=1255234
* https://bugzilla.suse.com/show_bug.cgi?id=1255242
* https://bugzilla.suse.com/show_bug.cgi?id=1255245
* https://bugzilla.suse.com/show_bug.cgi?id=1255246
* https://bugzilla.suse.com/show_bug.cgi?id=1255247
* https://bugzilla.suse.com/show_bug.cgi?id=1255251
* https://bugzilla.suse.com/show_bug.cgi?id=1255252
* https://bugzilla.suse.com/show_bug.cgi?id=1255253
* https://bugzilla.suse.com/show_bug.cgi?id=1255256
* https://bugzilla.suse.com/show_bug.cgi?id=1255259
* https://bugzilla.suse.com/show_bug.cgi?id=1255262
* https://bugzilla.suse.com/show_bug.cgi?id=1255272
* https://bugzilla.suse.com/show_bug.cgi?id=1255273
* https://bugzilla.suse.com/show_bug.cgi?id=1255274
* https://bugzilla.suse.com/show_bug.cgi?id=1255276
* https://bugzilla.suse.com/show_bug.cgi?id=1255279
* https://bugzilla.suse.com/show_bug.cgi?id=1255280
* https://bugzilla.suse.com/show_bug.cgi?id=1255281
* https://bugzilla.suse.com/show_bug.cgi?id=1255297
* https://bugzilla.suse.com/show_bug.cgi?id=1255316
* https://bugzilla.suse.com/show_bug.cgi?id=1255318
* https://bugzilla.suse.com/show_bug.cgi?id=1255325
* https://bugzilla.suse.com/show_bug.cgi?id=1255329
* https://bugzilla.suse.com/show_bug.cgi?id=1255346
* https://bugzilla.suse.com/show_bug.cgi?id=1255349
* https://bugzilla.suse.com/show_bug.cgi?id=1255351
* https://bugzilla.suse.com/show_bug.cgi?id=1255357
* https://bugzilla.suse.com/show_bug.cgi?id=1255380
* https://bugzilla.suse.com/show_bug.cgi?id=1255395
* https://bugzilla.suse.com/show_bug.cgi?id=1255415
* https://bugzilla.suse.com/show_bug.cgi?id=1255428
* https://bugzilla.suse.com/show_bug.cgi?id=1255433
* https://bugzilla.suse.com/show_bug.cgi?id=1255434
* https://bugzilla.suse.com/show_bug.cgi?id=1255463
* https://bugzilla.suse.com/show_bug.cgi?id=1255480
* https://bugzilla.suse.com/show_bug.cgi?id=1255483
* https://bugzilla.suse.com/show_bug.cgi?id=1255489
* https://bugzilla.suse.com/show_bug.cgi?id=1255493
* https://bugzilla.suse.com/show_bug.cgi?id=1255495
* https://bugzilla.suse.com/show_bug.cgi?id=1255505
* https://bugzilla.suse.com/show_bug.cgi?id=1255507
* https://bugzilla.suse.com/show_bug.cgi?id=1255538
* https://bugzilla.suse.com/show_bug.cgi?id=1255540
* https://bugzilla.suse.com/show_bug.cgi?id=1255545
* https://bugzilla.suse.com/show_bug.cgi?id=1255549
* https://bugzilla.suse.com/show_bug.cgi?id=1255550
* https://bugzilla.suse.com/show_bug.cgi?id=1255553
* https://bugzilla.suse.com/show_bug.cgi?id=1255557
* https://bugzilla.suse.com/show_bug.cgi?id=1255558
* https://bugzilla.suse.com/show_bug.cgi?id=1255563
* https://bugzilla.suse.com/show_bug.cgi?id=1255564
* https://bugzilla.suse.com/show_bug.cgi?id=1255567
* https://bugzilla.suse.com/show_bug.cgi?id=1255570
* https://bugzilla.suse.com/show_bug.cgi?id=1255578
* https://bugzilla.suse.com/show_bug.cgi?id=1255579
* https://bugzilla.suse.com/show_bug.cgi?id=1255580
* https://bugzilla.suse.com/show_bug.cgi?id=1255583
* https://bugzilla.suse.com/show_bug.cgi?id=1255591
* https://bugzilla.suse.com/show_bug.cgi?id=1255601
* https://bugzilla.suse.com/show_bug.cgi?id=1255603
* https://bugzilla.suse.com/show_bug.cgi?id=1255605
* https://bugzilla.suse.com/show_bug.cgi?id=1255611
* https://bugzilla.suse.com/show_bug.cgi?id=1255614
* https://bugzilla.suse.com/show_bug.cgi?id=1255616
* https://bugzilla.suse.com/show_bug.cgi?id=1255617
* https://bugzilla.suse.com/show_bug.cgi?id=1255618
* https://bugzilla.suse.com/show_bug.cgi?id=1255621
* https://bugzilla.suse.com/show_bug.cgi?id=1255628
* https://bugzilla.suse.com/show_bug.cgi?id=1255629
* https://bugzilla.suse.com/show_bug.cgi?id=1255630
* https://bugzilla.suse.com/show_bug.cgi?id=1255632
* https://bugzilla.suse.com/show_bug.cgi?id=1255636
* https://bugzilla.suse.com/show_bug.cgi?id=1255688
* https://bugzilla.suse.com/show_bug.cgi?id=1255691
* https://bugzilla.suse.com/show_bug.cgi?id=1255702
* https://bugzilla.suse.com/show_bug.cgi?id=1255704
* https://bugzilla.suse.com/show_bug.cgi?id=1255706
* https://bugzilla.suse.com/show_bug.cgi?id=1255707
* https://bugzilla.suse.com/show_bug.cgi?id=1255709
* https://bugzilla.suse.com/show_bug.cgi?id=1255722
* https://bugzilla.suse.com/show_bug.cgi?id=1255723
* https://bugzilla.suse.com/show_bug.cgi?id=1255724
* https://bugzilla.suse.com/show_bug.cgi?id=1255758
* https://bugzilla.suse.com/show_bug.cgi?id=1255759
* https://bugzilla.suse.com/show_bug.cgi?id=1255760
* https://bugzilla.suse.com/show_bug.cgi?id=1255763
* https://bugzilla.suse.com/show_bug.cgi?id=1255769
* https://bugzilla.suse.com/show_bug.cgi?id=1255770
* https://bugzilla.suse.com/show_bug.cgi?id=1255772
* https://bugzilla.suse.com/show_bug.cgi?id=1255774
* https://bugzilla.suse.com/show_bug.cgi?id=1255775
* https://bugzilla.suse.com/show_bug.cgi?id=1255776
* https://bugzilla.suse.com/show_bug.cgi?id=1255780
* https://bugzilla.suse.com/show_bug.cgi?id=1255785
* https://bugzilla.suse.com/show_bug.cgi?id=1255786
* https://bugzilla.suse.com/show_bug.cgi?id=1255789
* https://bugzilla.suse.com/show_bug.cgi?id=1255790
* https://bugzilla.suse.com/show_bug.cgi?id=1255792
* https://bugzilla.suse.com/show_bug.cgi?id=1255793
* https://bugzilla.suse.com/show_bug.cgi?id=1255795
* https://bugzilla.suse.com/show_bug.cgi?id=1255798
* https://bugzilla.suse.com/show_bug.cgi?id=1255800
* https://bugzilla.suse.com/show_bug.cgi?id=1255801
* https://bugzilla.suse.com/show_bug.cgi?id=1255806
* https://bugzilla.suse.com/show_bug.cgi?id=1255807
* https://bugzilla.suse.com/show_bug.cgi?id=1255809
* https://bugzilla.suse.com/show_bug.cgi?id=1255810
* https://bugzilla.suse.com/show_bug.cgi?id=1255812
* https://bugzilla.suse.com/show_bug.cgi?id=1255814
* https://bugzilla.suse.com/show_bug.cgi?id=1255820
* https://bugzilla.suse.com/show_bug.cgi?id=1255838
* https://bugzilla.suse.com/show_bug.cgi?id=1255842
* https://bugzilla.suse.com/show_bug.cgi?id=1255843
* https://bugzilla.suse.com/show_bug.cgi?id=1255872
* https://bugzilla.suse.com/show_bug.cgi?id=1255875
* https://bugzilla.suse.com/show_bug.cgi?id=1255879
* https://bugzilla.suse.com/show_bug.cgi?id=1255883
* https://bugzilla.suse.com/show_bug.cgi?id=1255884
* https://bugzilla.suse.com/show_bug.cgi?id=1255886
* https://bugzilla.suse.com/show_bug.cgi?id=1255888
* https://bugzilla.suse.com/show_bug.cgi?id=1255890
* https://bugzilla.suse.com/show_bug.cgi?id=1255891
* https://bugzilla.suse.com/show_bug.cgi?id=1255892
* https://bugzilla.suse.com/show_bug.cgi?id=1255899
* https://bugzilla.suse.com/show_bug.cgi?id=1255902
* https://bugzilla.suse.com/show_bug.cgi?id=1255907
* https://bugzilla.suse.com/show_bug.cgi?id=1255911
* https://bugzilla.suse.com/show_bug.cgi?id=1255915
* https://bugzilla.suse.com/show_bug.cgi?id=1255918
* https://bugzilla.suse.com/show_bug.cgi?id=1255921
* https://bugzilla.suse.com/show_bug.cgi?id=1255924
* https://bugzilla.suse.com/show_bug.cgi?id=1255925
* https://bugzilla.suse.com/show_bug.cgi?id=1255931
* https://bugzilla.suse.com/show_bug.cgi?id=1255932
* https://bugzilla.suse.com/show_bug.cgi?id=1255934
* https://bugzilla.suse.com/show_bug.cgi?id=1255943
* https://bugzilla.suse.com/show_bug.cgi?id=1255944
* https://bugzilla.suse.com/show_bug.cgi?id=1255949
* https://bugzilla.suse.com/show_bug.cgi?id=1255951
* https://bugzilla.suse.com/show_bug.cgi?id=1255952
* https://bugzilla.suse.com/show_bug.cgi?id=1255955
* https://bugzilla.suse.com/show_bug.cgi?id=1255957
* https://bugzilla.suse.com/show_bug.cgi?id=1255961
* https://bugzilla.suse.com/show_bug.cgi?id=1255963
* https://bugzilla.suse.com/show_bug.cgi?id=1255964
* https://bugzilla.suse.com/show_bug.cgi?id=1255967
* https://bugzilla.suse.com/show_bug.cgi?id=1255974
* https://bugzilla.suse.com/show_bug.cgi?id=1255978
* https://bugzilla.suse.com/show_bug.cgi?id=1255984
* https://bugzilla.suse.com/show_bug.cgi?id=1255988
* https://bugzilla.suse.com/show_bug.cgi?id=1255990
* https://bugzilla.suse.com/show_bug.cgi?id=1255992
* https://bugzilla.suse.com/show_bug.cgi?id=1255993
* https://bugzilla.suse.com/show_bug.cgi?id=1255994
* https://bugzilla.suse.com/show_bug.cgi?id=1255996
* https://bugzilla.suse.com/show_bug.cgi?id=1256033
* https://bugzilla.suse.com/show_bug.cgi?id=1256034
* https://bugzilla.suse.com/show_bug.cgi?id=1256045
* https://bugzilla.suse.com/show_bug.cgi?id=1256050
* https://bugzilla.suse.com/show_bug.cgi?id=1256058
* https://bugzilla.suse.com/show_bug.cgi?id=1256071
* https://bugzilla.suse.com/show_bug.cgi?id=1256074
* https://bugzilla.suse.com/show_bug.cgi?id=1256081
* https://bugzilla.suse.com/show_bug.cgi?id=1256082
* https://bugzilla.suse.com/show_bug.cgi?id=1256083
* https://bugzilla.suse.com/show_bug.cgi?id=1256084
* https://bugzilla.suse.com/show_bug.cgi?id=1256085
* https://bugzilla.suse.com/show_bug.cgi?id=1256090
* https://bugzilla.suse.com/show_bug.cgi?id=1256093
* https://bugzilla.suse.com/show_bug.cgi?id=1256094
* https://bugzilla.suse.com/show_bug.cgi?id=1256095
* https://bugzilla.suse.com/show_bug.cgi?id=1256096
* https://bugzilla.suse.com/show_bug.cgi?id=1256099
* https://bugzilla.suse.com/show_bug.cgi?id=1256100
* https://bugzilla.suse.com/show_bug.cgi?id=1256104
* https://bugzilla.suse.com/show_bug.cgi?id=1256106
* https://bugzilla.suse.com/show_bug.cgi?id=1256107
* https://bugzilla.suse.com/show_bug.cgi?id=1256117
* https://bugzilla.suse.com/show_bug.cgi?id=1256119
* https://bugzilla.suse.com/show_bug.cgi?id=1256121
* https://bugzilla.suse.com/show_bug.cgi?id=1256145
* https://bugzilla.suse.com/show_bug.cgi?id=1256153
* https://bugzilla.suse.com/show_bug.cgi?id=1256178
* https://bugzilla.suse.com/show_bug.cgi?id=1256197
* https://bugzilla.suse.com/show_bug.cgi?id=1256231
* https://bugzilla.suse.com/show_bug.cgi?id=1256233
* https://bugzilla.suse.com/show_bug.cgi?id=1256234
* https://bugzilla.suse.com/show_bug.cgi?id=1256238
* https://bugzilla.suse.com/show_bug.cgi?id=1256263
* https://bugzilla.suse.com/show_bug.cgi?id=1256267
* https://bugzilla.suse.com/show_bug.cgi?id=1256268
* https://bugzilla.suse.com/show_bug.cgi?id=1256271
* https://bugzilla.suse.com/show_bug.cgi?id=1256273
* https://bugzilla.suse.com/show_bug.cgi?id=1256274
* https://bugzilla.suse.com/show_bug.cgi?id=1256279
* https://bugzilla.suse.com/show_bug.cgi?id=1256285
* https://bugzilla.suse.com/show_bug.cgi?id=1256291
* https://bugzilla.suse.com/show_bug.cgi?id=1256292
* https://bugzilla.suse.com/show_bug.cgi?id=1256300
* https://bugzilla.suse.com/show_bug.cgi?id=1256301
* https://bugzilla.suse.com/show_bug.cgi?id=1256302
* https://bugzilla.suse.com/show_bug.cgi?id=1256335
* https://bugzilla.suse.com/show_bug.cgi?id=1256348
* https://bugzilla.suse.com/show_bug.cgi?id=1256351
* https://bugzilla.suse.com/show_bug.cgi?id=1256354
* https://bugzilla.suse.com/show_bug.cgi?id=1256358
* https://bugzilla.suse.com/show_bug.cgi?id=1256361
* https://bugzilla.suse.com/show_bug.cgi?id=1256364
* https://bugzilla.suse.com/show_bug.cgi?id=1256366
* https://bugzilla.suse.com/show_bug.cgi?id=1256367
* https://bugzilla.suse.com/show_bug.cgi?id=1256368
* https://bugzilla.suse.com/show_bug.cgi?id=1256369
* https://bugzilla.suse.com/show_bug.cgi?id=1256370
* https://bugzilla.suse.com/show_bug.cgi?id=1256371
* https://bugzilla.suse.com/show_bug.cgi?id=1256373
* https://bugzilla.suse.com/show_bug.cgi?id=1256375
* https://bugzilla.suse.com/show_bug.cgi?id=1256379
* https://bugzilla.suse.com/show_bug.cgi?id=1256387
* https://bugzilla.suse.com/show_bug.cgi?id=1256394
* https://bugzilla.suse.com/show_bug.cgi?id=1256395
* https://bugzilla.suse.com/show_bug.cgi?id=1256396
* https://bugzilla.suse.com/show_bug.cgi?id=1256528
* https://jira.suse.com/browse/PED-13611
* https://jira.suse.com/browse/PED-14062
* https://jira.suse.com/browse/PED-14280
* https://jira.suse.com/browse/PED-14353
* https://jira.suse.com/browse/PED-3527
* https://jira.suse.com/browse/PED-4866
* https://jira.suse.com/browse/PED-5065
* https://jira.suse.com/browse/PED-5453
* https://jira.suse.com/browse/PED-5475
* https://jira.suse.com/browse/PED-5477
* https://jira.suse.com/browse/PED-5511
* https://jira.suse.com/browse/PED-6036
* https://jira.suse.com/browse/PED-6041
* https://jira.suse.com/browse/PED-6045
* https://jira.suse.com/browse/PED-6067
* https://jira.suse.com/browse/PED-6068
* https://jira.suse.com/browse/PED-6069
* https://jira.suse.com/browse/PED-6070
* https://jira.suse.com/browse/PED-6071
* https://jira.suse.com/browse/PED-6104
* https://jira.suse.com/browse/PED-6114
* https://jira.suse.com/browse/PED-6116
* https://jira.suse.com/browse/PED-6120
* https://jira.suse.com/browse/PED-6123
* https://jira.suse.com/browse/PED-6811
* https://jira.suse.com/browse/PED-7514
* https://jira.suse.com/browse/PED-7542
* https://jira.suse.com/browse/PED-7779
* https://jira.suse.com/browse/PED-7780
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260123/729e60e7/attachment.htm>
More information about the sle-security-updates
mailing list