SUSE-SU-2026:20772-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Mar 24 16:51:11 UTC 2026



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:20772-1  
Release Date: 2026-03-23T12:44:30Z  
Rating: important  
References:

  * bsc#1012628
  * bsc#1065729
  * bsc#1194869
  * bsc#1205462
  * bsc#1214285
  * bsc#1214635
  * bsc#1214847
  * bsc#1215146
  * bsc#1215199
  * bsc#1215211
  * bsc#1215344
  * bsc#1216062
  * bsc#1216436
  * bsc#1219165
  * bsc#1220419
  * bsc#1223731
  * bsc#1223800
  * bsc#1228490
  * bsc#1233563
  * bsc#1233640
  * bsc#1234163
  * bsc#1234842
  * bsc#1236022
  * bsc#1241345
  * bsc#1241437
  * bsc#1242909
  * bsc#1243055
  * bsc#1243677
  * bsc#1243678
  * bsc#1245193
  * bsc#1245449
  * bsc#1246184
  * bsc#1246328
  * bsc#1246447
  * bsc#1247030
  * bsc#1247500
  * bsc#1247712
  * bsc#1248211
  * bsc#1248886
  * bsc#1249256
  * bsc#1249307
  * bsc#1249587
  * bsc#1250032
  * bsc#1250082
  * bsc#1250334
  * bsc#1250388
  * bsc#1250705
  * bsc#1250748
  * bsc#1251966
  * bsc#1252046
  * bsc#1252342
  * bsc#1252511
  * bsc#1252686
  * bsc#1252712
  * bsc#1252776
  * bsc#1252808
  * bsc#1252824
  * bsc#1252861
  * bsc#1252891
  * bsc#1252900
  * bsc#1252911
  * bsc#1252919
  * bsc#1252924
  * bsc#1252973
  * bsc#1253087
  * bsc#1253155
  * bsc#1253262
  * bsc#1253342
  * bsc#1253365
  * bsc#1253386
  * bsc#1253400
  * bsc#1253402
  * bsc#1253408
  * bsc#1253413
  * bsc#1253442
  * bsc#1253451
  * bsc#1253458
  * bsc#1253463
  * bsc#1253622
  * bsc#1253623
  * bsc#1253647
  * bsc#1253691
  * bsc#1253739
  * bsc#1254119
  * bsc#1254126
  * bsc#1254244
  * bsc#1254373
  * bsc#1254378
  * bsc#1254447
  * bsc#1254465
  * bsc#1254510
  * bsc#1254518
  * bsc#1254520
  * bsc#1254599
  * bsc#1254606
  * bsc#1254611
  * bsc#1254613
  * bsc#1254615
  * bsc#1254621
  * bsc#1254623
  * bsc#1254624
  * bsc#1254626
  * bsc#1254648
  * bsc#1254649
  * bsc#1254653
  * bsc#1254655
  * bsc#1254657
  * bsc#1254660
  * bsc#1254661
  * bsc#1254663
  * bsc#1254669
  * bsc#1254677
  * bsc#1254678
  * bsc#1254688
  * bsc#1254690
  * bsc#1254691
  * bsc#1254693
  * bsc#1254695
  * bsc#1254698
  * bsc#1254701
  * bsc#1254704
  * bsc#1254705
  * bsc#1254707
  * bsc#1254712
  * bsc#1254715
  * bsc#1254717
  * bsc#1254723
  * bsc#1254724
  * bsc#1254732
  * bsc#1254733
  * bsc#1254737
  * bsc#1254739
  * bsc#1254742
  * bsc#1254743
  * bsc#1254749
  * bsc#1254750
  * bsc#1254753
  * bsc#1254754
  * bsc#1254758
  * bsc#1254761
  * bsc#1254762
  * bsc#1254765
  * bsc#1254767
  * bsc#1254782
  * bsc#1254791
  * bsc#1254793
  * bsc#1254794
  * bsc#1254795
  * bsc#1254796
  * bsc#1254797
  * bsc#1254798
  * bsc#1254813
  * bsc#1254815
  * bsc#1254825
  * bsc#1254828
  * bsc#1254829
  * bsc#1254830
  * bsc#1254832
  * bsc#1254835
  * bsc#1254839
  * bsc#1254840
  * bsc#1254842
  * bsc#1254843
  * bsc#1254845
  * bsc#1254846
  * bsc#1254847
  * bsc#1254849
  * bsc#1254850
  * bsc#1254851
  * bsc#1254852
  * bsc#1254854
  * bsc#1254856
  * bsc#1254858
  * bsc#1254860
  * bsc#1254864
  * bsc#1254869
  * bsc#1254871
  * bsc#1254894
  * bsc#1254918
  * bsc#1254957
  * bsc#1254959
  * bsc#1254983
  * bsc#1254992
  * bsc#1255005
  * bsc#1255009
  * bsc#1255025
  * bsc#1255026
  * bsc#1255030
  * bsc#1255033
  * bsc#1255034
  * bsc#1255035
  * bsc#1255039
  * bsc#1255041
  * bsc#1255042
  * bsc#1255046
  * bsc#1255057
  * bsc#1255062
  * bsc#1255064
  * bsc#1255065
  * bsc#1255068
  * bsc#1255072
  * bsc#1255075
  * bsc#1255077
  * bsc#1255081
  * bsc#1255082
  * bsc#1255083
  * bsc#1255092
  * bsc#1255094
  * bsc#1255095
  * bsc#1255100
  * bsc#1255102
  * bsc#1255120
  * bsc#1255122
  * bsc#1255128
  * bsc#1255129
  * bsc#1255131
  * bsc#1255134
  * bsc#1255135
  * bsc#1255136
  * bsc#1255138
  * bsc#1255140
  * bsc#1255142
  * bsc#1255146
  * bsc#1255149
  * bsc#1255152
  * bsc#1255154
  * bsc#1255155
  * bsc#1255157
  * bsc#1255163
  * bsc#1255164
  * bsc#1255167
  * bsc#1255169
  * bsc#1255171
  * bsc#1255172
  * bsc#1255175
  * bsc#1255179
  * bsc#1255182
  * bsc#1255187
  * bsc#1255190
  * bsc#1255193
  * bsc#1255197
  * bsc#1255199
  * bsc#1255202
  * bsc#1255203
  * bsc#1255206
  * bsc#1255209
  * bsc#1255216
  * bsc#1255218
  * bsc#1255221
  * bsc#1255224
  * bsc#1255227
  * bsc#1255230
  * bsc#1255233
  * bsc#1255241
  * bsc#1255245
  * bsc#1255246
  * bsc#1255251
  * bsc#1255252
  * bsc#1255253
  * bsc#1255255
  * bsc#1255259
  * bsc#1255260
  * bsc#1255261
  * bsc#1255262
  * bsc#1255265
  * bsc#1255266
  * bsc#1255268
  * bsc#1255269
  * bsc#1255272
  * bsc#1255273
  * bsc#1255274
  * bsc#1255276
  * bsc#1255279
  * bsc#1255280
  * bsc#1255281
  * bsc#1255297
  * bsc#1255318
  * bsc#1255325
  * bsc#1255327
  * bsc#1255329
  * bsc#1255351
  * bsc#1255377
  * bsc#1255379
  * bsc#1255380
  * bsc#1255395
  * bsc#1255401
  * bsc#1255403
  * bsc#1255415
  * bsc#1255417
  * bsc#1255428
  * bsc#1255480
  * bsc#1255482
  * bsc#1255483
  * bsc#1255488
  * bsc#1255489
  * bsc#1255493
  * bsc#1255495
  * bsc#1255505
  * bsc#1255507
  * bsc#1255530
  * bsc#1255537
  * bsc#1255538
  * bsc#1255539
  * bsc#1255540
  * bsc#1255544
  * bsc#1255545
  * bsc#1255547
  * bsc#1255548
  * bsc#1255549
  * bsc#1255550
  * bsc#1255552
  * bsc#1255553
  * bsc#1255557
  * bsc#1255558
  * bsc#1255563
  * bsc#1255564
  * bsc#1255567
  * bsc#1255568
  * bsc#1255569
  * bsc#1255570
  * bsc#1255578
  * bsc#1255579
  * bsc#1255580
  * bsc#1255583
  * bsc#1255591
  * bsc#1255601
  * bsc#1255603
  * bsc#1255605
  * bsc#1255611
  * bsc#1255614
  * bsc#1255615
  * bsc#1255616
  * bsc#1255617
  * bsc#1255618
  * bsc#1255621
  * bsc#1255622
  * bsc#1255628
  * bsc#1255629
  * bsc#1255630
  * bsc#1255632
  * bsc#1255636
  * bsc#1255688
  * bsc#1255691
  * bsc#1255695
  * bsc#1255698
  * bsc#1255702
  * bsc#1255704
  * bsc#1255706
  * bsc#1255707
  * bsc#1255709
  * bsc#1255722
  * bsc#1255758
  * bsc#1255759
  * bsc#1255760
  * bsc#1255763
  * bsc#1255769
  * bsc#1255770
  * bsc#1255772
  * bsc#1255774
  * bsc#1255775
  * bsc#1255776
  * bsc#1255780
  * bsc#1255785
  * bsc#1255786
  * bsc#1255789
  * bsc#1255790
  * bsc#1255792
  * bsc#1255793
  * bsc#1255795
  * bsc#1255798
  * bsc#1255800
  * bsc#1255801
  * bsc#1255806
  * bsc#1255807
  * bsc#1255809
  * bsc#1255810
  * bsc#1255812
  * bsc#1255814
  * bsc#1255820
  * bsc#1255838
  * bsc#1255842
  * bsc#1255843
  * bsc#1255872
  * bsc#1255875
  * bsc#1255879
  * bsc#1255883
  * bsc#1255884
  * bsc#1255886
  * bsc#1255888
  * bsc#1255890
  * bsc#1255891
  * bsc#1255892
  * bsc#1255899
  * bsc#1255902
  * bsc#1255907
  * bsc#1255911
  * bsc#1255915
  * bsc#1255918
  * bsc#1255921
  * bsc#1255924
  * bsc#1255925
  * bsc#1255930
  * bsc#1255931
  * bsc#1255932
  * bsc#1255934
  * bsc#1255943
  * bsc#1255944
  * bsc#1255949
  * bsc#1255951
  * bsc#1255952
  * bsc#1255955
  * bsc#1255957
  * bsc#1255961
  * bsc#1255963
  * bsc#1255964
  * bsc#1255967
  * bsc#1255974
  * bsc#1255978
  * bsc#1255984
  * bsc#1255988
  * bsc#1255990
  * bsc#1255992
  * bsc#1255993
  * bsc#1255994
  * bsc#1255996
  * bsc#1256033
  * bsc#1256034
  * bsc#1256045
  * bsc#1256050
  * bsc#1256058
  * bsc#1256071
  * bsc#1256074
  * bsc#1256081
  * bsc#1256082
  * bsc#1256083
  * bsc#1256084
  * bsc#1256085
  * bsc#1256090
  * bsc#1256093
  * bsc#1256094
  * bsc#1256095
  * bsc#1256096
  * bsc#1256099
  * bsc#1256100
  * bsc#1256104
  * bsc#1256106
  * bsc#1256107
  * bsc#1256117
  * bsc#1256119
  * bsc#1256121
  * bsc#1256145
  * bsc#1256153
  * bsc#1256178
  * bsc#1256197
  * bsc#1256231
  * bsc#1256233
  * bsc#1256234
  * bsc#1256238
  * bsc#1256263
  * bsc#1256267
  * bsc#1256268
  * bsc#1256271
  * bsc#1256273
  * bsc#1256274
  * bsc#1256279
  * bsc#1256280
  * bsc#1256285
  * bsc#1256291
  * bsc#1256292
  * bsc#1256300
  * bsc#1256301
  * bsc#1256302
  * bsc#1256335
  * bsc#1256348
  * bsc#1256351
  * bsc#1256354
  * bsc#1256358
  * bsc#1256361
  * bsc#1256364
  * bsc#1256366
  * bsc#1256367
  * bsc#1256368
  * bsc#1256369
  * bsc#1256370
  * bsc#1256371
  * bsc#1256373
  * bsc#1256375
  * bsc#1256379
  * bsc#1256387
  * bsc#1256394
  * bsc#1256395
  * bsc#1256396
  * bsc#1256528
  * bsc#1256564
  * bsc#1256579
  * bsc#1256582
  * bsc#1256584
  * bsc#1256586
  * bsc#1256591
  * bsc#1256593
  * bsc#1256597
  * bsc#1256605
  * bsc#1256606
  * bsc#1256607
  * bsc#1256609
  * bsc#1256610
  * bsc#1256611
  * bsc#1256612
  * bsc#1256613
  * bsc#1256616
  * bsc#1256617
  * bsc#1256619
  * bsc#1256622
  * bsc#1256623
  * bsc#1256625
  * bsc#1256628
  * bsc#1256630
  * bsc#1256638
  * bsc#1256640
  * bsc#1256641
  * bsc#1256645
  * bsc#1256646
  * bsc#1256650
  * bsc#1256651
  * bsc#1256653
  * bsc#1256654
  * bsc#1256655
  * bsc#1256659
  * bsc#1256660
  * bsc#1256664
  * bsc#1256665
  * bsc#1256674
  * bsc#1256679
  * bsc#1256680
  * bsc#1256682
  * bsc#1256683
  * bsc#1256688
  * bsc#1256689
  * bsc#1256708
  * bsc#1256716
  * bsc#1256726
  * bsc#1256728
  * bsc#1256730
  * bsc#1256733
  * bsc#1256737
  * bsc#1256741
  * bsc#1256742
  * bsc#1256744
  * bsc#1256752
  * bsc#1256754
  * bsc#1256755
  * bsc#1256757
  * bsc#1256759
  * bsc#1256760
  * bsc#1256761
  * bsc#1256763
  * bsc#1256770
  * bsc#1256773
  * bsc#1256774
  * bsc#1256777
  * bsc#1256779
  * bsc#1256781
  * bsc#1256785
  * bsc#1256792
  * bsc#1256802
  * bsc#1256861
  * bsc#1256863
  * bsc#1257035
  * bsc#1257053
  * bsc#1257154
  * bsc#1257155
  * bsc#1257158
  * bsc#1257159
  * bsc#1257163
  * bsc#1257164
  * bsc#1257179
  * bsc#1257180
  * bsc#1257202
  * bsc#1257204
  * bsc#1257207
  * bsc#1257208
  * bsc#1257209
  * bsc#1257215
  * bsc#1257217
  * bsc#1257218
  * bsc#1257220
  * bsc#1257221
  * bsc#1257227
  * bsc#1257228
  * bsc#1257231
  * bsc#1257232
  * bsc#1257234
  * bsc#1257236
  * bsc#1257245
  * bsc#1257246
  * bsc#1257277
  * bsc#1257282
  * bsc#1257296
  * bsc#1257332
  * bsc#1257473
  * bsc#1257552
  * bsc#1257554
  * bsc#1257557
  * bsc#1257559
  * bsc#1257560
  * bsc#1257562
  * bsc#1257570
  * bsc#1257573
  * bsc#1257576
  * bsc#1257579
  * bsc#1257580
  * bsc#1257586
  * bsc#1257603
  * bsc#1257635
  * bsc#1257679
  * bsc#1257687
  * bsc#1257704
  * bsc#1257706
  * bsc#1257707
  * bsc#1257714
  * bsc#1257715
  * bsc#1257716
  * bsc#1257718
  * bsc#1257722
  * bsc#1257723
  * bsc#1257729
  * bsc#1257735
  * bsc#1257739
  * bsc#1257740
  * bsc#1257741
  * bsc#1257743
  * bsc#1257745
  * bsc#1257749
  * bsc#1257750
  * bsc#1257757
  * bsc#1257758
  * bsc#1257759
  * bsc#1257761
  * bsc#1257762
  * bsc#1257763
  * bsc#1257765
  * bsc#1257768
  * bsc#1257770
  * bsc#1257772
  * bsc#1257775
  * bsc#1257776
  * bsc#1257788
  * bsc#1257789
  * bsc#1257790
  * bsc#1257805
  * bsc#1257808
  * bsc#1257809
  * bsc#1257811
  * bsc#1257813
  * bsc#1257816
  * bsc#1257830
  * bsc#1257891
  * bsc#1257952
  * bsc#1258153
  * bsc#1258181
  * bsc#1258184
  * bsc#1258222
  * bsc#1258234
  * bsc#1258237
  * bsc#1258245
  * bsc#1258249
  * bsc#1258252
  * bsc#1258256
  * bsc#1258259
  * bsc#1258272
  * bsc#1258273
  * bsc#1258277
  * bsc#1258278
  * bsc#1258279
  * bsc#1258299
  * bsc#1258304
  * bsc#1258309
  * bsc#1258313
  * bsc#1258317
  * bsc#1258321
  * bsc#1258326
  * bsc#1258338
  * bsc#1258349
  * bsc#1258354
  * bsc#1258358
  * bsc#1258374
  * bsc#1258377
  * bsc#1258379
  * bsc#1258394
  * bsc#1258395
  * bsc#1258397
  * bsc#1258411
  * bsc#1258415
  * bsc#1258419
  * bsc#1258422
  * bsc#1258424
  * bsc#1258429
  * bsc#1258442
  * bsc#1258464
  * bsc#1258465
  * bsc#1258468
  * bsc#1258469
  * bsc#1258484
  * bsc#1258518
  * bsc#1258519
  * bsc#1258520
  * bsc#1258524
  * bsc#1258544
  * bsc#1258660
  * bsc#1258824
  * bsc#1258928
  * bsc#1259070
  * jsc#PED-12554
  * jsc#PED-14062
  * jsc#PED-14571
  * jsc#PED-6996

  
Cross-References:

  * CVE-2023-42752
  * CVE-2023-53714
  * CVE-2023-53743
  * CVE-2023-53750
  * CVE-2023-53752
  * CVE-2023-53759
  * CVE-2023-53762
  * CVE-2023-53766
  * CVE-2023-53768
  * CVE-2023-53777
  * CVE-2023-53778
  * CVE-2023-53782
  * CVE-2023-53784
  * CVE-2023-53785
  * CVE-2023-53787
  * CVE-2023-53791
  * CVE-2023-53792
  * CVE-2023-53793
  * CVE-2023-53794
  * CVE-2023-53795
  * CVE-2023-53797
  * CVE-2023-53799
  * CVE-2023-53807
  * CVE-2023-53808
  * CVE-2023-53813
  * CVE-2023-53815
  * CVE-2023-53817
  * CVE-2023-53819
  * CVE-2023-53821
  * CVE-2023-53823
  * CVE-2023-53825
  * CVE-2023-53828
  * CVE-2023-53831
  * CVE-2023-53834
  * CVE-2023-53836
  * CVE-2023-53839
  * CVE-2023-53841
  * CVE-2023-53842
  * CVE-2023-53843
  * CVE-2023-53844
  * CVE-2023-53846
  * CVE-2023-53847
  * CVE-2023-53848
  * CVE-2023-53850
  * CVE-2023-53851
  * CVE-2023-53852
  * CVE-2023-53855
  * CVE-2023-53856
  * CVE-2023-53857
  * CVE-2023-53858
  * CVE-2023-53860
  * CVE-2023-53861
  * CVE-2023-53863
  * CVE-2023-53864
  * CVE-2023-53865
  * CVE-2023-53989
  * CVE-2023-53992
  * CVE-2023-53994
  * CVE-2023-53995
  * CVE-2023-53996
  * CVE-2023-53997
  * CVE-2023-53998
  * CVE-2023-53999
  * CVE-2023-54000
  * CVE-2023-54001
  * CVE-2023-54005
  * CVE-2023-54006
  * CVE-2023-54008
  * CVE-2023-54013
  * CVE-2023-54014
  * CVE-2023-54016
  * CVE-2023-54017
  * CVE-2023-54019
  * CVE-2023-54022
  * CVE-2023-54023
  * CVE-2023-54025
  * CVE-2023-54026
  * CVE-2023-54027
  * CVE-2023-54030
  * CVE-2023-54031
  * CVE-2023-54032
  * CVE-2023-54035
  * CVE-2023-54037
  * CVE-2023-54038
  * CVE-2023-54042
  * CVE-2023-54045
  * CVE-2023-54048
  * CVE-2023-54049
  * CVE-2023-54051
  * CVE-2023-54052
  * CVE-2023-54060
  * CVE-2023-54064
  * CVE-2023-54066
  * CVE-2023-54067
  * CVE-2023-54069
  * CVE-2023-54070
  * CVE-2023-54072
  * CVE-2023-54076
  * CVE-2023-54080
  * CVE-2023-54081
  * CVE-2023-54083
  * CVE-2023-54088
  * CVE-2023-54089
  * CVE-2023-54091
  * CVE-2023-54092
  * CVE-2023-54093
  * CVE-2023-54094
  * CVE-2023-54095
  * CVE-2023-54096
  * CVE-2023-54099
  * CVE-2023-54101
  * CVE-2023-54104
  * CVE-2023-54106
  * CVE-2023-54112
  * CVE-2023-54113
  * CVE-2023-54115
  * CVE-2023-54117
  * CVE-2023-54121
  * CVE-2023-54125
  * CVE-2023-54127
  * CVE-2023-54133
  * CVE-2023-54134
  * CVE-2023-54135
  * CVE-2023-54136
  * CVE-2023-54137
  * CVE-2023-54140
  * CVE-2023-54141
  * CVE-2023-54142
  * CVE-2023-54143
  * CVE-2023-54145
  * CVE-2023-54148
  * CVE-2023-54149
  * CVE-2023-54153
  * CVE-2023-54154
  * CVE-2023-54155
  * CVE-2023-54156
  * CVE-2023-54164
  * CVE-2023-54166
  * CVE-2023-54169
  * CVE-2023-54170
  * CVE-2023-54171
  * CVE-2023-54172
  * CVE-2023-54173
  * CVE-2023-54177
  * CVE-2023-54178
  * CVE-2023-54179
  * CVE-2023-54181
  * CVE-2023-54183
  * CVE-2023-54185
  * CVE-2023-54189
  * CVE-2023-54194
  * CVE-2023-54201
  * CVE-2023-54204
  * CVE-2023-54207
  * CVE-2023-54209
  * CVE-2023-54210
  * CVE-2023-54211
  * CVE-2023-54215
  * CVE-2023-54219
  * CVE-2023-54220
  * CVE-2023-54221
  * CVE-2023-54223
  * CVE-2023-54224
  * CVE-2023-54225
  * CVE-2023-54227
  * CVE-2023-54229
  * CVE-2023-54230
  * CVE-2023-54235
  * CVE-2023-54240
  * CVE-2023-54241
  * CVE-2023-54246
  * CVE-2023-54247
  * CVE-2023-54251
  * CVE-2023-54253
  * CVE-2023-54254
  * CVE-2023-54255
  * CVE-2023-54258
  * CVE-2023-54261
  * CVE-2023-54263
  * CVE-2023-54264
  * CVE-2023-54266
  * CVE-2023-54267
  * CVE-2023-54271
  * CVE-2023-54276
  * CVE-2023-54278
  * CVE-2023-54281
  * CVE-2023-54282
  * CVE-2023-54283
  * CVE-2023-54285
  * CVE-2023-54289
  * CVE-2023-54291
  * CVE-2023-54292
  * CVE-2023-54293
  * CVE-2023-54296
  * CVE-2023-54297
  * CVE-2023-54299
  * CVE-2023-54300
  * CVE-2023-54302
  * CVE-2023-54303
  * CVE-2023-54304
  * CVE-2023-54309
  * CVE-2023-54312
  * CVE-2023-54313
  * CVE-2023-54314
  * CVE-2023-54315
  * CVE-2023-54316
  * CVE-2023-54318
  * CVE-2023-54319
  * CVE-2023-54322
  * CVE-2023-54324
  * CVE-2023-54326
  * CVE-2024-26944
  * CVE-2024-27005
  * CVE-2024-42103
  * CVE-2024-53070
  * CVE-2024-53093
  * CVE-2024-53149
  * CVE-2025-22047
  * CVE-2025-37813
  * CVE-2025-37861
  * CVE-2025-38243
  * CVE-2025-38321
  * CVE-2025-38322
  * CVE-2025-38379
  * CVE-2025-38539
  * CVE-2025-38728
  * CVE-2025-39689
  * CVE-2025-39748
  * CVE-2025-39813
  * CVE-2025-39829
  * CVE-2025-39880
  * CVE-2025-39890
  * CVE-2025-39913
  * CVE-2025-39964
  * CVE-2025-39977
  * CVE-2025-40006
  * CVE-2025-40024
  * CVE-2025-40033
  * CVE-2025-40042
  * CVE-2025-40053
  * CVE-2025-40081
  * CVE-2025-40097
  * CVE-2025-40099
  * CVE-2025-40102
  * CVE-2025-40103
  * CVE-2025-40106
  * CVE-2025-40123
  * CVE-2025-40134
  * CVE-2025-40135
  * CVE-2025-40153
  * CVE-2025-40158
  * CVE-2025-40160
  * CVE-2025-40167
  * CVE-2025-40170
  * CVE-2025-40178
  * CVE-2025-40179
  * CVE-2025-40187
  * CVE-2025-40190
  * CVE-2025-40192
  * CVE-2025-40202
  * CVE-2025-40211
  * CVE-2025-40215
  * CVE-2025-40219
  * CVE-2025-40220
  * CVE-2025-40223
  * CVE-2025-40231
  * CVE-2025-40233
  * CVE-2025-40238
  * CVE-2025-40240
  * CVE-2025-40242
  * CVE-2025-40244
  * CVE-2025-40248
  * CVE-2025-40250
  * CVE-2025-40251
  * CVE-2025-40252
  * CVE-2025-40254
  * CVE-2025-40256
  * CVE-2025-40257
  * CVE-2025-40258
  * CVE-2025-40259
  * CVE-2025-40261
  * CVE-2025-40262
  * CVE-2025-40263
  * CVE-2025-40264
  * CVE-2025-40268
  * CVE-2025-40269
  * CVE-2025-40271
  * CVE-2025-40272
  * CVE-2025-40273
  * CVE-2025-40274
  * CVE-2025-40275
  * CVE-2025-40277
  * CVE-2025-40278
  * CVE-2025-40279
  * CVE-2025-40280
  * CVE-2025-40282
  * CVE-2025-40283
  * CVE-2025-40284
  * CVE-2025-40287
  * CVE-2025-40288
  * CVE-2025-40289
  * CVE-2025-40292
  * CVE-2025-40293
  * CVE-2025-40297
  * CVE-2025-40301
  * CVE-2025-40304
  * CVE-2025-40306
  * CVE-2025-40307
  * CVE-2025-40308
  * CVE-2025-40309
  * CVE-2025-40310
  * CVE-2025-40311
  * CVE-2025-40312
  * CVE-2025-40314
  * CVE-2025-40315
  * CVE-2025-40316
  * CVE-2025-40317
  * CVE-2025-40318
  * CVE-2025-40319
  * CVE-2025-40320
  * CVE-2025-40321
  * CVE-2025-40322
  * CVE-2025-40323
  * CVE-2025-40324
  * CVE-2025-40328
  * CVE-2025-40329
  * CVE-2025-40331
  * CVE-2025-40337
  * CVE-2025-40338
  * CVE-2025-40339
  * CVE-2025-40342
  * CVE-2025-40343
  * CVE-2025-40345
  * CVE-2025-40346
  * CVE-2025-40347
  * CVE-2025-40349
  * CVE-2025-40350
  * CVE-2025-40351
  * CVE-2025-40355
  * CVE-2025-40360
  * CVE-2025-40363
  * CVE-2025-68168
  * CVE-2025-68171
  * CVE-2025-68172
  * CVE-2025-68174
  * CVE-2025-68176
  * CVE-2025-68178
  * CVE-2025-68180
  * CVE-2025-68183
  * CVE-2025-68185
  * CVE-2025-68188
  * CVE-2025-68190
  * CVE-2025-68192
  * CVE-2025-68194
  * CVE-2025-68195
  * CVE-2025-68200
  * CVE-2025-68201
  * CVE-2025-68204
  * CVE-2025-68206
  * CVE-2025-68208
  * CVE-2025-68209
  * CVE-2025-68217
  * CVE-2025-68218
  * CVE-2025-68222
  * CVE-2025-68227
  * CVE-2025-68230
  * CVE-2025-68233
  * CVE-2025-68235
  * CVE-2025-68237
  * CVE-2025-68238
  * CVE-2025-68239
  * CVE-2025-68241
  * CVE-2025-68244
  * CVE-2025-68245
  * CVE-2025-68249
  * CVE-2025-68252
  * CVE-2025-68254
  * CVE-2025-68255
  * CVE-2025-68256
  * CVE-2025-68257
  * CVE-2025-68258
  * CVE-2025-68259
  * CVE-2025-68261
  * CVE-2025-68264
  * CVE-2025-68283
  * CVE-2025-68284
  * CVE-2025-68285
  * CVE-2025-68286
  * CVE-2025-68287
  * CVE-2025-68289
  * CVE-2025-68290
  * CVE-2025-68295
  * CVE-2025-68296
  * CVE-2025-68297
  * CVE-2025-68301
  * CVE-2025-68303
  * CVE-2025-68305
  * CVE-2025-68307
  * CVE-2025-68308
  * CVE-2025-68312
  * CVE-2025-68313
  * CVE-2025-68320
  * CVE-2025-68325
  * CVE-2025-68327
  * CVE-2025-68328
  * CVE-2025-68330
  * CVE-2025-68331
  * CVE-2025-68332
  * CVE-2025-68335
  * CVE-2025-68337
  * CVE-2025-68339
  * CVE-2025-68340
  * CVE-2025-68345
  * CVE-2025-68346
  * CVE-2025-68347
  * CVE-2025-68349
  * CVE-2025-68351
  * CVE-2025-68354
  * CVE-2025-68362
  * CVE-2025-68363
  * CVE-2025-68365
  * CVE-2025-68366
  * CVE-2025-68367
  * CVE-2025-68372
  * CVE-2025-68374
  * CVE-2025-68378
  * CVE-2025-68379
  * CVE-2025-68380
  * CVE-2025-68724
  * CVE-2025-68725
  * CVE-2025-68727
  * CVE-2025-68728
  * CVE-2025-68732
  * CVE-2025-68733
  * CVE-2025-68734
  * CVE-2025-68736
  * CVE-2025-68740
  * CVE-2025-68742
  * CVE-2025-68744
  * CVE-2025-68746
  * CVE-2025-68750
  * CVE-2025-68753
  * CVE-2025-68757
  * CVE-2025-68758
  * CVE-2025-68759
  * CVE-2025-68764
  * CVE-2025-68765
  * CVE-2025-68766
  * CVE-2025-68768
  * CVE-2025-68770
  * CVE-2025-68771
  * CVE-2025-68773
  * CVE-2025-68775
  * CVE-2025-68776
  * CVE-2025-68777
  * CVE-2025-68778
  * CVE-2025-68783
  * CVE-2025-68785
  * CVE-2025-68788
  * CVE-2025-68789
  * CVE-2025-68795
  * CVE-2025-68797
  * CVE-2025-68798
  * CVE-2025-68800
  * CVE-2025-68801
  * CVE-2025-68803
  * CVE-2025-68804
  * CVE-2025-68808
  * CVE-2025-68810
  * CVE-2025-68813
  * CVE-2025-68814
  * CVE-2025-68815
  * CVE-2025-68816
  * CVE-2025-68819
  * CVE-2025-68820
  * CVE-2025-71064
  * CVE-2025-71066
  * CVE-2025-71071
  * CVE-2025-71077
  * CVE-2025-71078
  * CVE-2025-71079
  * CVE-2025-71081
  * CVE-2025-71082
  * CVE-2025-71083
  * CVE-2025-71084
  * CVE-2025-71085
  * CVE-2025-71086
  * CVE-2025-71087
  * CVE-2025-71088
  * CVE-2025-71089
  * CVE-2025-71091
  * CVE-2025-71093
  * CVE-2025-71094
  * CVE-2025-71095
  * CVE-2025-71096
  * CVE-2025-71097
  * CVE-2025-71098
  * CVE-2025-71100
  * CVE-2025-71104
  * CVE-2025-71108
  * CVE-2025-71111
  * CVE-2025-71112
  * CVE-2025-71113
  * CVE-2025-71114
  * CVE-2025-71116
  * CVE-2025-71118
  * CVE-2025-71119
  * CVE-2025-71120
  * CVE-2025-71123
  * CVE-2025-71126
  * CVE-2025-71130
  * CVE-2025-71131
  * CVE-2025-71132
  * CVE-2025-71133
  * CVE-2025-71135
  * CVE-2025-71136
  * CVE-2025-71137
  * CVE-2025-71138
  * CVE-2025-71145
  * CVE-2025-71147
  * CVE-2025-71148
  * CVE-2025-71149
  * CVE-2025-71154
  * CVE-2025-71162
  * CVE-2025-71163
  * CVE-2025-71182
  * CVE-2025-71184
  * CVE-2025-71185
  * CVE-2025-71188
  * CVE-2025-71189
  * CVE-2025-71190
  * CVE-2025-71191
  * CVE-2025-71192
  * CVE-2025-71194
  * CVE-2025-71195
  * CVE-2025-71196
  * CVE-2025-71197
  * CVE-2025-71198
  * CVE-2025-71199
  * CVE-2025-71200
  * CVE-2025-71222
  * CVE-2025-71224
  * CVE-2025-71225
  * CVE-2025-71229
  * CVE-2025-71231
  * CVE-2025-71232
  * CVE-2025-71234
  * CVE-2025-71235
  * CVE-2025-71236
  * CVE-2026-22976
  * CVE-2026-22977
  * CVE-2026-22978
  * CVE-2026-22979
  * CVE-2026-22982
  * CVE-2026-22984
  * CVE-2026-22985
  * CVE-2026-22988
  * CVE-2026-22990
  * CVE-2026-22991
  * CVE-2026-22992
  * CVE-2026-22993
  * CVE-2026-22996
  * CVE-2026-22997
  * CVE-2026-22998
  * CVE-2026-22999
  * CVE-2026-23000
  * CVE-2026-23001
  * CVE-2026-23003
  * CVE-2026-23004
  * CVE-2026-23005
  * CVE-2026-23006
  * CVE-2026-23010
  * CVE-2026-23011
  * CVE-2026-23017
  * CVE-2026-23021
  * CVE-2026-23026
  * CVE-2026-23033
  * CVE-2026-23035
  * CVE-2026-23037
  * CVE-2026-23049
  * CVE-2026-23053
  * CVE-2026-23056
  * CVE-2026-23057
  * CVE-2026-23058
  * CVE-2026-23060
  * CVE-2026-23061
  * CVE-2026-23063
  * CVE-2026-23064
  * CVE-2026-23068
  * CVE-2026-23071
  * CVE-2026-23073
  * CVE-2026-23074
  * CVE-2026-23076
  * CVE-2026-23078
  * CVE-2026-23080
  * CVE-2026-23082
  * CVE-2026-23083
  * CVE-2026-23084
  * CVE-2026-23085
  * CVE-2026-23086
  * CVE-2026-23089
  * CVE-2026-23090
  * CVE-2026-23091
  * CVE-2026-23094
  * CVE-2026-23095
  * CVE-2026-23096
  * CVE-2026-23099
  * CVE-2026-23101
  * CVE-2026-23102
  * CVE-2026-23104
  * CVE-2026-23105
  * CVE-2026-23107
  * CVE-2026-23108
  * CVE-2026-23110
  * CVE-2026-23111
  * CVE-2026-23112
  * CVE-2026-23113
  * CVE-2026-23116
  * CVE-2026-23119
  * CVE-2026-23121
  * CVE-2026-23129
  * CVE-2026-23133
  * CVE-2026-23135
  * CVE-2026-23139
  * CVE-2026-23141
  * CVE-2026-23145
  * CVE-2026-23146
  * CVE-2026-23150
  * CVE-2026-23151
  * CVE-2026-23152
  * CVE-2026-23155
  * CVE-2026-23156
  * CVE-2026-23163
  * CVE-2026-23166
  * CVE-2026-23167
  * CVE-2026-23170
  * CVE-2026-23171
  * CVE-2026-23172
  * CVE-2026-23173
  * CVE-2026-23176
  * CVE-2026-23178
  * CVE-2026-23179
  * CVE-2026-23182
  * CVE-2026-23190
  * CVE-2026-23191
  * CVE-2026-23198
  * CVE-2026-23202
  * CVE-2026-23207
  * CVE-2026-23208
  * CVE-2026-23209
  * CVE-2026-23213
  * CVE-2026-23214
  * CVE-2026-23221
  * CVE-2026-23222
  * CVE-2026-23229

  
CVSS scores:

  * CVE-2023-42752 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-42752 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53714 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53714 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53743 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53752 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53759 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53762 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53766 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53766 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53768 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53777 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53777 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53778 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53782 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53782 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2023-53784 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53784 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53785 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53787 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53791 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53792 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53793 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53794 ( SUSE ):  7.7
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53794 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53795 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53799 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53807 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53817 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53817 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53825 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53836 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53839 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53841 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53841 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53842 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53844 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53846 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53847 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53848 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53851 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53852 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53855 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53856 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53857 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53858 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53860 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53861 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53864 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53989 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53989 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53992 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53994 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53995 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53995 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53996 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2023-53997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54001 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54006 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54013 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54013 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54014 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54014 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54016 ( SUSE ):  5.3
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54016 ( SUSE ):  4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54017 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54017 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54022 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54023 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54023 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54025 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54026 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54027 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54030 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54030 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54032 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54035 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54037 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54038 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54042 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54042 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54045 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54045 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54049 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54051 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54052 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54066 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54069 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54072 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54072 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54076 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54076 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54080 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54080 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54083 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54083 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54088 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54088 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54089 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54089 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54091 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54091 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54092 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54092 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54093 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54094 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54094 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54095 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54096 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54096 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-54099 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54101 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54101 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-54104 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54104 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-54106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54112 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54113 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54115 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54115 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54117 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54121 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54125 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54125 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2023-54127 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54127 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-54133 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54133 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54134 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54134 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54135 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54135 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54136 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54136 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54137 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54137 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-54140 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54140 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54141 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54142 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54142 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54143 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54143 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54145 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-54145 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-54148 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54148 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2023-54149 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54149 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54153 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54153 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54154 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54154 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54155 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54155 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54156 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54164 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54164 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54166 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54166 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54169 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54170 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54171 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54173 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54173 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54177 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54177 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54178 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54178 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54179 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54179 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54181 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54181 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54183 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54183 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54185 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-54185 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-54189 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54189 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54194 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54194 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54201 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54201 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54204 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54204 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54207 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54207 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54207 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54209 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54209 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54210 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54210 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54211 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54211 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54215 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54215 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54219 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54219 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54220 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54220 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54221 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54221 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54223 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54223 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54224 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54224 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54225 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54225 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54227 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54227 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54229 ( SUSE ):  5.1
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54229 ( SUSE ):  4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54230 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54230 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54235 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54235 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54240 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54240 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54241 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54241 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54246 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54246 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54247 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-54247 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-54251 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54251 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54253 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54253 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2023-54254 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54254 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54255 ( SUSE ):  7.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54255 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54258 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54258 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54261 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54263 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54263 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54264 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54264 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54266 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54266 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54267 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-54267 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-54271 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54271 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54276 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54276 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54278 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54278 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54281 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54281 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54282 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54282 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54283 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54283 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54285 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54285 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54285 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54289 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54291 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54291 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54292 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54292 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54293 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54293 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54296 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54297 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54297 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54299 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54299 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54300 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54300 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54302 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54302 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54303 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54303 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54304 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54304 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54309 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54309 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-54312 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54312 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54313 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54313 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54314 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54314 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54315 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54315 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54316 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54316 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54318 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54318 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54319 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54319 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54322 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54322 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54324 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54324 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2023-54326 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54326 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26944 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26944 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-27005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27005 ( NVD ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-42103 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-42103 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53070 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53093 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53093 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53149 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-53149 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-53149 ( NVD ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22047 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22047 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22047 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37813 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37813 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37861 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37861 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37861 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38243 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38243 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-38243 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38321 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38321 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-38321 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38322 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-38322 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-38322 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38379 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38379 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38379 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38539 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38539 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38539 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38728 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38728 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-39689 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39689 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39748 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39748 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39748 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39813 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39880 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39890 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39890 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39890 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39913 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39964 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39964 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-39964 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-39977 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39977 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40006 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40006 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40024 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40033 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40042 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40053 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40053 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40097 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40097 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40099 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40099 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40102 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40102 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-40103 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40103 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40106 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40123 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40123 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40134 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40134 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40135 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40135 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40153 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40153 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40158 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40158 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40160 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40160 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40167 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40170 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40170 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40178 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40179 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40179 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40187 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40190 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40190 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40192 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40202 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40202 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40211 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40211 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40215 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40215 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40219 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40219 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40220 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40220 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40223 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40231 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40233 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40240 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40242 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40242 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40244 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40244 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40248 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40250 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40251 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40251 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40252 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40254 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40256 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40257 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40258 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40258 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40259 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40262 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40263 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40263 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40264 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40268 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40268 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40269 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40269 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40271 ( SUSE ):  5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40272 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40273 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40274 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40275 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40277 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40278 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40279 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40279 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-40280 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40280 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40282 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40282 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40283 ( SUSE ):  7.0
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40283 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40284 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40284 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40288 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40288 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40289 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40292 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40292 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
  * CVE-2025-40293 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40293 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40297 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40297 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40301 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40301 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2025-40304 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40304 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40306 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40306 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40307 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40307 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40308 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40308 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40309 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40309 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40310 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40310 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40311 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40311 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40312 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40314 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40314 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40315 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40315 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40316 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40317 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40318 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40319 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40320 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40321 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40322 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40322 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-40323 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40323 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40324 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40328 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40329 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40331 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40337 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40338 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40338 ( SUSE ):  5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40339 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40342 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40342 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40343 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40343 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40345 ( SUSE ):  7.0
    CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40345 ( SUSE ):  6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40346 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40346 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40347 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40349 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40349 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40350 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40351 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40351 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40355 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40360 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40360 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40363 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40363 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-68168 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68168 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68171 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68174 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68174 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68176 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68178 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68178 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68180 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68183 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68183 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68185 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68188 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68188 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68190 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68190 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68194 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68194 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68201 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68204 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68204 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68206 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68206 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68208 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68208 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68209 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68217 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68218 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68222 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68227 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68230 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68230 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68233 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68235 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68237 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68238 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68239 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68241 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68244 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68245 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68249 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68252 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68254 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68254 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68255 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68255 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-68256 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68256 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68257 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68258 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68259 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68264 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68264 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-68283 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68283 ( SUSE ):  6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68284 ( SUSE ):  7.0
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68284 ( SUSE ):  7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-68285 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68285 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68286 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68289 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68290 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68295 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68297 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68297 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68301 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68303 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68305 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68307 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68307 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68308 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68308 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68312 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68312 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68313 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68313 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68320 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68320 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68325 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68325 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68327 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68327 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68328 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68328 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68330 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68330 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68331 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68331 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68332 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68335 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68337 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68339 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68339 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-68340 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68340 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68340 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68345 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68346 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68347 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68347 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68349 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68351 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68351 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68354 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68362 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68363 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68365 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68365 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68366 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68367 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68372 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68372 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68374 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68374 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68378 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68379 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68379 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68379 ( SUSE ):  5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68380 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68724 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68725 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68725 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68727 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68728 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68732 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68732 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68734 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68734 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68736 ( SUSE ):  7.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68736 ( SUSE ):  5.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-68740 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68740 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68742 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68742 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68744 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68744 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68746 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68746 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68750 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68750 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68753 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-68757 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68758 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68758 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68759 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68759 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68764 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-68764 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-68765 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68765 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68766 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68766 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68768 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68768 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68770 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68770 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68771 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68773 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68773 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68775 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68775 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68776 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68776 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68777 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68777 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68778 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68778 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68783 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68785 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68785 ( SUSE ):  5.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68788 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68788 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-68789 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-68795 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68795 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68797 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68798 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68798 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68800 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68800 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68801 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68801 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68803 ( SUSE ):  4.8
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68803 ( SUSE ):  4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
  * CVE-2025-68804 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68804 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-68808 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68810 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68813 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68813 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68814 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68815 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68820 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71066 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71071 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71077 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71078 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71079 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71081 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71081 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71082 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71083 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71083 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71084 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71084 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71085 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71085 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71086 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71086 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71087 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71087 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-71088 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71088 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71089 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71089 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71089 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71091 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71091 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71093 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-71093 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-71094 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71094 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71096 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71096 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2025-71097 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71097 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71098 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71100 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71100 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2025-71104 ( SUSE ):  8.2
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2025-71104 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2025-71108 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71111 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71111 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71112 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71112 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71113 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71113 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-71114 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71114 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71116 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71116 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-71118 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71118 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71119 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71119 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71120 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71120 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71123 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71123 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2025-71126 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71126 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71130 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71132 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71133 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71135 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71136 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71137 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71138 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71138 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71145 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71145 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71145 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71147 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71147 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71147 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71148 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71148 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71148 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-71149 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71149 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-71149 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71154 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71154 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71154 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71162 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71163 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71163 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71182 ( SUSE ):  5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71184 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71185 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71188 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71189 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71189 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71190 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71190 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71191 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71191 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71192 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71192 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71194 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71194 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71195 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71195 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71196 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71196 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71197 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-71198 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71198 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71199 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71199 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71200 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71200 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71222 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71222 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71222 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71224 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71224 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71225 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71225 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-71225 ( NVD ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-71229 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71231 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71231 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71231 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-71232 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71232 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71234 ( SUSE ):  7.7
    CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71234 ( SUSE ):  7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71234 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71235 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71235 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71235 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71236 ( SUSE ):  5.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71236 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71236 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22976 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22976 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22977 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22977 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-22977 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22978 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-22978 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2026-22979 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-22979 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22982 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22982 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22982 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22984 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22984 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-22985 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22985 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22985 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22988 ( SUSE ):  6.0
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22988 ( SUSE ):  5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-22988 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22990 ( SUSE ):  7.1
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22990 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22990 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22991 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22991 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22992 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22992 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22993 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22993 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22993 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22996 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22996 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22997 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22997 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22998 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22998 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22998 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22999 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22999 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-22999 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23000 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23000 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23000 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23001 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23001 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23003 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23003 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23004 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23004 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23005 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23005 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23006 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23010 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23017 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23017 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23021 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23021 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23026 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23026 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23033 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23033 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23035 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23035 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23037 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23037 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23049 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23049 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23053 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23053 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23056 ( SUSE ):  6.1
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23056 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2026-23057 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23057 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23058 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23058 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23060 ( SUSE ):  7.1
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23060 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23061 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23061 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23063 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23063 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23064 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23064 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23068 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23068 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23071 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23071 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23071 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23073 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23073 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23074 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23074 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23074 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23076 ( SUSE ):  5.2
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23076 ( SUSE ):  5.4 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23076 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23078 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23078 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23078 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23080 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23080 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23080 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23082 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23082 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23083 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23083 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2026-23083 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23084 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23084 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23085 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23085 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23085 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23086 ( SUSE ):  6.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H
  * CVE-2026-23086 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2026-23086 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23089 ( SUSE ):  5.2
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23089 ( SUSE ):  5.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23089 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23090 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23090 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23090 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23091 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23091 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23091 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23094 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23094 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23094 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23095 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23095 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23095 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23096 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23096 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23096 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23099 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23099 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23099 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23101 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23101 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23101 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23102 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23102 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23102 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23104 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23104 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23104 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23105 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23105 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23105 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23107 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23107 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23107 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23108 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23108 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23108 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23110 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23110 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23110 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23111 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23111 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23111 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23112 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23112 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23112 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23113 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23113 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23113 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23116 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23116 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23116 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23119 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23119 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23119 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23121 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23121 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23121 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23129 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23129 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23129 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23133 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23133 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23133 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23135 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23135 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H
  * CVE-2026-23135 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23139 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23139 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23139 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23141 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23141 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23141 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23145 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23145 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23145 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23146 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23146 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23150 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23150 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23150 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23151 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23151 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23152 ( SUSE ):  5.9
    CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23152 ( SUSE ):  6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23152 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23155 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23155 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23155 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23156 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23156 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
  * CVE-2026-23156 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23163 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23163 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23166 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23166 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23167 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23167 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23167 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23170 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23170 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23170 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23171 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23171 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23172 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2026-23172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2026-23172 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23173 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23173 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23173 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23176 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23176 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23178 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23179 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23182 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23182 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23190 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23190 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23190 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23191 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23191 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2026-23191 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23198 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23198 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23198 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23202 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23202 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23202 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23207 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23207 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23207 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23208 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2026-23208 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23209 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23209 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23209 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23213 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23213 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23213 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23214 ( SUSE ):  5.1
    CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23214 ( SUSE ):  4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23214 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23221 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-23221 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23222 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
  * CVE-2026-23222 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
  * CVE-2026-23222 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23229 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-23229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Micro 6.1

  
  
An update that solves 655 vulnerabilities, contains four features and has 57
fixes can now be installed.

## Description:

The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive
various security bugfixes.

The following security bugs were fixed:

  * CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
    (bsc#1254992).
  * CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for
    reply queue (bsc#1243055).
  * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails
    (bsc#1246328).
  * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd
    (bsc#1249256).
  * CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET
    (bsc#1249587).
  * CVE-2025-39880: libceph: fix invalid accesses to ceph_connection_v1_info
    (bsc#1250388).
  * CVE-2025-39890: wifi: ath12k: fix memory leak in
    ath12k_service_ready_ext_event (bsc#1250334).
  * CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in
    af_alg_sendmsg (bsc#1251966).
  * CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
    (bsc#1252046).
  * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted
    (bsc#1252342).
  * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task
    (bsc#1252686).
  * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in
    pru_rproc_set_ctable() (bsc#1252824).
  * CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing
    NULL pointer dereference (bsc#1252861).
  * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure
    (bsc#1252808).
  * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
    (bsc#1252776).
  * CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input
    (bsc#1252911).
  * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init
    (bsc#1252919).
  * CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink
    (bsc#1252924).
  * CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility
    (bsc#1253365).
  * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend()
    (bsc#1253386).
  * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
  * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory
    area (bsc#1253408).
  * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
  * CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).
  * CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination
    (bsc#1253458).
  * CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
  * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
  * CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
  * CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition
    sctp_sf_do_5_1D_ce() (bsc#1253647).
  * CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr
    update (bsc#1253623).
  * CVE-2025-40192: Revert "ipmi: fix msg stack when IPMI is disconnected"
    (bsc#1253622).
  * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
    workers (bsc#1254520).
  * CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport()
    (bsc#1254815).
  * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
    (bsc#1254813).
  * CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).
  * CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is
    missing (bsc#1254869).
  * CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
  * CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already
    established (bsc#1254864).
  * CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq()
    failure (bsc#1254854).
  * CVE-2025-40251: devlink: rate: Unset parent pointer in
    devl_rate_nodes_destroy (bsc#1254856).
  * CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in
    qede_tpa_cont() and qede_tpa_end() (bsc#1254849).
  * CVE-2025-40254: net: openvswitch: remove never-working support for setting
    nsh fields (bsc#1254852).
  * CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
  * CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
    (bsc#1254843).
  * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
  * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in
    nvme_fc_delete_ctrl() (bsc#1254839).
  * CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
  * CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param
    (bsc#1255082).
  * CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
  * CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when
    gmem is dying (bsc#1254830).
  * CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN
    kernel-infoleak (bsc#1254825).
  * CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix
    kernel leak (bsc#1254846).
  * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
    (bsc#1254847).
  * CVE-2025-40289: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM
    (bsc#1255042).
  * CVE-2025-40292: virtio-net: fix received length check in big packets
    (bsc#1255175).
  * CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking
    (bsc#1255179).
  * CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass
    (bsc#1255187).
  * CVE-2025-40307: exfat: validate cluster allocation bits of the allocation
    bitmap (bsc#1255039).
  * CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer
    (bsc#1254794).
  * CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid()
    (bsc#1254624).
  * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
  * CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between
    components (bsc#1255273).
  * CVE-2025-40339: drm/amdgpu: fix nullptr err of vm_handle_moved
    (bsc#1255428).
  * CVE-2025-40346: arch_topology: Fix incorrect error check in
    topology_parse_cpu_capacity() (bsc#1255318).
  * CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff
    for striding RQ (bsc#1255260).
  * CVE-2025-40355: sysfs: check visibility before changing group attribute
    ownership (bsc#1255261).
  * CVE-2025-40360: drm/sysfb: Do not dereference NULL pointer in plane reset
    (bsc#1255095).
  * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output
    (bsc#1255102).
  * CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).
  * CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition
    (bsc#1255327).
  * CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy
    (bsc#1255266).
  * CVE-2025-68188: tcp: use dst_dev_rcu() in
    tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
  * CVE-2025-68190: drm/amdgpu/atom: Check kcalloc() for WS buffer in
    amdgpu_atom_execute_table_locked() (bsc#1255131).
  * CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).
  * CVE-2025-68201: drm/amdgpu: remove two invalid BUG_ON()s (bsc#1255136).
  * CVE-2025-68204: pmdomain: arm: scmi: Fix genpd leak on provider registration
    failure (bsc#1255224).
  * CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted
    connections (bsc#1255142).
  * CVE-2025-68208: bpf: account for current allocated stack depth in
    widen_imprecise_scalars() (bsc#1255227).
  * CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230).
  * CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).
  * CVE-2025-68230: drm/amdgpu: fix gpu page fault after hibernation on PF
    passthrough (bsc#1255134).
  * CVE-2025-68239: binfmt_misc: restore write access before closing files
    opened by open_exec() (bsc#1255272).
  * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding
    stale fnhe (bsc#1255157).
  * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing
    incorrect cleanup (bsc#1255268).
  * CVE-2025-68255: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq
    IE parsing (bsc#1255395).
  * CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is
    replaced (bsc#1255199).
  * CVE-2025-68261: ext4: add i_data_sem protection in
    ext4_destroy_inline_data_nolock() (bsc#1255164).
  * CVE-2025-68264: ext4: refresh inline data size before write operations
    (bsc#1255380).
  * CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd
    (bsc#1255379).
  * CVE-2025-68284: libceph: prevent potential out-of-bounds writes in
    handle_auth_session_key() (bsc#1255377).
  * CVE-2025-68285: libceph: fix potential use-after-free in
    have_mon_and_osd_map() (bsc#1255401).
  * CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon()
    (bsc#1255129).
  * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon
    setup (bsc#1255128).
  * CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted
    directories (bsc#1255403).
  * CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path
    (bsc#1255120).
  * CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).
  * CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in
    cake_drop (bsc#1255417).
  * CVE-2025-68327: usb: renesas_usbhs: Fix synchronous external abort on unbind
    (bsc#1255488).
  * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when
    file system corrupted (bsc#1255482).
  * CVE-2025-68340: team: Move team device type change at the end of
    team_port_add (bsc#1255507).
  * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in
    pnfs_mark_layout_stateid_invalid (bsc#1255544).
  * CVE-2025-68363: bpf: Check skb->transport_header is set in bpf_skb_check_mtu
    (bsc#1255552).
  * CVE-2025-68365: fs/ntfs3: Initialize allocated memory before use
    (bsc#1255548).
  * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
  * CVE-2025-68367: macintosh/mac_hid: fix race condition in
    mac_hid_toggle_emumouse (bsc#1255547).
  * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
  * CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).
  * CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper
    function (bsc#1255614).
  * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize
    failure (bsc#1255695).
  * CVE-2025-68727: ntfs3: Fix uninit buffer allocated by __getname()
    (bsc#1255568).
  * CVE-2025-68728: ntfs3: fix uninit memory after failed mi_read in
    mi_format_new (bsc#1255539).
  * CVE-2025-68733: smack: fix bug: unprivileged task can create labels
    (bsc#1255615).
  * CVE-2025-68736: landlock: Fix handling of disconnected directories
    (bsc#1255698).
  * CVE-2025-68742: bpf: Improve program stats run-time calculation
    (bsc#1255707).
  * CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps
    (bsc#1255709).
  * CVE-2025-68764: NFS: Automounted filesystems should inherit
    ro,noexec,nodev,sync flags (bsc#1255930).
  * CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).
  * CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).
  * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
    (bsc#1256582).
  * CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket
    (bsc#1256665).
  * CVE-2025-68776: net/hsr: fix NULL pointer dereference in
    prp_get_untagged_frame() (bsc#1256659).
  * CVE-2025-68778: btrfs: don't log conflicting inode if it's a dir moved in
    the current transaction (bsc#1256683).
  * CVE-2025-68785: net: openvswitch: fix middle attribute validation in
    push_nsh() action (bsc#1256640).
  * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for
    special files (bsc#1256638).
  * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query
    (bsc#1256688).
  * CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF
    (bsc#1256689).
  * CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating
    multicast route stats (bsc#1256646).
  * CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free
    (bsc#1256653).
  * CVE-2025-68803: nfsd: set security label during create operations
    (bsc#1256770).
  * CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing
    memslot (bsc#1256679).
  * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
    (bsc#1256641).
  * CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep()
    (bsc#1256651).
  * CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it
    changes to strict (bsc#1256680).
  * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters
    (bsc#1256674).
  * CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode()
    (bsc#1256754).
  * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for
    resources (bsc#1256654).
  * CVE-2025-71066: net/sched: ets: Always remove class from active list before
    deleting in ets_qdisc_change (bsc#1256645).
  * CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral
    (bsc#1256802).
  * CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).
  * CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference
    (bsc#1256622).
  * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
    calipso_skbuff_setattr() (bsc#1256623).
  * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg()
    (bsc#1256628).
  * CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).
  * CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
  * CVE-2025-71091: team: fix check for port enabled in
    team_queue_override_port_prio_changed() (bsc#1256773).
  * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
  * CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size
    (bsc#1256597).
  * CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action
    (bsc#1256605).
  * CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID
    correctly (bsc#1256606).
  * CVE-2025-71097: ipv4: Fix reference count leak when using error routes with
    nexthop objects (bsc#1256607).
  * CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with
    periodic HV timer (bsc#1256708).
  * CVE-2025-71112: net: hns3: add VLAN id validation before using
    (bsc#1256726).
  * CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via
    sock_kmalloc (bsc#1256716).
  * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted
    osdmaps (bsc#1256744).
  * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
    gss_token in gss_read_proxy_verf (bsc#1256779).
  * CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options()
    (bsc#1256757).
  * CVE-2025-71126: mptcp: reset fallback status gracefully at disconnect() time
    (bsc#1256755).
  * CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event
    (bsc#1256733).
  * CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in
    raid5_store_group_thread_cnt() (bsc#1256761).
  * CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
    (bsc#1256760).
  * CVE-2025-71148: net/handshake: restore destructor on submit failure
    (bsc#1257159).
  * CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value
    on update (bsc#1257164).
  * CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode
    eviction (bsc#1257635).
  * CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored
    transaction type (bsc#1257687).
  * CVE-2025-71225: md: suspend array while updating raid_disks via sysfs
    (bsc#1258411).
  * CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating
    inactive aggregate in qfq_reset (bsc#1257035).
  * CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue
    (bsc#1257053).
  * CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets
    (bsc#1257228).
  * CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a
    lag (bsc#1257179).
  * CVE-2026-22984: libceph: prevent potential out-of-bounds reads in
    handle_auth_done() (bsc#1257217).
  * CVE-2026-22990: libceph: replace overzealous BUG_ON in
    osdmap_apply_incremental() (bsc#1257221).
  * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial
    allocation (bsc#1257220).
  * CVE-2026-22992: libceph: return the handler error from
    mon_handle_auth_done() (bsc#1257218).
  * CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.
  * CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in
    nvmet_tcp_build_pdu_iovec (bsc#1257209).
  * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
    qfq_change_class() (bsc#1257236).
  * CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure
    (bsc#1257234).
  * CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code
    (bsc#1257232).
  * CVE-2026-23003: geneve: Fix incorrect inner network header offset when
    innerprotoinherit is set (bsc#1257246).
  * CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
    rt_del_uncached_list() (bsc#1257231).
  * CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever
    XFD[i]=1 (bsc#1257245).
  * CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
  * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).
  * CVE-2026-23017: idpf: fix error handling in the init_task on load
    (bsc#1257552).
  * CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of
    priv (bsc#1257559).
  * CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio()
    (bsc#1257718).
  * CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
  * CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to
    match ESP/ESN spec (bsc#1257735).
  * CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
  * CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
    (bsc#1257749).
  * CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).
  * CVE-2026-23084: be2net: Fix NULL pointer dereference in
    be_cmd_get_mac_from_list (bsc#1257830).
  * CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses
    (bsc#1257758).
  * CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size
    (bsc#1257757).
  * CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()
    (bsc#1257790).
  * CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
  * CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices
    (bsc#1257816).
  * CVE-2026-23102: arm64/fpsimd: signal: Mandate SVE payload for streaming-mode
    state (bsc#1257772).
  * CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
  * CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class
    is active in qfq_rm_from_ag (bsc#1257775).
  * CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring
    ZA (bsc#1257762).
  * CVE-2026-23110: scsi: core: Wake up the error handler when final completions
    race against each other (bsc#1257761).
  * CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in
    nft_map_catchall_activate() (bsc#1258181).
  * CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
    (bsc#1258184).
  * CVE-2026-23113: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop
    (bsc#1258278).
  * CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask
    for 8mq vpu (bsc#1258277).
  * CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect()
    (bsc#1258273).
  * CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has
    been performed (bsc#1258304).
  * CVE-2026-23141: btrfs: send: check for inline extents in
    range_is_hole_in_parent() (bsc#1258377).
  * CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
    (bsc#1258272).
  * CVE-2026-23171: net: bonding: update the slave array for broadcast mode
    (bsc#1258349).
  * CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers
    (bsc#1258520).
  * CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
    (bsc#1258394).
  * CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
  * CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd
    (bsc#1258321).
  * CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames
    (bsc#1258468).
  * CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
    (bsc#1258518).
  * CVE-2026-23213: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
    (bsc#1258465).
  * CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only
    (bsc#1258464).

The following non-security bugs were fixed:

  * ACPI: CPPC: Fix missing PCC check for guaranteed_perf (git-fixes).
  * ACPI: CPPC: Fix remaining for_each_possible_cpu() to use online CPUs (git-
    fixes).
  * ACPI: PCC: Fix race condition by removing static qualifier (git-fixes).
  * ACPI: PM: Add unused power resource quirk for THUNDEROBOT ZERO (git-fixes).
  * ACPI: processor: Fix NULL-pointer dereference in
    acpi_processor_errata_piix4() (stable-fixes).
  * ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).
  * ACPI: property: Fix fwnode refcount leak in
    acpi_fwnode_graph_parse_endpoint() (git-fixes).
  * ACPI: property: Use ACPI functions in acpi_graph_get_next_endpoint() only
    (stable-fixes).
  * ACPICA: Abort AML bytecode execution when executing AML_FATAL_OP (stable-
    fixes).
  * ACPICA: Avoid walking the Namespace if start_node is NULL (stable-fixes).
  * ACPICA: Fix NULL pointer dereference in acpi_ev_address_space_dispatch()
    (git-fixes).
  * ALSA: ac97: fix a double free in snd_ac97_controller_register() (git-fixes).
  * ALSA: ctxfi: Fix potential OOB access in audio mixer handling (stable-
    fixes).
  * ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).
  * ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-
    fixes).
  * ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-
    fixes).
  * ALSA: hda/conexant: Add headset mic fix for MECHREVO Wujie 15X Pro (stable-
    fixes).
  * ALSA: hda/realtek - fixed speaker no sound (stable-fixes).
  * ALSA: hda/realtek: Add quirk for Inspur S14-G1 (stable-fixes).
  * ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU (stable-fixes).
  * ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU (git-fixes).
  * ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk (stable-fixes).
  * ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
    (stable-fixes).
  * ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()
    (git-fixes).
  * ALSA: pcmcia: Fix resource leak in snd_pdacf_probe error path (git-fixes).
  * ALSA: scarlett2: Fix buffer overflow in config retrieval (git-fixes).
  * ALSA: uapi: Fix typo in asound.h comment (git-fixes).
  * ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).
  * ALSA: usb-audio: Add iface reset and delay quirk for AB13X USB Audio
    (stable-fixes).
  * ALSA: usb-audio: Add native DSD quirks for PureAudio DAC series (stable-
    fixes).
  * ALSA: usb-audio: Add sanity check for OOB writes at silencing (stable-
    fixes).
  * ALSA: usb-audio: Avoid implicit feedback mode on DIYINHK USB Audio 2.0
    (stable-fixes).
  * ALSA: usb-audio: Cap the packet size pre-calculations (git-fixes).
  * ALSA: usb-audio: Check max frame size for implicit feedback mode, too
    (stable-fixes).
  * ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (git-fixes).
  * ALSA: usb-audio: Remove VALIDATE_RATES quirk for Focusrite devices (git-
    fixes).
  * ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).
  * ALSA: usb-audio: Update the number of packets properly at receiving (stable-
    fixes).
  * ALSA: usb-audio: Use correct version for UAC3 header validation (git-fixes).
  * ALSA: usb-audio: Use inclusive terms (git-fixes).
  * ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).
  * ALSA: usb-mixer: us16x08: validate meter packet indices (git-fixes).
  * ALSA: usb: Increase volume range that triggers a warning (git-fixes).
  * ALSA: vxpocket: Fix resource leak in vxpocket_probe error path (git-fixes).
  * APEI/GHES: ensure that won't go past CPER allocated record (stable-fixes).
  * ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).
  * ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9 (stable-fixes).
  * ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion (git-fixes).
  * ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-
    fixes).
  * ASoC: SOF: ipc4-control: Keep the payload size up to date (git-fixes).
  * ASoC: SOF: ipc4-control: Use the correct size for scontrol->ipc_control_data
    (git-fixes).
  * ASoC: SOF: ipc4-topology: Correct the allocation size for bytes controls
    (git-fixes).
  * ASoC: ak4458: Disable regulator when error happens (git-fixes).
  * ASoC: ak5558: Disable regulator when error happens (git-fixes).
  * ASoC: amd: drop unused Kconfig symbols (git-fixes).
  * ASoC: amd: fix memory leak in acp3x pdm dma ops (git-fixes).
  * ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list (stable-fixes).
  * ASoC: amd: yc: Add DMI quirk for ASUS Vivobook Pro 15X M6501RR (stable-
    fixes).
  * ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO (stable-fixes).
  * ASoC: amd: yc: Add quirk for HP 200 G2a 16 (stable-fixes).
  * ASoC: amd: yc: Add quirk for Honor MagicBook X16 2025 (stable-fixes).
  * ASoC: amd: yc: Fix microphone on ASUS M6500RE (stable-fixes).
  * ASoC: bcm: bcm63xx-pcm-whistler: Check return value of of_dma_configure()
    (git-fixes).
  * ASoC: codecs: max98390: Check return value of devm_gpiod_get_optional() in
    max98390_i2c_probe() (stable-fixes).
  * ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).
  * ASoC: codecs: wsa881x: Drop unused version readout (stable-fixes).
  * ASoC: codecs: wsa881x: fix unnecessary initialisation (git-fixes).
  * ASoC: codecs: wsa883x: fix unnecessary initialisation (git-fixes).
  * ASoC: codecs: wsa884x: fix codec initialisation (git-fixes).
  * ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel (stable-fixes).
  * ASoC: davinci-evm: Fix reference leak in davinci_evm_probe (stable-fixes).
  * ASoC: fsl: imx-card: Do not force slot width to sample width (git-fixes).
  * ASoC: fsl_sai: Add missing registers to cache default (stable-fixes).
  * ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).
  * ASoC: nau8821: Avoid unnecessary blocking in IRQ handler (stable-fixes).
  * ASoC: nau8821: Cancel delayed work on component remove (git-fixes).
  * ASoC: nau8821: Cancel pending work before suspend (git-fixes).
  * ASoC: nau8821: Consistently clear interrupts before unmasking (git-fixes).
  * ASoC: nau8821: Fixup nau8821_enable_jack_detect() (git-fixes).
  * ASoC: pxa: drop unused Kconfig symbol (git-fixes).
  * ASoC: qcom: q6adm: the the copp device only during last instance (git-
    fixes).
  * ASoC: qcom: q6apm-dai: set flags to reflect correct operation of appl_ptr
    (git-fixes).
  * ASoC: qcom: q6asm-dai: perform correct state check before closing (git-
    fixes).
  * ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-
    fixes).
  * ASoC: rockchip: i2s-tdm: Use param rate if not provided by set_sysclk (git-
    fixes).
  * ASoC: stm32: sai: fix OF node leak on probe (git-fixes).
  * ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).
  * ASoC: stm32: sai: fix device leak on probe (git-fixes).
  * ASoC: sun4i-spdif: Add missing kerneldoc fields for sun4i_spdif_quirks (git-
    fixes).
  * ASoC: sunxi: sun50i-dmic: Add missing check for devm_regmap_init_mmio
    (stable-fixes).
  * ASoC: tlv320adcx140: Propagate error codes during probe (stable-fixes).
  * ASoC: tlv320adcx140: fix null pointer (git-fixes).
  * ASoC: tlv320adcx140: fix word length (git-fixes).
  * ASoC: wm8962: Add WM8962_ADC_MONOMIX to "3D Coefficients" mask (stable-
    fixes).
  * ASoC: wm8962: Do not report a microphone if it's shorted to ground on plug
    (stable-fixes).
  * Add dtb-spacemit SpacemiT boards include MilkV-Jupiter, Banana Pi F3 and
    Orange Pi RV2.
  * Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).
  * Bluetooth: L2CAP: Fix invalid response to L2CAP_ECRED_RECONF_REQ (git-
    fixes).
  * Bluetooth: L2CAP: Fix missing key size check for L2CAP_LE_CONN_REQ (git-
    fixes).
  * Bluetooth: L2CAP: Fix not checking output MTU is acceptable on
    L2CAP_ECRED_CONN_REQ (git-fixes).
  * Bluetooth: L2CAP: Fix response to L2CAP_ECRED_CONN_REQ (git-fixes).
  * Bluetooth: MGMT: Fix memory leak in set_ssp_complete (git-fixes).
  * Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-
    fixes).
  * Bluetooth: btrtl: Avoid loading the config file on security chips (stable-
    fixes).
  * Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB (stable-fixes).
  * Bluetooth: btusb: Add device ID for Realtek RTL8761BU (stable-fixes).
  * Bluetooth: btusb: Add new VID/PID 13d3/3533 for RTL8821CE (stable-fixes).
  * Bluetooth: btusb: Add new VID/PID 2b89/6275 for RTL8761BUV (stable-fixes).
  * Bluetooth: btusb: Add new VID/PID for RTL8852CE (stable-fixes).
  * Bluetooth: btusb: revert use of devm_kzalloc in btusb (git-fixes).
  * Bluetooth: hci_conn: Set link_policy on incoming ACL connections (stable-
    fixes).
  * Bluetooth: hci_conn: use mod_delayed_work for active mode timeout (stable-
    fixes).
  * Bluetooth: hci_qca: Cleanup on all setup failures (git-fixes).
  * Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-
    fixes).
  * Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work (git-fixes).
  * Documentation/kernel-parameters: fix typo in retbleed= kernel parameter
    description (git-fixes).
  * Documentation: PCI: endpoint: Fix ntb/vntb copy & paste errors (git-fixes).
  * Documentation: hid-alps: Fix packet format section headings (git-fixes).
  * Documentation: mailbox: mbox_chan_ops.flush() is optional (git-fixes).
  * Documentation: parport-lowlevel: Separate function listing code blocks (git-
    fixes).
  * HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101) (stable-
    fixes).
  * HID: apple: Add "SONiX KN85 Keyboard" to the list of non-apple keyboards
    (stable-fixes).
  * HID: apple: Add SONiX AK870 PRO to non_apple_keyboards quirk list (stable-
    fixes).
  * HID: elecom: Add support for ELECOM HUGE Plus M-HT1MRBK (stable-fixes).
  * HID: elecom: Add support for ELECOM M-XT3URBK (018F) (stable-fixes).
  * HID: hid-input: Extend Elan ignore battery quirk to USB (stable-fixes).
  * HID: hid-pl: handle probe errors (git-fixes).
  * HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() (stable-
    fixes).
  * HID: input: map HID_GD_Z to ABS_DISTANCE for stylus/pen (stable-fixes).
  * HID: intel-ish-hid: Reset enum_devices_done before enumeration (stable-
    fixes).
  * HID: intel-ish-hid: Update ishtp bus match to support device ID table
    (stable-fixes).
  * HID: logitech-dj: Remove duplicate error logging (git-fixes).
  * HID: logitech-hidpp: Check maxfield in hidpp_get_report_length() (stable-
    fixes).
  * HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-
    fixes).
  * HID: magicmouse: Do not crash on missing msc->input (stable-fixes).
  * HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL (stable-fixes).
  * HID: multitouch: add eGalaxTouch EXC3188 support (stable-fixes).
  * HID: playstation: Add missing check for input_ff_create_memless (git-fixes).
  * HID: playstation: Center initial joystick axes to prevent spurious events
    (stable-fixes).
  * HID: prodikeys: Check presence of pm->input_ep82 (stable-fixes).
  * HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list (stable-
    fixes).
  * HID: quirks: work around VID/PID conflict for appledisplay (git-fixes).
  * HID: usbhid: paper over wrong bNumDescriptor field (stable-fixes).
  * Input: atkbd - skip deactivate for HONOR FMB-P's internal keyboard (git-
    fixes).
  * Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).
  * Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).
  * Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).
  * Input: i8042 - add TUXEDO InfinityBook Max Gen10 AMD to i8042 quirk table
    (stable-fixes).
  * Input: i8042 - add quirk for ASUS Zenbook UX425QA_UM425QA (stable-fixes).
  * Input: i8042 - add quirks for MECHREVO Wujie 15X Pro (stable-fixes).
  * Input: stmfts - correct wording for the warning message (git-fixes).
  * Input: stmfts - make comments correct (git-fixes).
  * Input: ti_am335x_tsc - fix off-by-one error in wire_order validation (git-
    fixes).
  * KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).
  * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
  * Move upstreamed SCSI patches into sorted section
  * Move upstreamed ath12k patch into sorted section
  * Move upstreamed mm and SCSI patches into sorted section
  * NTB: ntb_transport: Fix too small buffer for debugfs_name (git-fixes).
  * PCI/ACPI: Restrict program_hpx_type2() to AER bits (git-fixes).
  * PCI/IOV: Fix race between SR-IOV enable/disable and hotplug (git-fixes).
  * PCI/MSI: Unmap MSI-X region on error (stable-fixes).
  * PCI/P2PDMA: Release per-CPU pgmap ref when vm_insert_page() fails (git-
    fixes).
  * PCI/PM: Avoid redundant delays on D3hot->D3cold (git-fixes).
  * PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-
    fixes).
  * PCI/portdrv: Fix potential resource leak (git-fixes).
  * PCI: Add ACS quirk for Pericom PI7C9X2G404 switches [12d8:b404] (git-fixes).
  * PCI: Add ACS quirk for Qualcomm Hamoa & Glymur (stable-fixes).
  * PCI: Add PCIE_MSG_CODE_ASSERT_INTx message macros (stable-fixes).
  * PCI: Add defines for bridge window indexing (stable-fixes).
  * PCI: Correct PCI_CAP_EXP_ENDPOINT_SIZEOF_V2 value (git-fixes).
  * PCI: Do not attempt to set ExtTag for VFs (git-fixes).
  * PCI: Enable ACS after configuring IOMMU for OF platforms (stable-fixes).
  * PCI: Fix pci_slot_lock () device locking (stable-fixes).
  * PCI: Fix pci_slot_trylock() error handling (git-fixes).
  * PCI: Initialize RCB from pci_configure_device() (git-fixes).
  * PCI: Log bridge info when first enumerating bridge (stable-fixes).
  * PCI: Log bridge windows conditionally (stable-fixes).
  * PCI: Mark 3ware-9650SA Root Port Extended Tags as broken (git-fixes).
  * PCI: Mark ASM1164 SATA controller to avoid bus reset (stable-fixes).
  * PCI: Mark Nvidia GB10 to avoid bus reset (stable-fixes).
  * PCI: Move pci_read_bridge_windows() below individual window accessors
    (stable-fixes).
  * PCI: Supply bridge device, not secondary bus, to read window details
    (stable-fixes).
  * PCI: dw-rockchip: Disable BAR 0 and BAR 1 for Root Port (stable-fixes).
  * PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).
  * PCI: endpoint: Fix swapped parameters in
    pci_{primary/secondary}_epc_epf_unlink() functions (git-fixes).
  * PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).
  * PCI: mediatek: Fix IRQ domain leak when MSI allocation fails (git-fixes).
  * PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).
  * PM: runtime: Do not clear needs_force_resume with enabled runtime PM (git-
    fixes).
  * PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).
  * PM: sleep: wakeirq: harden dev_pm_clear_wake_irq() against races (git-
    fixes).
  * PM: wakeup: Handle empty list in wakeup_sources_walk_start() (git-fixes).
  * USB: Fix descriptor count when handling invalid MBIM extended descriptor
    (git-fixes).
  * USB: OHCI/UHCI: Add soft dependencies on ehci_platform (stable-fixes).
  * USB: lpc32xx_udc: Fix error handling in probe (git-fixes).
  * USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).
  * USB: serial: ftdi_sio: add support for PICAXE AXE027 cable (stable-fixes).
  * USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).
  * USB: serial: ftdi_sio: match on interface number for jtag (stable-fixes).
  * USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).
  * USB: serial: option: add Foxconn T99W760 (stable-fixes).
  * USB: serial: option: add Quectel RG255C (stable-fixes).
  * USB: serial: option: add Telit Cinterion FE910C04 new compositions (stable-
    fixes).
  * USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).
  * USB: serial: option: add Telit FN920C04 RNDIS compositions (stable-fixes).
  * USB: serial: option: add Telit LE910 MBIM composition (stable-fixes).
  * USB: serial: option: add UNISOC UIS7720 (stable-fixes).
  * USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).
  * USB: serial: option: move Telit 0x10c7 composition in the right place
    (stable-fixes).
  * USB: storage: Remove subclass and protocol overrides from Novatek quirk
    (git-fixes).
  * Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792)
  * Workaround for hybrid git workflow in SLFO 1.0/1.1
  * arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes)
  * arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes)
  * ata: libata: Add cpr_log to ata_dev_print_features() early return (git-
    fixes).
  * ata: libata: avoid long timeouts on hot-unplugged SATA DAS (stable-fixes).
  * ata: pata_ftide010: Fix some DMA timings (git-fixes).
  * atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).
  * atm: Fix dma_free_coherent() size (git-fixes).
  * atm: fore200e: fix use-after-free in tasklets during device removal (git-
    fixes).
  * atm: idt77252: Add missing `dma_map_error()` (stable-fixes).
  * auxdisplay: arm-charlcd: fix release_mem_region() size (git-fixes).
  * backlight: led-bl: Add devlink to supplier LEDs (git-fixes).
  * backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).
  * backlight: qcom-wled: Change PM8950 WLED configurations (git-fixes).
  * backlight: qcom-wled: Support ovp values for PMI8994 (git-fixes).
  * bonding: only set speed/duplex to unknown, if getting speed failed
    (bsc#1253691).
  * bpf/selftests: test_select_reuseport_kern: Remove unused header
    (bsc#1257603).
  * bpf: Do not let BPF test infra emit invalid GSO types to stack
    (bsc#1255569).
  * bpf: Reject bpf_timer for PREEMPT_RT (git-fixes).
  * broadcom: b44: prevent uninitialized value usage (git-fixes).
  * bs-upload-kernel: Fix cve branch uploads
  * btrfs: do not strictly require dirty metadata threshold for metadata
    writepages (stable-fixes).
  * btrfs: make sure extent and csum paths are always released in
    scrub_raid56_parity_stripe() (git-fixes).
  * btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).
  * bus: fsl-mc: Replace snprintf and sprintf with sysfs_emit in sysfs show
    functions (stable-fixes).
  * bus: fsl-mc: fix an error handling in fsl_mc_device_add() (git-fixes).
  * bus: fsl-mc: fix use-after-free in driver_override_show() (git-fixes).
  * can: ctucanfd: fix SSP_SRC in cases when bit-rate is higher than 1 MBit
    (git-fixes).
  * can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak (git-fixes).
  * can: etas_es58x: allow partial RX URB allocation to succeed (git-fixes).
  * can: gs_usb: gs_can_open(): fix error handling (git-fixes).
  * can: gs_usb: gs_usb_receive_bulk_callback(): fix error message (git-fixes).
  * can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on
    usb_submit_urb() error (git-fixes).
  * can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs
    (git-fixes).
  * can: j1939: make j1939_session_activate() fail if device is no longer
    registered (stable-fixes).
  * can: j1939: make j1939_sk_bind() fail if device is no longer registered
    (git-fixes).
  * can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak (git-
    fixes).
  * can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-
    fixes).
  * can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak (git-
    fixes).
  * can: sja1000: fix max irq loop handling (git-fixes).
  * can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-
    fixes).
  * can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak (git-
    fixes).
  * char: applicom: fix NULL pointer dereference in ac_ioctl (stable-fixes).
  * char: tpm: cr50: Remove IRQF_ONESHOT (stable-fixes).
  * cifs: Fix copy offload to flush destination region (bsc#1252511).
  * cifs: Fix flushing, invalidation and file size with copy_file_range()
    (bsc#1252511).
  * cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).
  * cifs: add new field to track the last access time of cfid (git-fixes).
  * cifs: add xid to query server interface call (git-fixes).
  * cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).
  * cifs: avoid redundant calls to disable multichannel (git-fixes).
  * cifs: cifs_pick_channel should try selecting active channels (git-fixes).
  * cifs: deal with the channel loading lag while picking channels (git-fixes).
  * cifs: dns resolution is needed only for primary channel (git-fixes).
  * cifs: do not disable interface polling on failure (git-fixes).
  * cifs: do not search for channel if server is terminating (git-fixes).
  * cifs: fix a pending undercount of srv_count (git-fixes).
  * cifs: fix lock ordering while disabling multichannel (git-fixes).
  * cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).
  * cifs: fix use after free for iface while disabling secondary channels (git-
    fixes).
  * cifs: handle servers that still advertise multichannel after disabling (git-
    fixes).
  * cifs: handle when server starts supporting multichannel (git-fixes).
  * cifs: handle when server stops supporting multichannel (git-fixes).
  * cifs: make cifs_chan_update_iface() a void function (git-fixes).
  * cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).
  * cifs: make sure that channel scaling is done only once (git-fixes).
  * cifs: reconnect worker should take reference on server struct
    unconditionally (git-fixes).
  * cifs: reset connections for all channels when reconnect requested (git-
    fixes).
  * cifs: reset iface weights when we cannot find a candidate (git-fixes).
  * cifs: serialize other channels when query server interfaces is pending (git-
    fixes).
  * cifs: update dstaddr whenever channel iface is updated (git-fixes).
  * clk: clk-apple-nco: Add "apple,t8103-nco" compatible (git-fixes).
  * clk: mediatek: Fix error handling in runtime PM setup (git-fixes).
  * clk: meson: g12a: Limit the HDMI PLL OD to /4 (git-fixes).
  * clk: meson: gxbb: Limit the HDMI PLL OD to /4 on GXL/GXM SoCs (git-fixes).
  * clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).
  * clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to
    other (git-fixes).
  * clk: qcom: dispcc-sdm845: Enable parents for pixel clocks (git-fixes).
  * clk: qcom: gcc-msm8917: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).
  * clk: qcom: gcc-msm8953: Remove ALWAYS_ON flag from cpp_gdsc (git-fixes).
  * clk: qcom: gfx3d: add parent to parent request map (git-fixes).
  * clk: qcom: rcg2: compute 2d using duty fraction directly (git-fixes).
  * clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback
    (git-fixes).
  * clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).
  * clk: renesas: rzg2l: Fix intin variable size (git-fixes).
  * clk: renesas: rzg2l: Select correct div round macro (git-fixes).
  * clk: tegra: tegra124-emc: Fix potential memory leak in
    tegra124_clk_register_emc() (git-fixes).
  * clk: tegra: tegra124-emc: fix device leak on set_rate() (git-fixes).
  * clocksource: Print durations for sync check unconditionally (bsc#1241345).
  * clocksource: Reduce watchdog readout delay limit to prevent false positives
    (bsc#1241345).
  * comedi: Fix getting range information for subdevices 16 to 255 (git-fixes).
  * comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).
  * comedi: check device's attached status in compat ioctls (git-fixes).
  * comedi: dmm32at: serialize use of paged registers (git-fixes).
  * comedi: fix divide-by-zero in comedi_buf_munge() (stable-fixes).
  * comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).
  * comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).
  * cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-
    fixes).
  * cpuidle: menu: Use residency threshold in polling state override decisions
    (bsc#1255026).
  * crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
    (git-fixes).
  * crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-
    fixes).
  * crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN
    spec (git-fixes).
  * crypto: cavium - fix dma_free_coherent() size (git-fixes).
  * crypto: ccp - Add an S4 restore flow (git-fixes).
  * crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).
  * crypto: hisilicon/qm - restore original qos values (git-fixes).
  * crypto: hisilicon/sec2 - support skcipher/aead fallback for hardware queue
    unavailable (git-fixes).
  * crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).
  * crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
    (git-fixes).
  * crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
    (git-fixes).
  * crypto: octeontx - fix dma_free_coherent() size (git-fixes).
  * crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly (git-
    fixes).
  * crypto: qat - fix duplicate restarting msg during AER error (git-fixes).
  * crypto: qat - fix parameter order used in ICP_QAT_FW_COMN_FLAGS_BUILD (git-
    fixes).
  * crypto: qat - fix warning on adf_pfvf_pf_proto.c (git-fixes).
  * crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-
    fixes).
  * crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (git-fixes).
  * crypto: virtio - Add spinlock protection with virtqueue notification (git-
    fixes).
  * crypto: virtio - Remove duplicated virtqueue_kick in
    virtio_crypto_skcipher_crypt_req (git-fixes).
  * device property: Allow secondary lookup in fwnode_get_next_child_node()
    (git-fixes).
  * dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).
  * dm-verity: fix unreliable memory allocation (git-fixes).
  * dm: fix queue start/stop imbalance under suspend/load/resume races
    (bsc#1253386)
  * dma: dma-axi-dmac: fix SW cyclic transfers (git-fixes).
  * dmaengine: apple-admac: Add "apple,t8103-admac" compatible (git-fixes).
  * dmaengine: at_hdmac: fix device leak on of_dma_xlate() (git-fixes).
  * dmaengine: bcm-sba-raid: fix device leak on probe (git-fixes).
  * dmaengine: dw: dmamux: fix OF node leak on route allocation failure (git-
    fixes).
  * dmaengine: idxd: fix device leaks on compat bind and unbind (git-fixes).
  * dmaengine: lpc18xx-dmamux: fix device leak on route allocation (git-fixes).
  * dmaengine: mediatek: uart-apdma: Fix above 4G addressing TX/RX (git-fixes).
  * dmaengine: omap-dma: fix dma_pool resource leak in error paths (git-fixes).
  * dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config() (git-
    fixes).
  * dmaengine: sh: rz-dmac: Fix rz_dmac_terminate_all() (git-fixes).
  * dmaengine: sun6i: Choose appropriate burst length under maxburst (stable-
    fixes).
  * dmaengine: tegra-adma: Fix use-after-free (git-fixes).
  * dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation
    (git-fixes).
  * dmaengine: ti: dma-crossbar: fix device leak on dra7x route allocation (git-
    fixes).
  * dmaengine: ti: k3-udma: fix device leak on udma lookup (git-fixes).
  * dmaengine: xilinx: xdma: Fix regmap max_register (git-fixes).
  * dmaengine: xilinx_dma: Fix uninitialized addr_width when "xlnx,addrwidth"
    property is missing (git-fixes).
  * docs: ABI: sysfs-devices-soc: Fix swapped sample values (git-fixes).
  * docs: fix WARNING document not included in any toctree (stable-fixes).
  * docs: w1: fix w1-netlink invalid URL (git-fixes).
  * dpll: Prevent duplicate registrations (git-fixes).
  * dpll: fix device-id-get and pin-id-get to return errors properly (git-
    fixes).
  * dpll: fix return value check for kmemdup (git-fixes).
  * dpll: indent DPLL option type by a tab (git-fixes).
  * dpll: spec: add missing module-name and clock-id to pin-get reply (git-
    fixes).
  * drivers/usb/dwc3: fix PCI parent check (git-fixes).
  * drivers: iio: mpu3050: use dev_err_probe for regulator request (git-fixes).
  * drm/amd/display: Avoid updating surface with the same surface under MPO
    (stable-fixes).
  * drm/amd/display: Bump the HDMI clock to 340MHz (stable-fixes).
  * drm/amd/display: Check NULL before accessing (stable-fixes).
  * drm/amd/display: Fix DP no audio issue (stable-fixes).
  * drm/amd/display: Fix logical vs bitwise bug in
    get_embedded_panel_info_v2_1() (git-fixes).
  * drm/amd/display: Increase DPCD read retries (stable-fixes).
  * drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-
    fixes).
  * drm/amd/display: Use GFP_ATOMIC in dc_create_plane_state() (stable-fixes).
  * drm/amd/display: Use same max plane scaling limits for all 64 bpp formats
    (git-fixes).
  * drm/amd/display: fix wrong color value mapping on MCM shaper LUT (git-
    fixes).
  * drm/amd/pm: Do not clear SI SMC table when setting power limit (git-fixes).
  * drm/amd/pm: Workaround SI powertune issue on Radeon 430 (v2) (git-fixes).
  * drm/amd/pm: fix race in power state check before mutex lock (git-fixes).
  * drm/amd: Clean up kfd node on surprise disconnect (stable-fixes).
  * drm/amd: Fix hang on amdgpu unload by using pci_dev_is_disconnected() (git-
    fixes).
  * drm/amdgpu/gfx10: fix wptr reset in KGQ init (stable-fixes).
  * drm/amdgpu/gfx11: fix wptr reset in KGQ init (stable-fixes).
  * drm/amdgpu/soc21: fix xclk for APUs (stable-fixes).
  * drm/amdgpu: Add HAINAN clock adjustment (stable-fixes).
  * drm/amdgpu: Adjust usleep_range in fence wait (stable-fixes).
  * drm/amdgpu: Fix memory leak in amdgpu_acpi_enumerate_xcc() (git-fixes).
  * drm/amdgpu: Fix memory leak in amdgpu_ras_init() (git-fixes).
  * drm/amdgpu: Forward VMID reservation errors (git-fixes).
  * drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-
    fixes).
  * drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).
  * drm/amdgpu: add support for HDP IP version 6.1.1 (stable-fixes).
  * drm/amdgpu: avoid a warning in timedout job handler (stable-fixes).
  * drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove
    (git-fixes).
  * drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).
  * drm/amdgpu: fix sync handling in amdgpu_dma_buf_move_notify (git-fixes).
  * drm/amdgpu: update mappings not managed by KFD (bsc#1255428)
  * drm/amdkfd: Fix GART PTE for non-4K pagesize in svm_migrate_gart_map()
    (stable-fixes).
  * drm/amdkfd: Fix out-of-bounds write in kfd_event_page_set() (stable-fixes).
  * drm/amdkfd: Fix watch_id bounds checking in debug address watch v2 (git-
    fixes).
  * drm/amdkfd: fix a memory leak in device_queue_manager_init() (git-fixes).
  * drm/amdkfd: fix debug watchpoints for logical devices (stable-fixes).
  * drm/atmel-hlcdc: do not reject the commit if the src rect has fractional
    parts (stable-fixes).
  * drm/atmel-hlcdc: fix memory leak from the atomic_destroy_state callback
    (stable-fixes).
  * drm/atmel-hlcdc: fix use-after-free of drm_crtc_commit after release
    (stable-fixes).
  * drm/bridge: samsung-dsim: Fix memory leak in error path (git-fixes).
  * drm/bridge: ti-sn65dsi86: Enable HPD polling if IRQ is not used (git-fixes).
  * drm/buddy: Prevent BUG_ON by validating rounded allocation (git-fixes).
  * drm/display/dp_mst: Add protection against 0 vcpi (stable-fixes).
  * drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).
  * drm/i915/acpi: free _DSM package when no connectors (git-fixes).
  * drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer
    (git-fixes).
  * drm/i915/wakeref: clean up INTEL_WAKEREF_PUT_* flag macros (stable-fixes).
  * drm/imx/tve: fix probe device leak (git-fixes).
  * drm/logicvc: Fix device node reference leak in logicvc_drm_config_parse()
    (git-fixes).
  * drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).
  * drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-
    fixes).
  * drm/mgag200: Fix big-endian support (git-fixes).
  * drm/mgag200: fix mgag200_bmc_stop_scanout() (git-fixes).
  * drm/msm/a2xx: fix pixel shader start on A225 (git-fixes).
  * drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).
  * drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-
    fixes).
  * drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).
  * drm/msm/dpu: Add missing NULL pointer check for pingpong interface (git-
    fixes).
  * drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-
    fixes).
  * drm/msm/dpu: fix CMD panels on DPU 1.x - 3.x (git-fixes).
  * drm/nouveau/disp/nv50-: Set lock_core in curs507a_prepare (git-fixes).
  * drm/nouveau/dispnv50: Do not call drm_atomic_get_crtc_state() in prepare_fb
    (git-fixes).
  * drm/nouveau: add missing DCB connector types (git-fixes).
  * drm/nouveau: implement missing DCB connector types; gracefully handle
    unknown connectors (git-fixes).
  * drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).
  * drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel
    (git-fixes).
  * drm/panel: sony-td4353-jdi: Enable prepare_prev_first (git-fixes).
  * drm/pl111: Fix error handling in pl111_amba_probe (git-fixes).
  * drm/radeon: Add HAINAN clock adjustment (stable-fixes).
  * drm/radeon: Remove __counted_by from ClockInfoArray.clockInfo[] (stable-
    fixes).
  * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-
    fixes).
  * drm/tegra: dsi: fix device leak on probe (git-fixes).
  * drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used (stable-
    fixes).
  * drm/tilcdc: request and mapp iomem with devres (stable-fixes).
  * drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).
  * drm/v3d: Set DMA segment size to avoid debug warnings (stable-fixes).
  * drm/vgem-fence: Fix potential deadlock on release (git-fixes).
  * drm/vmwgfx: Fix an error return check in vmw_compat_shader_add() (git-
    fixes).
  * drm/vmwgfx: Fix invalid kref_put callback in vmw_bo_dirty_release (git-
    fixes).
  * drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (git-
    fixes).
  * drm/vmwgfx: Use kref in vmw_bo_dirty (stable-fixes).
  * drm: Account property blob allocations to memcg (stable-fixes).
  * drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).
  * drm: sti: fix device leaks at component probe (git-fixes).
  * efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-
    fixes).
  * efi/libstub: Fix page table access in 5-level to 4-level paging transition
    (git-fixes).
  * efi: Fix reservation of unaccepted memory table (git-fixes).
  * efivarfs: fix error propagation in efivar_entry_get() (git-fixes).
  * exfat: add a check for invalid data size (git-fixes).
  * exfat: using hweight instead of internal logic (git-fixes).
  * ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).
  * ext4: use optimized mballoc scanning regardless of inode format
    (bsc#1254378).
  * ext4: wait for ongoing I/O to complete before freeing blocks (bsc#1256366).
  * fbcon: check return value of con2fb_acquire_newinfo() (git-fixes).
  * fbdev: au1200fb: Fix a memory leak in au1200fb_drv_probe() (git-fixes).
  * fbdev: ffb: fix corrupted video output on Sun FFB1 (stable-fixes).
  * fbdev: gbefb: fix to use physical address instead of dma address (stable-
    fixes).
  * fbdev: of: display_timing: fix refcount leak in of_get_display_timings()
    (git-fixes).
  * fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-
    fixes).
  * fbdev: rivafb: fix divide error in nv3_arb() (git-fixes).
  * fbdev: smscufx: properly copy ioctl memory to kernelspace (stable-fixes).
  * fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).
  * fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).
  * fbdev: vt8500lcdfb: fix missing dma_free_coherent() (git-fixes).
  * firewire: nosy: Fix dma_free_coherent() size (git-fixes).
  * firmware: imx: scu-irq: Init workqueue before request mbox channel (stable-
    fixes).
  * firmware: imx: scu-irq: fix OF node leak in (git-fixes).
  * firmware: stratix10-svc: Add mutex in stratix10 memory management (git-
    fixes).
  * firmware: stratix10-svc: fix bug in saving controller data (git-fixes).
  * firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-
    fixes).
  * fix it87_wdt early reboot by reporting running timer (stable-fixes).
  * fpga: dfl: use subsys_initcall to allow built-in drivers to be added (git-
    fixes).
  * fpga: of-fpga-region: Fail if any bridge is missing (stable-fixes).
  * fs: dlm: allow to F_SETLKW getting interrupted (bsc#1255025).
  * genalloc.h: fix htmldocs warning (git-fixes).
  * gpio: aspeed-sgpio: Change the macro to support deferred probe (stable-
    fixes).
  * gpio: omap: do not register driver in probe() (git-fixes).
  * gpio: pca953x: Add support for level-triggered interrupts (stable-fixes).
  * gpio: pca953x: Utilise dev_err_probe() where it makes sense (stable-fixes).
  * gpio: pca953x: Utilise temporary variable for struct device (stable-fixes).
  * gpio: pca953x: fix wrong error probe return value (git-fixes).
  * gpio: pca953x: handle short interrupt pulses on PCAL devices (git-fixes).
  * gpio: pca953x: mask interrupts in irq shutdown (stable-fixes).
  * gpio: rockchip: Stop calling pinctrl for set_direction (git-fixes).
  * gpio: rockchip: mark the GPIO controller as sleeping (git-fixes).
  * gpio: sprd: Change sprd_gpio lock to raw_spin_lock (stable-fixes).
  * gpu: host1x: Fix race in syncpt alloc/free (git-fixes).
  * hwmon: (f71882fg) Add F81968 support (stable-fixes).
  * hwmon: (ibmpex) fix use-after-free in high/low store (git-fixes).
  * hwmon: (max16065) Use READ/WRITE_ONCE to avoid compiler optimization induced
    race (git-fixes).
  * hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).
  * hwmon: (nct6775) Add ASUS Pro WS WRX90E-SAGE SE (stable-fixes).
  * hwmon: (occ) Mark occ_init_attribute() as __printf (git-fixes).
  * hwmon: (tmp401) fix overflow caused by default conversion rate value (git-
    fixes).
  * hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).
  * hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).
  * hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-
    fixes).
  * i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).
  * i2c: designware: Disable SMBus interrupts to prevent storms from mis-
    configured firmware (stable-fixes).
  * i2c: i2c.h: fix a bad kernel-doc line (git-fixes).
  * i3c: Move device name assignment after i3c_bus_init (git-fixes).
  * i3c: dw: Initialize spinlock to avoid upsetting lockdep (git-fixes).
  * i3c: fix refcount inconsistency in i3c_master_register (git-fixes).
  * i3c: master: Inherit DMA masks and parameters from parent device (stable-
    fixes).
  * i3c: master: svc: Initialize 'dev' to NULL in svc_i3c_master_ibi_isr()
    (stable-fixes).
  * i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).
  * ice: use netif_get_num_default_rss_queues() (bsc#1247712).
  * idr: fix idr_alloc() returning an ID out of range (git-fixes).
  * iio: Use IRQF_NO_THREAD (stable-fixes).
  * iio: accel: bmc150: Fix irq assumption regression (stable-fixes).
  * iio: accel: fix ADXL355 startup race condition (git-fixes).
  * iio: accel: iis328dq: fix gain values (git-fixes).
  * iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).
  * iio: adc: ad7280a: handle spi_setup() errors in probe() (git-fixes).
  * iio: adc: ad9467: fix ad9434 vref mask (git-fixes).
  * iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc
    driver (git-fixes).
  * iio: adc: ti_am335x_adc: Limit step_avg to valid range for gcc complains
    (stable-fixes).
  * iio: core: Clean up device correctly on iio_device_alloc() failure (git-
    fixes).
  * iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).
  * iio: dac: ad5686: add AD5695R to ad5686_chip_info_tbl (git-fixes).
  * iio: gyro: itg3200: Fix unchecked return value in read_raw (git-fixes).
  * iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-
    fixes).
  * iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-
    fixes).
  * iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection
    (git-fixes).
  * iio: magnetometer: Remove IRQF_ONESHOT (stable-fixes).
  * iio: sca3000: Fix a resource leak in sca3000_probe() (git-fixes).
  * iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).
  * iio:common:ssp_sensors: Fix an error handling path ssp_probe() (git-fixes).
  * ima: Handle error code returned by ima_filter_rule_match() (git-fixes).
  * intel_th: Fix error handling in intel_th_output_open (git-fixes).
  * intel_th: fix device leak on output open() (git-fixes).
  * iomap: account for unaligned end offsets when truncating read range (git-
    fixes).
  * ipmi: Fix __scan_channels() failing to rescan channels (stable-fixes).
  * ipmi: Fix handling of messages with provided receive message pointer (git-
    fixes).
  * ipmi: Fix the race between __scan_channels() and deliver_response() (stable-
    fixes).
  * ipmi: Rework user message limit handling (git-fixes).
  * ipmi: ipmb: initialise event handler read bytes (git-fixes).
  * irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).
  * kABI workaround for HCI_LE_ADV_0 addition (git-fixes).
  * kconfig/mconf: Initialize the default locale at startup (stable-fixes).
  * kconfig/nconf: Initialize the default locale at startup (stable-fixes).
  * kernel-binary: Require libdw in Factory Libdw is required for gendwarfksyms
  * kernel-binary: Support building gendwarfksyms on SLE/Leap 15
  * landlock: Optimize file path walks and prepare for audit support
    (bsc#1255698).
  * leds: led-class: Only Add LED to leds_list when it is fully ready (git-
    fixes).
  * leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).
  * leds: leds-lp50xx: Enable chip before any communication (git-fixes).
  * leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-
    fixes).
  * leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).
  * leds: qcom-lpg: Check the return value of regmap_bulk_write() (git-fixes).
  * lib/crypto: aes: Fix missing MMU protection for AES S-box (git-fixes).
  * lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-
    fixes).
  * mISDN: annotate data-race around dev->work (git-fixes).
  * mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).
  * media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).
  * media: adv7180: fix frame interval in progressive mode (stable-fixes).
  * media: adv7842: Avoid possible out-of-bounds array accesses in
    adv7842_cp_log_status() (git-fixes).
  * media: amphion: Add a frame flush mode for decoder (stable-fixes).
  * media: amphion: Cancel message work before releasing the VPU core (git-
    fixes).
  * media: amphion: Clear last_buffer_dequeued flag for DEC_CMD_START (stable-
    fixes).
  * media: amphion: Make some vpu_v4l2 functions static (stable-fixes).
  * media: amphion: Remove vpu_vb_is_codecconfig (git-fixes).
  * media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973).
  * media: atomisp: Remove firmware_name module parameter (bsc#1252973).
  * media: ccs: Accommodate C-PHY into the calculation (git-fixes).
  * media: ccs: Avoid possible division by zero (git-fixes).
  * media: cec: Fix debugfs leak on bus_register() failure (git-fixes).
  * media: cx23885: Add missing unmap in snd_cx23885_hw_params() (git-fixes).
  * media: cx25821: Add missing unmap in snd_cx25821_hw_params() (git-fixes).
  * media: cx25821: Fix a resource leak in cx25821_dev_setup() (stable-fixes).
  * media: cx88: Add missing unmap in snd_cx88_hw_params() (git-fixes).
  * media: dvb-core: dmxdevfilter must always flush bufs (stable-fixes).
  * media: dvb-core: fix wrong reinitialization of ringbuffer on reopen (git-
    fixes).
  * media: dvb-net: fix OOB access in ULE extension header tables (git-fixes).
  * media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).
  * media: i2c/tw9903: Fix potential memory leak in tw9903_probe() (git-fixes).
  * media: i2c/tw9906: Fix potential memory leak in tw9906_probe() (git-fixes).
  * media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-
    fixes).
  * media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-
    fixes).
  * media: i2c: ov5647: Correct minimum VBLANK value (git-fixes).
  * media: i2c: ov5647: Correct pixel array offset (git-fixes).
  * media: i2c: ov5647: Fix PIXEL_RATE value for VGA mode (git-fixes).
  * media: i2c: ov5647: Initialize subdev before controls (git-fixes).
  * media: i2c: ov5647: Sensor should report RAW color space (git-fixes).
  * media: i2c: ov5647: use our own mutex for the ctrl lock (git-fixes).
  * media: msp3400: Avoid possible out-of-bounds array accesses in
    msp3400c_thread() (git-fixes).
  * media: mtk-mdp: Fix a reference leak bug in mtk_mdp_remove() (git-fixes).
  * media: mtk-mdp: Fix error handling in probe function (git-fixes).
  * media: omap3isp: isp_video_mbus_to_pix/pix_to_mbus fixes (stable-fixes).
  * media: omap3isp: isppreview: always clamp in preview_try_format() (stable-
    fixes).
  * media: omap3isp: set initial format (stable-fixes).
  * media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).
  * media: pvrusb2: fix URB leak in pvr2_send_request_ex (stable-fixes).
  * media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update()
    (git-fixes).
  * media: radio-keene: fix memory leak in error path (git-fixes).
  * media: rc: st_rc: Fix reset control resource leak (git-fixes).
  * media: renesas: rcar_drif: fix device node reference leak in
    rcar_drif_bond_enabled (git-fixes).
  * media: rkisp1: Fix filter mode register configuration (stable-fixes).
  * media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).
  * media: solo6x10: Check for out of bounds chip_id (stable-fixes).
  * media: uvcvideo: Fix allocation for small frame sizes (git-fixes).
  * media: v4l2-mem2mem: Fix outdated documentation (git-fixes).
  * media: venus: vdec: fix error state assignment for zero bytesused (git-
    fixes).
  * media: verisilicon: Fix CPU stalls on G2 bus error (git-fixes).
  * media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-
    fixes).
  * media: verisilicon: Store chroma and motion vectors offset (stable-fixes).
  * media: verisilicon: g2: Use common helpers to compute chroma and mv offsets
    (stable-fixes).
  * media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-
    fixes).
  * media: vidtv: initialize local pointers upon transfer of memory ownership
    (git-fixes).
  * media: vpif_capture: fix section mismatch (git-fixes).
  * media: vpif_display: fix section mismatch (git-fixes).
  * mei: me: add nova lake point S DID (stable-fixes).
  * mei: me: add wildcat lake P DID (stable-fixes).
  * mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).
  * mfd: arizona: Fix regulator resource leak on wm5102_clear_write_sequencer()
    failure (git-fixes).
  * mfd: core: Add locking around 'mfd_of_node_list' (git-fixes).
  * mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).
  * mfd: max77620: Fix potential IRQ chip conflict when probing two devices
    (git-fixes).
  * mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).
  * mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).
  * mfd: tps6105x: Fix kernel-doc warnings relating to the core struct and
    tps6105x_mode (git-fixes).
  * mfd: wm8350-core: Use IRQF_ONESHOT (git-fixes).
  * misc: bcm_vk: Fix possible null-pointer dereferences in bcm_vk_read()
    (stable-fixes).
  * misc: eeprom: Fix EWEN/EWDS/ERAL commands for 93xx56 and 93xx66 (stable-
    fixes).
  * mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations
    (bsc#1254447 bsc#1253087).
  * mmc: mmci: Fix device_node reference leak in of_get_dml_pipe_index() (git-
    fixes).
  * mmc: rtsx_pci_sdmmc: implement sdmmc_card_busy function (git-fixes).
  * mmc: rtsx_pci_sdmmc: increase power-on settling delay to 5ms (git-fixes).
  * mmc: sdhci-esdhc-imx: add alternate ARCH_S32 dependency to Kconfig (git-
    fixes).
  * mmc: sdhci-msm: Avoid early clock doubling during HS400 transition (stable-
    fixes).
  * mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
    (git-fixes).
  * most: usb: fix double free on late probe failure (git-fixes).
  * mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).
  * mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).
  * mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-
    fixes).
  * mtd: nand: relax ECC parameter validation check (git-fixes).
  * mtd: parsers: Fix memory leak in mtd_parser_tplink_safeloader_parse() (git-
    fixes).
  * mtd: parsers: ofpart: fix OF node refcount leak in parse_fixed_partitions()
    (git-fixes).
  * mtd: rawnand: cadence: Fix return type of CDMA send-and-wait helper (git-
    fixes).
  * mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and
    remove (git-fixes).
  * mtd: rawnand: pl353: Fix software ECC support (git-fixes).
  * mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).
  * mtd: spinand: Fix kernel doc (git-fixes).
  * myri10ge: avoid uninitialized variable use (stable-fixes).
  * net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon
    receiving the second rts (git-fixes).
  * net: hv_netvsc: reject RSS hash key programming without RX indirection table
    (bsc#1257473).
  * net: mdio: aspeed: add dummy read to avoid read-after-write issue (git-
    fixes).
  * net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
    (git-fixes).
  * net: nfc: nci: Fix parameter validation for packet data (git-fixes).
  * net: phy: adin1100: Fix software power-down ready condition (git-fixes).
  * net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-
    fixes).
  * net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-
    fixes).
  * net: rose: fix invalid array index in rose_kill_by_device() (git-fixes).
  * net: tcp: allow zero-window ACK update the window (bsc#1254767).
  * net: usb: catc: enable basic endpoint checking (git-fixes).
  * net: usb: dm9601: remove broken SR9700 support (git-fixes).
  * net: usb: kalmia: validate USB endpoints (git-fixes).
  * net: usb: kaweth: remove TX queue manipulation in kaweth_set_rx_mode (git-
    fixes).
  * net: usb: kaweth: validate USB endpoints (git-fixes).
  * net: usb: lan78xx: scan all MDIO addresses on LAN7801 (git-fixes).
  * net: usb: pegasus: enable basic endpoint checking (git-fixes).
  * net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes).
  * net: usb: r8152: fix transmit queue timeout (stable-fixes).
  * net: usb: rtl8150: fix memory leak on usb_submit_urb() failure (git-fixes).
  * net: usb: sr9700: fix incorrect command used to write single register (git-
    fixes).
  * net: usb: sr9700: remove code to drive nonexistent multicast filter (stable-
    fixes).
  * net: usb: sr9700: support devices with virtual driver CD (stable-fixes).
  * net: wan/fsl_ucc_hdlc: Fix dma_free_coherent() in uhdlc_memclean() (git-
    fixes).
  * net: wan: farsync: Fix use-after-free bugs caused by unfinished tasklets
    (git-fixes).
  * net: wwan: iosm: Fix memory leak in ipc_mux_deinit() (git-fixes).
  * net: wwan: t7xx: fix potential skb->frags overflow in RX path (git-fixes).
  * nfc: hci: shdlc: Stop timers and work before freeing context (git-fixes).
  * nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame() (git-fixes).
  * nfc: nci: Fix race between rfkill and nci_unregister_device() (git-fixes).
  * nfc: nxp-nci: remove interrupt trigger type (stable-fixes).
  * nfc: pn533: Fix error code in pn533_acr122_poweron_rdr() (git-fixes).
  * nfc: pn533: properly drop the usb interface reference on disconnect (git-
    fixes).
  * ntb: ntb_hw_switchtec: Fix array-index-out-of-bounds access (stable-fixes).
  * ntb: ntb_hw_switchtec: Fix shift-out-of-bounds for 0 mw lut (stable-fixes).
  * nvme: Use non zero KATO for persistent discovery connections (git-fixes).
  * of: fix reference count leak in of_alias_scan() (git-fixes).
  * of: platform: Use default match table for /firmware (git-fixes).
  * orangefs: fix xattr related buffer overflow.. (git-fixes).
  * phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).
  * phy: freescale: imx8m-pcie: assert phy reset during power on (stable-fixes).
  * phy: fsl-imx8mq-usb: disable bind/unbind platform driver feature (stable-
    fixes).
  * phy: mvebu-cp110-utmi: fix dr_mode property read from dts (stable-fixes).
  * phy: renesas: rcar-gen3-usb2: Fix an error handling path in
    rcar_gen3_phy_usb2_probe() (git-fixes).
  * phy: rockchip: inno-usb2: fix communication disruption in gadget mode (git-
    fixes).
  * phy: rockchip: inno-usb2: fix disconnection in gadget mode (git-fixes).
  * phy: stm32-usphyc: Fix off by one in probe() (git-fixes).
  * phy: tegra: xusb: Explicitly configure HS_DISCON_LEVEL to 0x7 (git-fixes).
  * pinctrl: equilibrium: Fix device node reference leak in pinbank_init() (git-
    fixes).
  * pinctrl: meson: mark the GPIO controller as sleeping (git-fixes).
  * pinctrl: qcom: lpass-lpi: mark the GPIO controller as sleeping (git-fixes).
  * pinctrl: qcom: msm: Fix deadlock in pinmux configuration (stable-fixes).
  * pinctrl: qcom: sm8250-lpass-lpi: Fix i2s2_data_groups definition (git-
    fixes).
  * pinctrl: single: Fix PIN_CONFIG_BIAS_DISABLE handling (stable-fixes).
  * pinctrl: single: Fix incorrect type for error return variable (git-fixes).
  * pinctrl: single: fix refcount leak in pcs_add_gpio_func() (git-fixes).
  * pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).
  * platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).
  * platform/chrome: cros_ec_lightbar: Fix response size initialization (git-
    fixes).
  * platform/chrome: cros_typec_switch: Do not touch struct fwnode_handle::dev
    (git-fixes).
  * platform/mellanox: mlxbf-pmc: Remove trailing whitespaces from event names
    (git-fixes).
  * platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro (stable-fixes).
  * platform/x86/amd/pmc: Add spurious_8042 to Xbox Ally (stable-fixes).
  * platform/x86/amd: pmc: Add Lenovo Legion Go 2 to pmc quirk list (stable-
    fixes).
  * platform/x86/intel/hid: Add Dell Pro Rugged 10/12 tablet to VGBS DMI quirks
    (stable-fixes).
  * platform/x86: acer-wmi: Ignore backlight event (stable-fixes).
  * platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-
    fixes).
  * platform/x86: classmate-laptop: Add missing NULL pointer checks (stable-
    fixes).
  * platform/x86: huawei-wmi: add keys for HONOR models (stable-fixes).
  * platform/x86: ibm_rtl: fix EBDA signature search pointer arithmetic (git-
    fixes).
  * platform/x86: intel: chtwc_int33fe: do not dereference swnode args (git-
    fixes).
  * platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).
  * platform/x86: intel_telemetry: Fix PSS event register mask (git-fixes).
  * platform/x86: intel_telemetry: Fix swapped arrays in PSS output (git-fixes).
  * platform/x86: msi-laptop: add missing sysfs_remove_group() (git-fixes).
  * platform/x86: panasonic-laptop: Fix sysfs group leak in error path (stable-
    fixes).
  * platform/x86: toshiba_haps: Fix memory leaks in add/remove routines (git-
    fixes).
  * power: reset: nvmem-reboot-mode: respect cell size for nvmem_cell_write
    (git-fixes).
  * power: supply: ab8500: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: act8945a: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: apm_power: only unset own apm_get_power_status (git-fixes).
  * power: supply: bq256xx: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: bq25980: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: bq27xxx: fix wrong errno when bus ops are unsupported (git-
    fixes).
  * power: supply: cpcap-battery: Fix use-after-free in power_supply_changed()
    (git-fixes).
  * power: supply: cw2015: Check devm_delayed_work_autocancel() return code
    (git-fixes).
  * power: supply: goldfish: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: qcom_battmgr: Recognize "LiP" as lithium-polymer (git-fixes).
  * power: supply: rt9455: Fix use-after-free in power_supply_changed() (git-
    fixes).
  * power: supply: rt9467: Prevent using uninitialized local variable in
    rt9467_set_value_from_ranges() (git-fixes).
  * power: supply: rt9467: Return error on failure in
    rt9467_set_value_from_ranges() (git-fixes).
  * power: supply: sbs-battery: Fix use-after-free in power_supply_changed()
    (git-fixes).
  * power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).
  * power: supply: wm97xx: Fix NULL pointer dereference in
    power_supply_changed() (git-fixes).
  * powercap: fix race condition in register_control_type() (stable-fixes).
  * powercap: fix sscanf() error return value handling (stable-fixes).
  * powercap: intel_rapl_tpmi: Remove FW_BUG from invalid version check (git-
    fixes).
  * powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022
    ltc#211187).
  * powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).
  * powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event
    handling (bsc#1253262 ltc#216029).
  * powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285
    bsc#1205462 bsc#1253739 bsc#1254244).
  * pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-
    fixes).
  * rapidio: replace rio_free_net() with kfree() in rio_scan_alloc_net() (git-
    fixes).
  * regmap: Fix race condition in hwspinlock irqsave routine (git-fixes).
  * regmap: maple: free entry on mas_store_gfp() failure (stable-fixes).
  * regulator: core: Protect regulator_supply_alias_list with
    regulator_list_mutex (git-fixes).
  * regulator: core: disable supply if enabling main regulator fails (git-
    fixes).
  * regulator: core: fix locking in regulator_resolve_supply() error path (git-
    fixes).
  * regulator: core: move supply check earlier in set_machine_constraints()
    (git-fixes).
  * remove a bpf CVE change which is already part of the base kernel
  * remove an Intel CPU model change which is already part of the base kernel
  * reset: fix BIT macro reference (stable-fixes).
  * rpm/mkspec-dtb: add riscv64 dtb-thead subpackage
  * rpmsg: core: fix race in driver_override_show() and use core helper (git-
    fixes).
  * rpmsg: glink: fix rpmsg device leak (git-fixes).
  * rtc: gamecube: Check the return value of ioremap() (git-fixes).
  * rtc: interface: Alarm race handling should not discard preceding error (git-
    fixes).
  * rtc: zynqmp: correct frequency value (stable-fixes).
  * sched: Increase sched_tick_remote timeout (bsc#1254510).
  * scripts/python/git_sort/git_sort.yaml: add cifs for-next repository
  * scripts: obsapi: Support URL trailing / in oscrc
  * scripts: teaapi: Add paging
  * scripts: uploader: Fix no change condition for _maintainership.json
  * scripts: uploader: Handle missing upstream in is_pr_open
  * scrits: teaapi: Add list_repos
  * scsi: lpfc: Add capability to register Platform Name ID to fabric
    (bsc#1254119).
  * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology
    (bsc#1254119).
  * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
  * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology
    (bsc#1254119).
  * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI
    (bsc#1254119).
  * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
  * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb()
    (bsc#1254119).
  * scsi: lpfc: Revise discovery related function headers and comments
    (bsc#1254119).
  * scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256861).
  * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
  * scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256861).
  * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
  * scsi: qla2xxx: Add Speed in SFP print information (bsc#1256863).
  * scsi: qla2xxx: Add bsg interface to support firmware img validation
    (bsc#1256863).
  * scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx
    (bsc#1256863).
  * scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256863).
  * scsi: qla2xxx: Allow recovery for tape devices (bsc#1256863).
  * scsi: qla2xxx: Delay module unload while fabric scan in progress
    (bsc#1256863).
  * scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256863).
  * scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256863).
  * scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256863).
  * scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256863).
  * scsi: qla2xxx: Validate MCU signature before executing MBC 03h
    (bsc#1256863).
  * scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256863).
  * scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
  * selftests/bpf: Skip timer cases when bpf_timer is not supported (git-fixes).
  * serial: 8250: 8250_omap.c: Clear DMA RX running status only after DMA
    termination is done (stable-fixes).
  * serial: 8250_dw: handle clock enable errors in runtime_resume (stable-
    fixes).
  * serial: 8250_pci: Fix broken RS485 for F81504/508/512 (git-fixes).
  * serial: SH_SCI: improve "DMA support" prompt (git-fixes).
  * serial: add support of CPCI cards (stable-fixes).
  * serial: amba-pl011: prefer dma_mapping_error() over explicit address
    checking (git-fixes).
  * serial: imx: change SERIAL_IMX_CONSOLE to bool (git-fixes).
  * serial: sprd: Return -EPROBE_DEFER when uart clock is not ready (stable-
    fixes).
  * shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).
  * slimbus: core: fix OF node leak on registration failure (git-fixes).
  * slimbus: core: fix device reference leak on report present (git-fixes).
  * slimbus: core: fix of_slim_get_device() kernel doc (git-fixes).
  * slimbus: core: fix runtime PM imbalance on report present (git-fixes).
  * slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-
    fixes).
  * smb3: add missing null server pointer check (git-fixes).
  * smb: change return type of cached_dir_lease_break() to bool (git-fixes).
  * smb: client: ensure open_cached_dir_by_dentry() only returns valid cfid
    (git-fixes).
  * smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).
  * smb: client: fix warning when reconnecting channel (git-fixes).
  * smb: client: introduce close_cached_dir_locked() (git-fixes).
  * smb: client: remove unused fid_lock (git-fixes).
  * smb: client: short-circuit in open_cached_dir_by_dentry() if !dentry (git-
    fixes).
  * smb: client: split cached_fid bitfields to avoid shared-byte RMW races
    (bsc#1250748,bsc#1257154).
  * smb: client: update cfid->last_access_time in open_cached_dir_by_dentry()
    (git-fixes).
  * smb: improve directory cache reuse for readdir operations (bsc#1252712).
  * smc91x: fix broken irq-context in PREEMPT_RT (git-fixes).
  * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
  * soc: amlogic: canvas: fix device leak on lookup (git-fixes).
  * soc: mediatek: svs: Fix memory leak in svs_enable_debug_write() (git-fixes).
  * soc: qcom: cmd-db: Use devm_memremap() to fix memory leak in
    cmd_db_dev_probe (git-fixes).
  * soc: qcom: ocmem: fix device leak on lookup (git-fixes).
  * soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-
    fixes).
  * soc: qcom: smem: handle ENOMEM error during probe (git-fixes).
  * soc: ti: k3-socinfo: Fix regmap leak on probe failure (git-fixes).
  * soc: ti: pruss: Fix double free in pruss_clk_mux_setup() (git-fixes).
  * soundwire: dmi-quirks: add mapping for Avell B.ON (OEM rebranded of NUC15)
    (stable-fixes).
  * spi-geni-qcom: initialize mode related registers to 0 (stable-fixes).
  * spi-geni-qcom: use xfer->bits_per_word for can_dma() (stable-fixes).
  * spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).
  * spi: bcm63xx: drop wrong casts in probe() (git-fixes).
  * spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-
    fixes).
  * spi: fsl-cpm: Check length parity before switching to 16 bit mode (git-
    fixes).
  * spi: imx: keep dma request disabled before dma transfer setup (stable-
    fixes).
  * spi: spi-mem: Limit octal DTR constraints to octal DTR situations (stable-
    fixes).
  * spi: spi-mem: Protect dirmap_create() with spi_mem_access_start/end (stable-
    fixes).
  * spi: spi-sprd-adi: Fix double free in probe error path (git-fixes).
  * spi: sprd-adi: switch to use spi_alloc_host() (stable-fixes).
  * spi: sprd: adi: Use devm_register_restart_handler() (stable-fixes).
  * spi: stm32: fix Overrun issue at < 8bpw (stable-fixes).
  * spi: tegra114: Preserve SPI mode bits in def_command1_reg (git-fixes).
  * spi: tegra210-qspi: Remove cache operations (git-fixes)
  * spi: tegra210-quad: Add support for internal DMA (git-fixes)
  * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)
  * spi: tegra210-quad: Fix timeout handling (bsc#1253155)
  * spi: tegra210-quad: Fix timeout handling (git-fixes).
  * spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)
  * spi: tegra210-quad: Move curr_xfer read inside spinlock (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer assignment in
    tegra_qspi_setup_transfer_one (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer check in IRQ handler (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer clearing in
    tegra_qspi_non_combined_seq_xfer (git-fixes).
  * spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
    (bsc#1257952)
  * spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (git-
    fixes).
  * spi: tegra210-quad: Refactor error handling into helper functions
    (bsc#1253155)
  * spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed
    (bsc#1257952)
  * spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed
    transfer (git-fixes).
  * spi: tegra210-quad: Update dummy sequence configuration (git-fixes)
  * spi: tegra: Fix a memory leak in tegra_slink_probe() (git-fixes).
  * spi: wpcm-fiu: Fix potential NULL pointer dereference in wpcm_fiu_probe()
    (git-fixes).
  * spi: wpcm-fiu: Fix uninitialized res (git-fixes).
  * spi: wpcm-fiu: Simplify with dev_err_probe() (stable-fixes).
  * spi: wpcm-fiu: Use devm_platform_ioremap_resource_byname() (stable-fixes).
  * spi: xilinx: increase number of retries before declaring stall (stable-
    fixes).
  * staging: fbtft: core: fix potential memory leak in fbtft_probe_common()
    (git-fixes).
  * staging: rtl8723bs: fix memory leak on failure path (stable-fixes).
  * staging: rtl8723bs: fix null dereference in find_network (git-fixes).
  * staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing
    (stable-fixes).
  * staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser (stable-
    fixes).
  * supported.conf: Mark lan 743x supported (jsc#PED-14571)
  * thermal: int340x: Fix sysfs group leak on DLVR registration failure (stable-
    fixes).
  * thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).
  * tools/power cpupower: Reset errno before strtoull() (stable-fixes).
  * tools/power/x86/intel-speed-select: Fix file descriptor leak in
    isolate_cpus() (git-fixes).
  * tpm: st33zp24: Fix missing cleanup on get_burstcount() error (git-fixes).
  * tpm: tpm_i2c_infineon: Fix locality leak on get_burstcount() failure (git-
    fixes).
  * tracing: Fix access to trace_event_file (bsc#1254373).
  * uacce: ensure safe queue release with state management (git-fixes).
  * uacce: fix cdev handling in the cleanup path (git-fixes).
  * uacce: fix isolate sysfs check condition (git-fixes).
  * uacce: implement mremap in uacce_vm_ops to return -EPERM (git-fixes).
  * uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe
    (git-fixes).
  * usb: bdc: fix sleep during atomic (git-fixes).
  * usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).
  * usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).
  * usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).
  * usb: core: add USB_QUIRK_NO_BOS for devices that hang on BOS descriptor
    (stable-fixes).
  * usb: dwc2: disable platform lowlevel hw resources during shutdown (stable-
    fixes).
  * usb: dwc2: fix hang during shutdown if set as peripheral (git-fixes).
  * usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).
  * usb: dwc2: fix resume failure if dr_mode is host (git-fixes).
  * usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).
  * usb: dwc3: Check for USB4 IP_NAME (stable-fixes).
  * usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call
    paths (git-fixes).
  * usb: dwc3: keep susphy enabled during exit to avoid controller faults (git-
    fixes).
  * usb: dwc3: of-simple: fix clock resource leak in dwc3_of_simple_probe (git-
    fixes).
  * usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).
  * usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).
  * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
  * usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).
  * usb: gadget: lpc32xx_udc: fix clock imbalance in error path (git-fixes).
  * usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-
    fixes).
  * usb: gadget: tegra-xudc: Add handling for BLCG_COREPLL_PWRDN (git-fixes).
  * usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt
    (git-fixes).
  * usb: ohci-nxp: Use helper function devm_clk_get_enabled() (stable-fixes).
  * usb: ohci-nxp: fix device leak on probe failure (git-fixes).
  * usb: phy: Initialize struct usb_phy list_head (git-fixes).
  * usb: phy: isp1301: fix non-OF device reference imbalance (git-fixes).
  * usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).
  * usb: raw-gadget: do not limit transfer length (git-fixes).
  * usb: renesas_usbhs: Fix a resource leak in usbhs_pipe_malloc() (git-fixes).
  * usb: storage: Fix memory leak in USB bulk transport (git-fixes).
  * usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).
  * usb: typec: tipd: Clear interrupts first (git-fixes).
  * usb: typec: ucsi: Handle incorrect num_connectors capability (stable-fixes).
  * usb: typec: ucsi: psy: Set max current to zero when disconnected (git-
    fixes).
  * usb: uas: fix urb unmapping issue when the uas device is remove during
    ongoing data transfer (git-fixes).
  * usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).
  * usb: usb-storage: Maintain minimal modifications to the bcdDevice range
    (git-fixes).
  * usb: usb-storage: No additional quirks need to be added to the EL-R12
    optical drive (stable-fixes).
  * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
  * usb: xhci: limit run_graceperiod for only usb 3.0 devices (stable-fixes).
  * usbip: Fix locking bug in RT-enabled kernels (stable-fixes).
  * usbnet: limit max_mtu based on device's hard_mtu (git-fixes).
  * via_wdt: fix critical boot hang due to unnamed resource allocation (stable-
    fixes).
  * virtio_console: fix order of fields cols and rows (stable-fixes).
  * w1: fix redundant counter decrement in w1_attach_slave_device() (git-fixes).
  * w1: therm: Fix off-by-one buffer overflow in alarms_store (git-fixes).
  * watchdog: imx7ulp_wdt: handle the nowayout option (stable-fixes).
  * watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).
  * wifi: ath10k: fix dma_free_coherent() pointer (git-fixes).
  * wifi: ath10k: fix lock protection in
    ath10k_wmi_event_peer_sta_ps_state_chg() (stable-fixes).
  * wifi: ath10k: sdio: add missing lock protection in
    ath10k_sdio_fw_crashed_dump() (git-fixes).
  * wifi: ath11k: add pm quirk for Thinkpad Z13/Z16 Gen1 (stable-fixes).
  * wifi: ath11k: fix peer HE MCS assignment (git-fixes).
  * wifi: ath11k: restore register window after global reset (git-fixes).
  * wifi: ath12k: fix dma_free_coherent() pointer (git-fixes).
  * wifi: ath12k: fix preferred hardware mode calculation (stable-fixes).
  * wifi: ath9k: debug.h: fix kernel-doc bad lines and struct ath_tx_stats (git-
    fixes).
  * wifi: ath9k: fix kernel-doc warnings in common-debug.h (git-fixes).
  * wifi: avoid kernel-infoleak from struct iw_point (git-fixes).
  * wifi: brcmfmac: Add DMI nvram filename quirk for Acer A1 840 tablet (stable-
    fixes).
  * wifi: cfg80211: Fix bitrate calculation overflow for HE rates (stable-
    fixes).
  * wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).
  * wifi: cfg80211: cancel rfkill_block work in wiphy_unregister() (git-fixes).
  * wifi: cfg80211: sme: store capped length in __cfg80211_connect_result()
    (git-fixes).
  * wifi: cfg80211: stop NAN and P2P in cfg80211_leave (git-fixes).
  * wifi: cfg80211: wext: fix IGTK key ID off-by-one (git-fixes).
  * wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-
    fixes).
  * wifi: ieee80211: correct FILS status codes (git-fixes).
  * wifi: iwlegacy: add missing mutex protection in il3945_store_measurement()
    (stable-fixes).
  * wifi: iwlegacy: add missing mutex protection in il4965_store_tx_power()
    (stable-fixes).
  * wifi: iwlwifi: mvm: check the validity of noa_len (stable-fixes).
  * wifi: libertas: fix WARNING in usb_tx_block (stable-fixes).
  * wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration (git-
    fixes).
  * wifi: mac80211: collect station statistics earlier when disconnect (stable-
    fixes).
  * wifi: mac80211: correctly check if CSA is active (stable-fixes).
  * wifi: mac80211: correctly decode TTLM with default link map (git-fixes).
  * wifi: mac80211: do not increment crypto_tx_tailroom_needed_cnt twice
    (stable-fixes).
  * wifi: mac80211: do not use old MBSSID elements (git-fixes).
  * wifi: mac80211: fix CMAC functions not handling errors (git-fixes).
  * wifi: mac80211: fix NULL pointer dereference in mesh_rx_csa_frame() (git-
    fixes).
  * wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (stable-
    fixes).
  * wifi: mac80211: restore non-chanctx injection behaviour (git-fixes).
  * wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).
  * wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).
  * wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-
    fixes).
  * wifi: radiotap: reject radiotap with unknown bits (git-fixes).
  * wifi: rsi: Fix memory corruption due to not set vif driver data size (git-
    fixes).
  * wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-
    fixes).
  * wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()
    (git-fixes).
  * wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add (git-fixes).
  * wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() (git-
    fixes).
  * wifi: rtw88: 8822b: Avoid WARNING in rtw8822b_config_trx_mode() (stable-
    fixes).
  * wifi: rtw88: Add USB ID 2001:3329 for D-Link AC13U rev. A1 (stable-fixes).
  * wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() (git-fixes).
  * wifi: rtw88: fix DTIM period handling when conf->dtim_period is zero
    (stable-fixes).
  * wifi: rtw88: limit indirect IO under powered off for RTL8822CS (git-fixes).
  * wifi: rtw88: rtw8821cu: Add ID for Mercusys MU6H (stable-fixes).
  * wifi: rtw89: pci: restore LDO setting after device resume (stable-fixes).
  * wifi: rtw89: wow: add reason codes for disassociation in WoWLAN mode
    (stable-fixes).
  * wifi: wlcore: ensure skb headroom before skb_push (stable-fixes).
  * workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)
  * x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-
    fixes).
  * x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).
  * x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).
  * x86/microcode/AMD: Add more known models to entry sign checking
    (bsc#1256528).
  * x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).
  * x86/microcode/AMD: Clean the cache if update did not load microcode
    (bsc#1256528).
  * x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any
    unreleased standalone Zen5 microcode patches (bsc#1256528).
  * x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo
    (bsc#1256528).
  * x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).
  * x86/microcode/AMD: Limit Entrysign signature checking to known generations
    (bsc#1256528).
  * x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).
  * x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).
  * x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).
  * x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).
  * x86: make page fault handling disable interrupts properly (git-fixes).
  * xhci: dbgtty: fix device unregister (git-fixes).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Micro 6.1  
    zypper in -t patch SUSE-SLE-
Micro-6.1-SUSE_SLFO_Kernel_1.0_Build__patchinfo.20260318123508089091.81512048240641=1

## Package List:

  * SUSE Linux Micro 6.1 (noarch)
    * kernel-source-rt-6.4.0-40.1
    * kernel-devel-rt-6.4.0-40.1
  * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64)
    * kernel-rt-6.4.0-40.1
  * SUSE Linux Micro 6.1 (aarch64 x86_64)
    * kernel-rt-debugsource-6.4.0-40.1
    * kernel-rt-debuginfo-6.4.0-40.1
    * kernel-rt-devel-6.4.0-40.1
  * SUSE Linux Micro 6.1 (x86_64)
    * kernel-rt-livepatch-6.4.0-40.1
    * kernel-rt-devel-debuginfo-6.4.0-40.1

## References:

  * https://www.suse.com/security/cve/CVE-2023-42752.html
  * https://www.suse.com/security/cve/CVE-2023-53714.html
  * https://www.suse.com/security/cve/CVE-2023-53743.html
  * https://www.suse.com/security/cve/CVE-2023-53750.html
  * https://www.suse.com/security/cve/CVE-2023-53752.html
  * https://www.suse.com/security/cve/CVE-2023-53759.html
  * https://www.suse.com/security/cve/CVE-2023-53762.html
  * https://www.suse.com/security/cve/CVE-2023-53766.html
  * https://www.suse.com/security/cve/CVE-2023-53768.html
  * https://www.suse.com/security/cve/CVE-2023-53777.html
  * https://www.suse.com/security/cve/CVE-2023-53778.html
  * https://www.suse.com/security/cve/CVE-2023-53782.html
  * https://www.suse.com/security/cve/CVE-2023-53784.html
  * https://www.suse.com/security/cve/CVE-2023-53785.html
  * https://www.suse.com/security/cve/CVE-2023-53787.html
  * https://www.suse.com/security/cve/CVE-2023-53791.html
  * https://www.suse.com/security/cve/CVE-2023-53792.html
  * https://www.suse.com/security/cve/CVE-2023-53793.html
  * https://www.suse.com/security/cve/CVE-2023-53794.html
  * https://www.suse.com/security/cve/CVE-2023-53795.html
  * https://www.suse.com/security/cve/CVE-2023-53797.html
  * https://www.suse.com/security/cve/CVE-2023-53799.html
  * https://www.suse.com/security/cve/CVE-2023-53807.html
  * https://www.suse.com/security/cve/CVE-2023-53808.html
  * https://www.suse.com/security/cve/CVE-2023-53813.html
  * https://www.suse.com/security/cve/CVE-2023-53815.html
  * https://www.suse.com/security/cve/CVE-2023-53817.html
  * https://www.suse.com/security/cve/CVE-2023-53819.html
  * https://www.suse.com/security/cve/CVE-2023-53821.html
  * https://www.suse.com/security/cve/CVE-2023-53823.html
  * https://www.suse.com/security/cve/CVE-2023-53825.html
  * https://www.suse.com/security/cve/CVE-2023-53828.html
  * https://www.suse.com/security/cve/CVE-2023-53831.html
  * https://www.suse.com/security/cve/CVE-2023-53834.html
  * https://www.suse.com/security/cve/CVE-2023-53836.html
  * https://www.suse.com/security/cve/CVE-2023-53839.html
  * https://www.suse.com/security/cve/CVE-2023-53841.html
  * https://www.suse.com/security/cve/CVE-2023-53842.html
  * https://www.suse.com/security/cve/CVE-2023-53843.html
  * https://www.suse.com/security/cve/CVE-2023-53844.html
  * https://www.suse.com/security/cve/CVE-2023-53846.html
  * https://www.suse.com/security/cve/CVE-2023-53847.html
  * https://www.suse.com/security/cve/CVE-2023-53848.html
  * https://www.suse.com/security/cve/CVE-2023-53850.html
  * https://www.suse.com/security/cve/CVE-2023-53851.html
  * https://www.suse.com/security/cve/CVE-2023-53852.html
  * https://www.suse.com/security/cve/CVE-2023-53855.html
  * https://www.suse.com/security/cve/CVE-2023-53856.html
  * https://www.suse.com/security/cve/CVE-2023-53857.html
  * https://www.suse.com/security/cve/CVE-2023-53858.html
  * https://www.suse.com/security/cve/CVE-2023-53860.html
  * https://www.suse.com/security/cve/CVE-2023-53861.html
  * https://www.suse.com/security/cve/CVE-2023-53863.html
  * https://www.suse.com/security/cve/CVE-2023-53864.html
  * https://www.suse.com/security/cve/CVE-2023-53865.html
  * https://www.suse.com/security/cve/CVE-2023-53989.html
  * https://www.suse.com/security/cve/CVE-2023-53992.html
  * https://www.suse.com/security/cve/CVE-2023-53994.html
  * https://www.suse.com/security/cve/CVE-2023-53995.html
  * https://www.suse.com/security/cve/CVE-2023-53996.html
  * https://www.suse.com/security/cve/CVE-2023-53997.html
  * https://www.suse.com/security/cve/CVE-2023-53998.html
  * https://www.suse.com/security/cve/CVE-2023-53999.html
  * https://www.suse.com/security/cve/CVE-2023-54000.html
  * https://www.suse.com/security/cve/CVE-2023-54001.html
  * https://www.suse.com/security/cve/CVE-2023-54005.html
  * https://www.suse.com/security/cve/CVE-2023-54006.html
  * https://www.suse.com/security/cve/CVE-2023-54008.html
  * https://www.suse.com/security/cve/CVE-2023-54013.html
  * https://www.suse.com/security/cve/CVE-2023-54014.html
  * https://www.suse.com/security/cve/CVE-2023-54016.html
  * https://www.suse.com/security/cve/CVE-2023-54017.html
  * https://www.suse.com/security/cve/CVE-2023-54019.html
  * https://www.suse.com/security/cve/CVE-2023-54022.html
  * https://www.suse.com/security/cve/CVE-2023-54023.html
  * https://www.suse.com/security/cve/CVE-2023-54025.html
  * https://www.suse.com/security/cve/CVE-2023-54026.html
  * https://www.suse.com/security/cve/CVE-2023-54027.html
  * https://www.suse.com/security/cve/CVE-2023-54030.html
  * https://www.suse.com/security/cve/CVE-2023-54031.html
  * https://www.suse.com/security/cve/CVE-2023-54032.html
  * https://www.suse.com/security/cve/CVE-2023-54035.html
  * https://www.suse.com/security/cve/CVE-2023-54037.html
  * https://www.suse.com/security/cve/CVE-2023-54038.html
  * https://www.suse.com/security/cve/CVE-2023-54042.html
  * https://www.suse.com/security/cve/CVE-2023-54045.html
  * https://www.suse.com/security/cve/CVE-2023-54048.html
  * https://www.suse.com/security/cve/CVE-2023-54049.html
  * https://www.suse.com/security/cve/CVE-2023-54051.html
  * https://www.suse.com/security/cve/CVE-2023-54052.html
  * https://www.suse.com/security/cve/CVE-2023-54060.html
  * https://www.suse.com/security/cve/CVE-2023-54064.html
  * https://www.suse.com/security/cve/CVE-2023-54066.html
  * https://www.suse.com/security/cve/CVE-2023-54067.html
  * https://www.suse.com/security/cve/CVE-2023-54069.html
  * https://www.suse.com/security/cve/CVE-2023-54070.html
  * https://www.suse.com/security/cve/CVE-2023-54072.html
  * https://www.suse.com/security/cve/CVE-2023-54076.html
  * https://www.suse.com/security/cve/CVE-2023-54080.html
  * https://www.suse.com/security/cve/CVE-2023-54081.html
  * https://www.suse.com/security/cve/CVE-2023-54083.html
  * https://www.suse.com/security/cve/CVE-2023-54088.html
  * https://www.suse.com/security/cve/CVE-2023-54089.html
  * https://www.suse.com/security/cve/CVE-2023-54091.html
  * https://www.suse.com/security/cve/CVE-2023-54092.html
  * https://www.suse.com/security/cve/CVE-2023-54093.html
  * https://www.suse.com/security/cve/CVE-2023-54094.html
  * https://www.suse.com/security/cve/CVE-2023-54095.html
  * https://www.suse.com/security/cve/CVE-2023-54096.html
  * https://www.suse.com/security/cve/CVE-2023-54099.html
  * https://www.suse.com/security/cve/CVE-2023-54101.html
  * https://www.suse.com/security/cve/CVE-2023-54104.html
  * https://www.suse.com/security/cve/CVE-2023-54106.html
  * https://www.suse.com/security/cve/CVE-2023-54112.html
  * https://www.suse.com/security/cve/CVE-2023-54113.html
  * https://www.suse.com/security/cve/CVE-2023-54115.html
  * https://www.suse.com/security/cve/CVE-2023-54117.html
  * https://www.suse.com/security/cve/CVE-2023-54121.html
  * https://www.suse.com/security/cve/CVE-2023-54125.html
  * https://www.suse.com/security/cve/CVE-2023-54127.html
  * https://www.suse.com/security/cve/CVE-2023-54133.html
  * https://www.suse.com/security/cve/CVE-2023-54134.html
  * https://www.suse.com/security/cve/CVE-2023-54135.html
  * https://www.suse.com/security/cve/CVE-2023-54136.html
  * https://www.suse.com/security/cve/CVE-2023-54137.html
  * https://www.suse.com/security/cve/CVE-2023-54140.html
  * https://www.suse.com/security/cve/CVE-2023-54141.html
  * https://www.suse.com/security/cve/CVE-2023-54142.html
  * https://www.suse.com/security/cve/CVE-2023-54143.html
  * https://www.suse.com/security/cve/CVE-2023-54145.html
  * https://www.suse.com/security/cve/CVE-2023-54148.html
  * https://www.suse.com/security/cve/CVE-2023-54149.html
  * https://www.suse.com/security/cve/CVE-2023-54153.html
  * https://www.suse.com/security/cve/CVE-2023-54154.html
  * https://www.suse.com/security/cve/CVE-2023-54155.html
  * https://www.suse.com/security/cve/CVE-2023-54156.html
  * https://www.suse.com/security/cve/CVE-2023-54164.html
  * https://www.suse.com/security/cve/CVE-2023-54166.html
  * https://www.suse.com/security/cve/CVE-2023-54169.html
  * https://www.suse.com/security/cve/CVE-2023-54170.html
  * https://www.suse.com/security/cve/CVE-2023-54171.html
  * https://www.suse.com/security/cve/CVE-2023-54172.html
  * https://www.suse.com/security/cve/CVE-2023-54173.html
  * https://www.suse.com/security/cve/CVE-2023-54177.html
  * https://www.suse.com/security/cve/CVE-2023-54178.html
  * https://www.suse.com/security/cve/CVE-2023-54179.html
  * https://www.suse.com/security/cve/CVE-2023-54181.html
  * https://www.suse.com/security/cve/CVE-2023-54183.html
  * https://www.suse.com/security/cve/CVE-2023-54185.html
  * https://www.suse.com/security/cve/CVE-2023-54189.html
  * https://www.suse.com/security/cve/CVE-2023-54194.html
  * https://www.suse.com/security/cve/CVE-2023-54201.html
  * https://www.suse.com/security/cve/CVE-2023-54204.html
  * https://www.suse.com/security/cve/CVE-2023-54207.html
  * https://www.suse.com/security/cve/CVE-2023-54209.html
  * https://www.suse.com/security/cve/CVE-2023-54210.html
  * https://www.suse.com/security/cve/CVE-2023-54211.html
  * https://www.suse.com/security/cve/CVE-2023-54215.html
  * https://www.suse.com/security/cve/CVE-2023-54219.html
  * https://www.suse.com/security/cve/CVE-2023-54220.html
  * https://www.suse.com/security/cve/CVE-2023-54221.html
  * https://www.suse.com/security/cve/CVE-2023-54223.html
  * https://www.suse.com/security/cve/CVE-2023-54224.html
  * https://www.suse.com/security/cve/CVE-2023-54225.html
  * https://www.suse.com/security/cve/CVE-2023-54227.html
  * https://www.suse.com/security/cve/CVE-2023-54229.html
  * https://www.suse.com/security/cve/CVE-2023-54230.html
  * https://www.suse.com/security/cve/CVE-2023-54235.html
  * https://www.suse.com/security/cve/CVE-2023-54240.html
  * https://www.suse.com/security/cve/CVE-2023-54241.html
  * https://www.suse.com/security/cve/CVE-2023-54246.html
  * https://www.suse.com/security/cve/CVE-2023-54247.html
  * https://www.suse.com/security/cve/CVE-2023-54251.html
  * https://www.suse.com/security/cve/CVE-2023-54253.html
  * https://www.suse.com/security/cve/CVE-2023-54254.html
  * https://www.suse.com/security/cve/CVE-2023-54255.html
  * https://www.suse.com/security/cve/CVE-2023-54258.html
  * https://www.suse.com/security/cve/CVE-2023-54261.html
  * https://www.suse.com/security/cve/CVE-2023-54263.html
  * https://www.suse.com/security/cve/CVE-2023-54264.html
  * https://www.suse.com/security/cve/CVE-2023-54266.html
  * https://www.suse.com/security/cve/CVE-2023-54267.html
  * https://www.suse.com/security/cve/CVE-2023-54271.html
  * https://www.suse.com/security/cve/CVE-2023-54276.html
  * https://www.suse.com/security/cve/CVE-2023-54278.html
  * https://www.suse.com/security/cve/CVE-2023-54281.html
  * https://www.suse.com/security/cve/CVE-2023-54282.html
  * https://www.suse.com/security/cve/CVE-2023-54283.html
  * https://www.suse.com/security/cve/CVE-2023-54285.html
  * https://www.suse.com/security/cve/CVE-2023-54289.html
  * https://www.suse.com/security/cve/CVE-2023-54291.html
  * https://www.suse.com/security/cve/CVE-2023-54292.html
  * https://www.suse.com/security/cve/CVE-2023-54293.html
  * https://www.suse.com/security/cve/CVE-2023-54296.html
  * https://www.suse.com/security/cve/CVE-2023-54297.html
  * https://www.suse.com/security/cve/CVE-2023-54299.html
  * https://www.suse.com/security/cve/CVE-2023-54300.html
  * https://www.suse.com/security/cve/CVE-2023-54302.html
  * https://www.suse.com/security/cve/CVE-2023-54303.html
  * https://www.suse.com/security/cve/CVE-2023-54304.html
  * https://www.suse.com/security/cve/CVE-2023-54309.html
  * https://www.suse.com/security/cve/CVE-2023-54312.html
  * https://www.suse.com/security/cve/CVE-2023-54313.html
  * https://www.suse.com/security/cve/CVE-2023-54314.html
  * https://www.suse.com/security/cve/CVE-2023-54315.html
  * https://www.suse.com/security/cve/CVE-2023-54316.html
  * https://www.suse.com/security/cve/CVE-2023-54318.html
  * https://www.suse.com/security/cve/CVE-2023-54319.html
  * https://www.suse.com/security/cve/CVE-2023-54322.html
  * https://www.suse.com/security/cve/CVE-2023-54324.html
  * https://www.suse.com/security/cve/CVE-2023-54326.html
  * https://www.suse.com/security/cve/CVE-2024-26944.html
  * https://www.suse.com/security/cve/CVE-2024-27005.html
  * https://www.suse.com/security/cve/CVE-2024-42103.html
  * https://www.suse.com/security/cve/CVE-2024-53070.html
  * https://www.suse.com/security/cve/CVE-2024-53093.html
  * https://www.suse.com/security/cve/CVE-2024-53149.html
  * https://www.suse.com/security/cve/CVE-2025-22047.html
  * https://www.suse.com/security/cve/CVE-2025-37813.html
  * https://www.suse.com/security/cve/CVE-2025-37861.html
  * https://www.suse.com/security/cve/CVE-2025-38243.html
  * https://www.suse.com/security/cve/CVE-2025-38321.html
  * https://www.suse.com/security/cve/CVE-2025-38322.html
  * https://www.suse.com/security/cve/CVE-2025-38379.html
  * https://www.suse.com/security/cve/CVE-2025-38539.html
  * https://www.suse.com/security/cve/CVE-2025-38728.html
  * https://www.suse.com/security/cve/CVE-2025-39689.html
  * https://www.suse.com/security/cve/CVE-2025-39748.html
  * https://www.suse.com/security/cve/CVE-2025-39813.html
  * https://www.suse.com/security/cve/CVE-2025-39829.html
  * https://www.suse.com/security/cve/CVE-2025-39880.html
  * https://www.suse.com/security/cve/CVE-2025-39890.html
  * https://www.suse.com/security/cve/CVE-2025-39913.html
  * https://www.suse.com/security/cve/CVE-2025-39964.html
  * https://www.suse.com/security/cve/CVE-2025-39977.html
  * https://www.suse.com/security/cve/CVE-2025-40006.html
  * https://www.suse.com/security/cve/CVE-2025-40024.html
  * https://www.suse.com/security/cve/CVE-2025-40033.html
  * https://www.suse.com/security/cve/CVE-2025-40042.html
  * https://www.suse.com/security/cve/CVE-2025-40053.html
  * https://www.suse.com/security/cve/CVE-2025-40081.html
  * https://www.suse.com/security/cve/CVE-2025-40097.html
  * https://www.suse.com/security/cve/CVE-2025-40099.html
  * https://www.suse.com/security/cve/CVE-2025-40102.html
  * https://www.suse.com/security/cve/CVE-2025-40103.html
  * https://www.suse.com/security/cve/CVE-2025-40106.html
  * https://www.suse.com/security/cve/CVE-2025-40123.html
  * https://www.suse.com/security/cve/CVE-2025-40134.html
  * https://www.suse.com/security/cve/CVE-2025-40135.html
  * https://www.suse.com/security/cve/CVE-2025-40153.html
  * https://www.suse.com/security/cve/CVE-2025-40158.html
  * https://www.suse.com/security/cve/CVE-2025-40160.html
  * https://www.suse.com/security/cve/CVE-2025-40167.html
  * https://www.suse.com/security/cve/CVE-2025-40170.html
  * https://www.suse.com/security/cve/CVE-2025-40178.html
  * https://www.suse.com/security/cve/CVE-2025-40179.html
  * https://www.suse.com/security/cve/CVE-2025-40187.html
  * https://www.suse.com/security/cve/CVE-2025-40190.html
  * https://www.suse.com/security/cve/CVE-2025-40192.html
  * https://www.suse.com/security/cve/CVE-2025-40202.html
  * https://www.suse.com/security/cve/CVE-2025-40211.html
  * https://www.suse.com/security/cve/CVE-2025-40215.html
  * https://www.suse.com/security/cve/CVE-2025-40219.html
  * https://www.suse.com/security/cve/CVE-2025-40220.html
  * https://www.suse.com/security/cve/CVE-2025-40223.html
  * https://www.suse.com/security/cve/CVE-2025-40231.html
  * https://www.suse.com/security/cve/CVE-2025-40233.html
  * https://www.suse.com/security/cve/CVE-2025-40238.html
  * https://www.suse.com/security/cve/CVE-2025-40240.html
  * https://www.suse.com/security/cve/CVE-2025-40242.html
  * https://www.suse.com/security/cve/CVE-2025-40244.html
  * https://www.suse.com/security/cve/CVE-2025-40248.html
  * https://www.suse.com/security/cve/CVE-2025-40250.html
  * https://www.suse.com/security/cve/CVE-2025-40251.html
  * https://www.suse.com/security/cve/CVE-2025-40252.html
  * https://www.suse.com/security/cve/CVE-2025-40254.html
  * https://www.suse.com/security/cve/CVE-2025-40256.html
  * https://www.suse.com/security/cve/CVE-2025-40257.html
  * https://www.suse.com/security/cve/CVE-2025-40258.html
  * https://www.suse.com/security/cve/CVE-2025-40259.html
  * https://www.suse.com/security/cve/CVE-2025-40261.html
  * https://www.suse.com/security/cve/CVE-2025-40262.html
  * https://www.suse.com/security/cve/CVE-2025-40263.html
  * https://www.suse.com/security/cve/CVE-2025-40264.html
  * https://www.suse.com/security/cve/CVE-2025-40268.html
  * https://www.suse.com/security/cve/CVE-2025-40269.html
  * https://www.suse.com/security/cve/CVE-2025-40271.html
  * https://www.suse.com/security/cve/CVE-2025-40272.html
  * https://www.suse.com/security/cve/CVE-2025-40273.html
  * https://www.suse.com/security/cve/CVE-2025-40274.html
  * https://www.suse.com/security/cve/CVE-2025-40275.html
  * https://www.suse.com/security/cve/CVE-2025-40277.html
  * https://www.suse.com/security/cve/CVE-2025-40278.html
  * https://www.suse.com/security/cve/CVE-2025-40279.html
  * https://www.suse.com/security/cve/CVE-2025-40280.html
  * https://www.suse.com/security/cve/CVE-2025-40282.html
  * https://www.suse.com/security/cve/CVE-2025-40283.html
  * https://www.suse.com/security/cve/CVE-2025-40284.html
  * https://www.suse.com/security/cve/CVE-2025-40287.html
  * https://www.suse.com/security/cve/CVE-2025-40288.html
  * https://www.suse.com/security/cve/CVE-2025-40289.html
  * https://www.suse.com/security/cve/CVE-2025-40292.html
  * https://www.suse.com/security/cve/CVE-2025-40293.html
  * https://www.suse.com/security/cve/CVE-2025-40297.html
  * https://www.suse.com/security/cve/CVE-2025-40301.html
  * https://www.suse.com/security/cve/CVE-2025-40304.html
  * https://www.suse.com/security/cve/CVE-2025-40306.html
  * https://www.suse.com/security/cve/CVE-2025-40307.html
  * https://www.suse.com/security/cve/CVE-2025-40308.html
  * https://www.suse.com/security/cve/CVE-2025-40309.html
  * https://www.suse.com/security/cve/CVE-2025-40310.html
  * https://www.suse.com/security/cve/CVE-2025-40311.html
  * https://www.suse.com/security/cve/CVE-2025-40312.html
  * https://www.suse.com/security/cve/CVE-2025-40314.html
  * https://www.suse.com/security/cve/CVE-2025-40315.html
  * https://www.suse.com/security/cve/CVE-2025-40316.html
  * https://www.suse.com/security/cve/CVE-2025-40317.html
  * https://www.suse.com/security/cve/CVE-2025-40318.html
  * https://www.suse.com/security/cve/CVE-2025-40319.html
  * https://www.suse.com/security/cve/CVE-2025-40320.html
  * https://www.suse.com/security/cve/CVE-2025-40321.html
  * https://www.suse.com/security/cve/CVE-2025-40322.html
  * https://www.suse.com/security/cve/CVE-2025-40323.html
  * https://www.suse.com/security/cve/CVE-2025-40324.html
  * https://www.suse.com/security/cve/CVE-2025-40328.html
  * https://www.suse.com/security/cve/CVE-2025-40329.html
  * https://www.suse.com/security/cve/CVE-2025-40331.html
  * https://www.suse.com/security/cve/CVE-2025-40337.html
  * https://www.suse.com/security/cve/CVE-2025-40338.html
  * https://www.suse.com/security/cve/CVE-2025-40339.html
  * https://www.suse.com/security/cve/CVE-2025-40342.html
  * https://www.suse.com/security/cve/CVE-2025-40343.html
  * https://www.suse.com/security/cve/CVE-2025-40345.html
  * https://www.suse.com/security/cve/CVE-2025-40346.html
  * https://www.suse.com/security/cve/CVE-2025-40347.html
  * https://www.suse.com/security/cve/CVE-2025-40349.html
  * https://www.suse.com/security/cve/CVE-2025-40350.html
  * https://www.suse.com/security/cve/CVE-2025-40351.html
  * https://www.suse.com/security/cve/CVE-2025-40355.html
  * https://www.suse.com/security/cve/CVE-2025-40360.html
  * https://www.suse.com/security/cve/CVE-2025-40363.html
  * https://www.suse.com/security/cve/CVE-2025-68168.html
  * https://www.suse.com/security/cve/CVE-2025-68171.html
  * https://www.suse.com/security/cve/CVE-2025-68172.html
  * https://www.suse.com/security/cve/CVE-2025-68174.html
  * https://www.suse.com/security/cve/CVE-2025-68176.html
  * https://www.suse.com/security/cve/CVE-2025-68178.html
  * https://www.suse.com/security/cve/CVE-2025-68180.html
  * https://www.suse.com/security/cve/CVE-2025-68183.html
  * https://www.suse.com/security/cve/CVE-2025-68185.html
  * https://www.suse.com/security/cve/CVE-2025-68188.html
  * https://www.suse.com/security/cve/CVE-2025-68190.html
  * https://www.suse.com/security/cve/CVE-2025-68192.html
  * https://www.suse.com/security/cve/CVE-2025-68194.html
  * https://www.suse.com/security/cve/CVE-2025-68195.html
  * https://www.suse.com/security/cve/CVE-2025-68200.html
  * https://www.suse.com/security/cve/CVE-2025-68201.html
  * https://www.suse.com/security/cve/CVE-2025-68204.html
  * https://www.suse.com/security/cve/CVE-2025-68206.html
  * https://www.suse.com/security/cve/CVE-2025-68208.html
  * https://www.suse.com/security/cve/CVE-2025-68209.html
  * https://www.suse.com/security/cve/CVE-2025-68217.html
  * https://www.suse.com/security/cve/CVE-2025-68218.html
  * https://www.suse.com/security/cve/CVE-2025-68222.html
  * https://www.suse.com/security/cve/CVE-2025-68227.html
  * https://www.suse.com/security/cve/CVE-2025-68230.html
  * https://www.suse.com/security/cve/CVE-2025-68233.html
  * https://www.suse.com/security/cve/CVE-2025-68235.html
  * https://www.suse.com/security/cve/CVE-2025-68237.html
  * https://www.suse.com/security/cve/CVE-2025-68238.html
  * https://www.suse.com/security/cve/CVE-2025-68239.html
  * https://www.suse.com/security/cve/CVE-2025-68241.html
  * https://www.suse.com/security/cve/CVE-2025-68244.html
  * https://www.suse.com/security/cve/CVE-2025-68245.html
  * https://www.suse.com/security/cve/CVE-2025-68249.html
  * https://www.suse.com/security/cve/CVE-2025-68252.html
  * https://www.suse.com/security/cve/CVE-2025-68254.html
  * https://www.suse.com/security/cve/CVE-2025-68255.html
  * https://www.suse.com/security/cve/CVE-2025-68256.html
  * https://www.suse.com/security/cve/CVE-2025-68257.html
  * https://www.suse.com/security/cve/CVE-2025-68258.html
  * https://www.suse.com/security/cve/CVE-2025-68259.html
  * https://www.suse.com/security/cve/CVE-2025-68261.html
  * https://www.suse.com/security/cve/CVE-2025-68264.html
  * https://www.suse.com/security/cve/CVE-2025-68283.html
  * https://www.suse.com/security/cve/CVE-2025-68284.html
  * https://www.suse.com/security/cve/CVE-2025-68285.html
  * https://www.suse.com/security/cve/CVE-2025-68286.html
  * https://www.suse.com/security/cve/CVE-2025-68287.html
  * https://www.suse.com/security/cve/CVE-2025-68289.html
  * https://www.suse.com/security/cve/CVE-2025-68290.html
  * https://www.suse.com/security/cve/CVE-2025-68295.html
  * https://www.suse.com/security/cve/CVE-2025-68296.html
  * https://www.suse.com/security/cve/CVE-2025-68297.html
  * https://www.suse.com/security/cve/CVE-2025-68301.html
  * https://www.suse.com/security/cve/CVE-2025-68303.html
  * https://www.suse.com/security/cve/CVE-2025-68305.html
  * https://www.suse.com/security/cve/CVE-2025-68307.html
  * https://www.suse.com/security/cve/CVE-2025-68308.html
  * https://www.suse.com/security/cve/CVE-2025-68312.html
  * https://www.suse.com/security/cve/CVE-2025-68313.html
  * https://www.suse.com/security/cve/CVE-2025-68320.html
  * https://www.suse.com/security/cve/CVE-2025-68325.html
  * https://www.suse.com/security/cve/CVE-2025-68327.html
  * https://www.suse.com/security/cve/CVE-2025-68328.html
  * https://www.suse.com/security/cve/CVE-2025-68330.html
  * https://www.suse.com/security/cve/CVE-2025-68331.html
  * https://www.suse.com/security/cve/CVE-2025-68332.html
  * https://www.suse.com/security/cve/CVE-2025-68335.html
  * https://www.suse.com/security/cve/CVE-2025-68337.html
  * https://www.suse.com/security/cve/CVE-2025-68339.html
  * https://www.suse.com/security/cve/CVE-2025-68340.html
  * https://www.suse.com/security/cve/CVE-2025-68345.html
  * https://www.suse.com/security/cve/CVE-2025-68346.html
  * https://www.suse.com/security/cve/CVE-2025-68347.html
  * https://www.suse.com/security/cve/CVE-2025-68349.html
  * https://www.suse.com/security/cve/CVE-2025-68351.html
  * https://www.suse.com/security/cve/CVE-2025-68354.html
  * https://www.suse.com/security/cve/CVE-2025-68362.html
  * https://www.suse.com/security/cve/CVE-2025-68363.html
  * https://www.suse.com/security/cve/CVE-2025-68365.html
  * https://www.suse.com/security/cve/CVE-2025-68366.html
  * https://www.suse.com/security/cve/CVE-2025-68367.html
  * https://www.suse.com/security/cve/CVE-2025-68372.html
  * https://www.suse.com/security/cve/CVE-2025-68374.html
  * https://www.suse.com/security/cve/CVE-2025-68378.html
  * https://www.suse.com/security/cve/CVE-2025-68379.html
  * https://www.suse.com/security/cve/CVE-2025-68380.html
  * https://www.suse.com/security/cve/CVE-2025-68724.html
  * https://www.suse.com/security/cve/CVE-2025-68725.html
  * https://www.suse.com/security/cve/CVE-2025-68727.html
  * https://www.suse.com/security/cve/CVE-2025-68728.html
  * https://www.suse.com/security/cve/CVE-2025-68732.html
  * https://www.suse.com/security/cve/CVE-2025-68733.html
  * https://www.suse.com/security/cve/CVE-2025-68734.html
  * https://www.suse.com/security/cve/CVE-2025-68736.html
  * https://www.suse.com/security/cve/CVE-2025-68740.html
  * https://www.suse.com/security/cve/CVE-2025-68742.html
  * https://www.suse.com/security/cve/CVE-2025-68744.html
  * https://www.suse.com/security/cve/CVE-2025-68746.html
  * https://www.suse.com/security/cve/CVE-2025-68750.html
  * https://www.suse.com/security/cve/CVE-2025-68753.html
  * https://www.suse.com/security/cve/CVE-2025-68757.html
  * https://www.suse.com/security/cve/CVE-2025-68758.html
  * https://www.suse.com/security/cve/CVE-2025-68759.html
  * https://www.suse.com/security/cve/CVE-2025-68764.html
  * https://www.suse.com/security/cve/CVE-2025-68765.html
  * https://www.suse.com/security/cve/CVE-2025-68766.html
  * https://www.suse.com/security/cve/CVE-2025-68768.html
  * https://www.suse.com/security/cve/CVE-2025-68770.html
  * https://www.suse.com/security/cve/CVE-2025-68771.html
  * https://www.suse.com/security/cve/CVE-2025-68773.html
  * https://www.suse.com/security/cve/CVE-2025-68775.html
  * https://www.suse.com/security/cve/CVE-2025-68776.html
  * https://www.suse.com/security/cve/CVE-2025-68777.html
  * https://www.suse.com/security/cve/CVE-2025-68778.html
  * https://www.suse.com/security/cve/CVE-2025-68783.html
  * https://www.suse.com/security/cve/CVE-2025-68785.html
  * https://www.suse.com/security/cve/CVE-2025-68788.html
  * https://www.suse.com/security/cve/CVE-2025-68789.html
  * https://www.suse.com/security/cve/CVE-2025-68795.html
  * https://www.suse.com/security/cve/CVE-2025-68797.html
  * https://www.suse.com/security/cve/CVE-2025-68798.html
  * https://www.suse.com/security/cve/CVE-2025-68800.html
  * https://www.suse.com/security/cve/CVE-2025-68801.html
  * https://www.suse.com/security/cve/CVE-2025-68803.html
  * https://www.suse.com/security/cve/CVE-2025-68804.html
  * https://www.suse.com/security/cve/CVE-2025-68808.html
  * https://www.suse.com/security/cve/CVE-2025-68810.html
  * https://www.suse.com/security/cve/CVE-2025-68813.html
  * https://www.suse.com/security/cve/CVE-2025-68814.html
  * https://www.suse.com/security/cve/CVE-2025-68815.html
  * https://www.suse.com/security/cve/CVE-2025-68816.html
  * https://www.suse.com/security/cve/CVE-2025-68819.html
  * https://www.suse.com/security/cve/CVE-2025-68820.html
  * https://www.suse.com/security/cve/CVE-2025-71064.html
  * https://www.suse.com/security/cve/CVE-2025-71066.html
  * https://www.suse.com/security/cve/CVE-2025-71071.html
  * https://www.suse.com/security/cve/CVE-2025-71077.html
  * https://www.suse.com/security/cve/CVE-2025-71078.html
  * https://www.suse.com/security/cve/CVE-2025-71079.html
  * https://www.suse.com/security/cve/CVE-2025-71081.html
  * https://www.suse.com/security/cve/CVE-2025-71082.html
  * https://www.suse.com/security/cve/CVE-2025-71083.html
  * https://www.suse.com/security/cve/CVE-2025-71084.html
  * https://www.suse.com/security/cve/CVE-2025-71085.html
  * https://www.suse.com/security/cve/CVE-2025-71086.html
  * https://www.suse.com/security/cve/CVE-2025-71087.html
  * https://www.suse.com/security/cve/CVE-2025-71088.html
  * https://www.suse.com/security/cve/CVE-2025-71089.html
  * https://www.suse.com/security/cve/CVE-2025-71091.html
  * https://www.suse.com/security/cve/CVE-2025-71093.html
  * https://www.suse.com/security/cve/CVE-2025-71094.html
  * https://www.suse.com/security/cve/CVE-2025-71095.html
  * https://www.suse.com/security/cve/CVE-2025-71096.html
  * https://www.suse.com/security/cve/CVE-2025-71097.html
  * https://www.suse.com/security/cve/CVE-2025-71098.html
  * https://www.suse.com/security/cve/CVE-2025-71100.html
  * https://www.suse.com/security/cve/CVE-2025-71104.html
  * https://www.suse.com/security/cve/CVE-2025-71108.html
  * https://www.suse.com/security/cve/CVE-2025-71111.html
  * https://www.suse.com/security/cve/CVE-2025-71112.html
  * https://www.suse.com/security/cve/CVE-2025-71113.html
  * https://www.suse.com/security/cve/CVE-2025-71114.html
  * https://www.suse.com/security/cve/CVE-2025-71116.html
  * https://www.suse.com/security/cve/CVE-2025-71118.html
  * https://www.suse.com/security/cve/CVE-2025-71119.html
  * https://www.suse.com/security/cve/CVE-2025-71120.html
  * https://www.suse.com/security/cve/CVE-2025-71123.html
  * https://www.suse.com/security/cve/CVE-2025-71126.html
  * https://www.suse.com/security/cve/CVE-2025-71130.html
  * https://www.suse.com/security/cve/CVE-2025-71131.html
  * https://www.suse.com/security/cve/CVE-2025-71132.html
  * https://www.suse.com/security/cve/CVE-2025-71133.html
  * https://www.suse.com/security/cve/CVE-2025-71135.html
  * https://www.suse.com/security/cve/CVE-2025-71136.html
  * https://www.suse.com/security/cve/CVE-2025-71137.html
  * https://www.suse.com/security/cve/CVE-2025-71138.html
  * https://www.suse.com/security/cve/CVE-2025-71145.html
  * https://www.suse.com/security/cve/CVE-2025-71147.html
  * https://www.suse.com/security/cve/CVE-2025-71148.html
  * https://www.suse.com/security/cve/CVE-2025-71149.html
  * https://www.suse.com/security/cve/CVE-2025-71154.html
  * https://www.suse.com/security/cve/CVE-2025-71162.html
  * https://www.suse.com/security/cve/CVE-2025-71163.html
  * https://www.suse.com/security/cve/CVE-2025-71182.html
  * https://www.suse.com/security/cve/CVE-2025-71184.html
  * https://www.suse.com/security/cve/CVE-2025-71185.html
  * https://www.suse.com/security/cve/CVE-2025-71188.html
  * https://www.suse.com/security/cve/CVE-2025-71189.html
  * https://www.suse.com/security/cve/CVE-2025-71190.html
  * https://www.suse.com/security/cve/CVE-2025-71191.html
  * https://www.suse.com/security/cve/CVE-2025-71192.html
  * https://www.suse.com/security/cve/CVE-2025-71194.html
  * https://www.suse.com/security/cve/CVE-2025-71195.html
  * https://www.suse.com/security/cve/CVE-2025-71196.html
  * https://www.suse.com/security/cve/CVE-2025-71197.html
  * https://www.suse.com/security/cve/CVE-2025-71198.html
  * https://www.suse.com/security/cve/CVE-2025-71199.html
  * https://www.suse.com/security/cve/CVE-2025-71200.html
  * https://www.suse.com/security/cve/CVE-2025-71222.html
  * https://www.suse.com/security/cve/CVE-2025-71224.html
  * https://www.suse.com/security/cve/CVE-2025-71225.html
  * https://www.suse.com/security/cve/CVE-2025-71229.html
  * https://www.suse.com/security/cve/CVE-2025-71231.html
  * https://www.suse.com/security/cve/CVE-2025-71232.html
  * https://www.suse.com/security/cve/CVE-2025-71234.html
  * https://www.suse.com/security/cve/CVE-2025-71235.html
  * https://www.suse.com/security/cve/CVE-2025-71236.html
  * https://www.suse.com/security/cve/CVE-2026-22976.html
  * https://www.suse.com/security/cve/CVE-2026-22977.html
  * https://www.suse.com/security/cve/CVE-2026-22978.html
  * https://www.suse.com/security/cve/CVE-2026-22979.html
  * https://www.suse.com/security/cve/CVE-2026-22982.html
  * https://www.suse.com/security/cve/CVE-2026-22984.html
  * https://www.suse.com/security/cve/CVE-2026-22985.html
  * https://www.suse.com/security/cve/CVE-2026-22988.html
  * https://www.suse.com/security/cve/CVE-2026-22990.html
  * https://www.suse.com/security/cve/CVE-2026-22991.html
  * https://www.suse.com/security/cve/CVE-2026-22992.html
  * https://www.suse.com/security/cve/CVE-2026-22993.html
  * https://www.suse.com/security/cve/CVE-2026-22996.html
  * https://www.suse.com/security/cve/CVE-2026-22997.html
  * https://www.suse.com/security/cve/CVE-2026-22998.html
  * https://www.suse.com/security/cve/CVE-2026-22999.html
  * https://www.suse.com/security/cve/CVE-2026-23000.html
  * https://www.suse.com/security/cve/CVE-2026-23001.html
  * https://www.suse.com/security/cve/CVE-2026-23003.html
  * https://www.suse.com/security/cve/CVE-2026-23004.html
  * https://www.suse.com/security/cve/CVE-2026-23005.html
  * https://www.suse.com/security/cve/CVE-2026-23006.html
  * https://www.suse.com/security/cve/CVE-2026-23010.html
  * https://www.suse.com/security/cve/CVE-2026-23011.html
  * https://www.suse.com/security/cve/CVE-2026-23017.html
  * https://www.suse.com/security/cve/CVE-2026-23021.html
  * https://www.suse.com/security/cve/CVE-2026-23026.html
  * https://www.suse.com/security/cve/CVE-2026-23033.html
  * https://www.suse.com/security/cve/CVE-2026-23035.html
  * https://www.suse.com/security/cve/CVE-2026-23037.html
  * https://www.suse.com/security/cve/CVE-2026-23049.html
  * https://www.suse.com/security/cve/CVE-2026-23053.html
  * https://www.suse.com/security/cve/CVE-2026-23056.html
  * https://www.suse.com/security/cve/CVE-2026-23057.html
  * https://www.suse.com/security/cve/CVE-2026-23058.html
  * https://www.suse.com/security/cve/CVE-2026-23060.html
  * https://www.suse.com/security/cve/CVE-2026-23061.html
  * https://www.suse.com/security/cve/CVE-2026-23063.html
  * https://www.suse.com/security/cve/CVE-2026-23064.html
  * https://www.suse.com/security/cve/CVE-2026-23068.html
  * https://www.suse.com/security/cve/CVE-2026-23071.html
  * https://www.suse.com/security/cve/CVE-2026-23073.html
  * https://www.suse.com/security/cve/CVE-2026-23074.html
  * https://www.suse.com/security/cve/CVE-2026-23076.html
  * https://www.suse.com/security/cve/CVE-2026-23078.html
  * https://www.suse.com/security/cve/CVE-2026-23080.html
  * https://www.suse.com/security/cve/CVE-2026-23082.html
  * https://www.suse.com/security/cve/CVE-2026-23083.html
  * https://www.suse.com/security/cve/CVE-2026-23084.html
  * https://www.suse.com/security/cve/CVE-2026-23085.html
  * https://www.suse.com/security/cve/CVE-2026-23086.html
  * https://www.suse.com/security/cve/CVE-2026-23089.html
  * https://www.suse.com/security/cve/CVE-2026-23090.html
  * https://www.suse.com/security/cve/CVE-2026-23091.html
  * https://www.suse.com/security/cve/CVE-2026-23094.html
  * https://www.suse.com/security/cve/CVE-2026-23095.html
  * https://www.suse.com/security/cve/CVE-2026-23096.html
  * https://www.suse.com/security/cve/CVE-2026-23099.html
  * https://www.suse.com/security/cve/CVE-2026-23101.html
  * https://www.suse.com/security/cve/CVE-2026-23102.html
  * https://www.suse.com/security/cve/CVE-2026-23104.html
  * https://www.suse.com/security/cve/CVE-2026-23105.html
  * https://www.suse.com/security/cve/CVE-2026-23107.html
  * https://www.suse.com/security/cve/CVE-2026-23108.html
  * https://www.suse.com/security/cve/CVE-2026-23110.html
  * https://www.suse.com/security/cve/CVE-2026-23111.html
  * https://www.suse.com/security/cve/CVE-2026-23112.html
  * https://www.suse.com/security/cve/CVE-2026-23113.html
  * https://www.suse.com/security/cve/CVE-2026-23116.html
  * https://www.suse.com/security/cve/CVE-2026-23119.html
  * https://www.suse.com/security/cve/CVE-2026-23121.html
  * https://www.suse.com/security/cve/CVE-2026-23129.html
  * https://www.suse.com/security/cve/CVE-2026-23133.html
  * https://www.suse.com/security/cve/CVE-2026-23135.html
  * https://www.suse.com/security/cve/CVE-2026-23139.html
  * https://www.suse.com/security/cve/CVE-2026-23141.html
  * https://www.suse.com/security/cve/CVE-2026-23145.html
  * https://www.suse.com/security/cve/CVE-2026-23146.html
  * https://www.suse.com/security/cve/CVE-2026-23150.html
  * https://www.suse.com/security/cve/CVE-2026-23151.html
  * https://www.suse.com/security/cve/CVE-2026-23152.html
  * https://www.suse.com/security/cve/CVE-2026-23155.html
  * https://www.suse.com/security/cve/CVE-2026-23156.html
  * https://www.suse.com/security/cve/CVE-2026-23163.html
  * https://www.suse.com/security/cve/CVE-2026-23166.html
  * https://www.suse.com/security/cve/CVE-2026-23167.html
  * https://www.suse.com/security/cve/CVE-2026-23170.html
  * https://www.suse.com/security/cve/CVE-2026-23171.html
  * https://www.suse.com/security/cve/CVE-2026-23172.html
  * https://www.suse.com/security/cve/CVE-2026-23173.html
  * https://www.suse.com/security/cve/CVE-2026-23176.html
  * https://www.suse.com/security/cve/CVE-2026-23178.html
  * https://www.suse.com/security/cve/CVE-2026-23179.html
  * https://www.suse.com/security/cve/CVE-2026-23182.html
  * https://www.suse.com/security/cve/CVE-2026-23190.html
  * https://www.suse.com/security/cve/CVE-2026-23191.html
  * https://www.suse.com/security/cve/CVE-2026-23198.html
  * https://www.suse.com/security/cve/CVE-2026-23202.html
  * https://www.suse.com/security/cve/CVE-2026-23207.html
  * https://www.suse.com/security/cve/CVE-2026-23208.html
  * https://www.suse.com/security/cve/CVE-2026-23209.html
  * https://www.suse.com/security/cve/CVE-2026-23213.html
  * https://www.suse.com/security/cve/CVE-2026-23214.html
  * https://www.suse.com/security/cve/CVE-2026-23221.html
  * https://www.suse.com/security/cve/CVE-2026-23222.html
  * https://www.suse.com/security/cve/CVE-2026-23229.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1012628
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1194869
  * https://bugzilla.suse.com/show_bug.cgi?id=1205462
  * https://bugzilla.suse.com/show_bug.cgi?id=1214285
  * https://bugzilla.suse.com/show_bug.cgi?id=1214635
  * https://bugzilla.suse.com/show_bug.cgi?id=1214847
  * https://bugzilla.suse.com/show_bug.cgi?id=1215146
  * https://bugzilla.suse.com/show_bug.cgi?id=1215199
  * https://bugzilla.suse.com/show_bug.cgi?id=1215211
  * https://bugzilla.suse.com/show_bug.cgi?id=1215344
  * https://bugzilla.suse.com/show_bug.cgi?id=1216062
  * https://bugzilla.suse.com/show_bug.cgi?id=1216436
  * https://bugzilla.suse.com/show_bug.cgi?id=1219165
  * https://bugzilla.suse.com/show_bug.cgi?id=1220419
  * https://bugzilla.suse.com/show_bug.cgi?id=1223731
  * https://bugzilla.suse.com/show_bug.cgi?id=1223800
  * https://bugzilla.suse.com/show_bug.cgi?id=1228490
  * https://bugzilla.suse.com/show_bug.cgi?id=1233563
  * https://bugzilla.suse.com/show_bug.cgi?id=1233640
  * https://bugzilla.suse.com/show_bug.cgi?id=1234163
  * https://bugzilla.suse.com/show_bug.cgi?id=1234842
  * https://bugzilla.suse.com/show_bug.cgi?id=1236022
  * https://bugzilla.suse.com/show_bug.cgi?id=1241345
  * https://bugzilla.suse.com/show_bug.cgi?id=1241437
  * https://bugzilla.suse.com/show_bug.cgi?id=1242909
  * https://bugzilla.suse.com/show_bug.cgi?id=1243055
  * https://bugzilla.suse.com/show_bug.cgi?id=1243677
  * https://bugzilla.suse.com/show_bug.cgi?id=1243678
  * https://bugzilla.suse.com/show_bug.cgi?id=1245193
  * https://bugzilla.suse.com/show_bug.cgi?id=1245449
  * https://bugzilla.suse.com/show_bug.cgi?id=1246184
  * https://bugzilla.suse.com/show_bug.cgi?id=1246328
  * https://bugzilla.suse.com/show_bug.cgi?id=1246447
  * https://bugzilla.suse.com/show_bug.cgi?id=1247030
  * https://bugzilla.suse.com/show_bug.cgi?id=1247500
  * https://bugzilla.suse.com/show_bug.cgi?id=1247712
  * https://bugzilla.suse.com/show_bug.cgi?id=1248211
  * https://bugzilla.suse.com/show_bug.cgi?id=1248886
  * https://bugzilla.suse.com/show_bug.cgi?id=1249256
  * https://bugzilla.suse.com/show_bug.cgi?id=1249307
  * https://bugzilla.suse.com/show_bug.cgi?id=1249587
  * https://bugzilla.suse.com/show_bug.cgi?id=1250032
  * https://bugzilla.suse.com/show_bug.cgi?id=1250082
  * https://bugzilla.suse.com/show_bug.cgi?id=1250334
  * https://bugzilla.suse.com/show_bug.cgi?id=1250388
  * https://bugzilla.suse.com/show_bug.cgi?id=1250705
  * https://bugzilla.suse.com/show_bug.cgi?id=1250748
  * https://bugzilla.suse.com/show_bug.cgi?id=1251966
  * https://bugzilla.suse.com/show_bug.cgi?id=1252046
  * https://bugzilla.suse.com/show_bug.cgi?id=1252342
  * https://bugzilla.suse.com/show_bug.cgi?id=1252511
  * https://bugzilla.suse.com/show_bug.cgi?id=1252686
  * https://bugzilla.suse.com/show_bug.cgi?id=1252712
  * https://bugzilla.suse.com/show_bug.cgi?id=1252776
  * https://bugzilla.suse.com/show_bug.cgi?id=1252808
  * https://bugzilla.suse.com/show_bug.cgi?id=1252824
  * https://bugzilla.suse.com/show_bug.cgi?id=1252861
  * https://bugzilla.suse.com/show_bug.cgi?id=1252891
  * https://bugzilla.suse.com/show_bug.cgi?id=1252900
  * https://bugzilla.suse.com/show_bug.cgi?id=1252911
  * https://bugzilla.suse.com/show_bug.cgi?id=1252919
  * https://bugzilla.suse.com/show_bug.cgi?id=1252924
  * https://bugzilla.suse.com/show_bug.cgi?id=1252973
  * https://bugzilla.suse.com/show_bug.cgi?id=1253087
  * https://bugzilla.suse.com/show_bug.cgi?id=1253155
  * https://bugzilla.suse.com/show_bug.cgi?id=1253262
  * https://bugzilla.suse.com/show_bug.cgi?id=1253342
  * https://bugzilla.suse.com/show_bug.cgi?id=1253365
  * https://bugzilla.suse.com/show_bug.cgi?id=1253386
  * https://bugzilla.suse.com/show_bug.cgi?id=1253400
  * https://bugzilla.suse.com/show_bug.cgi?id=1253402
  * https://bugzilla.suse.com/show_bug.cgi?id=1253408
  * https://bugzilla.suse.com/show_bug.cgi?id=1253413
  * https://bugzilla.suse.com/show_bug.cgi?id=1253442
  * https://bugzilla.suse.com/show_bug.cgi?id=1253451
  * https://bugzilla.suse.com/show_bug.cgi?id=1253458
  * https://bugzilla.suse.com/show_bug.cgi?id=1253463
  * https://bugzilla.suse.com/show_bug.cgi?id=1253622
  * https://bugzilla.suse.com/show_bug.cgi?id=1253623
  * https://bugzilla.suse.com/show_bug.cgi?id=1253647
  * https://bugzilla.suse.com/show_bug.cgi?id=1253691
  * https://bugzilla.suse.com/show_bug.cgi?id=1253739
  * https://bugzilla.suse.com/show_bug.cgi?id=1254119
  * https://bugzilla.suse.com/show_bug.cgi?id=1254126
  * https://bugzilla.suse.com/show_bug.cgi?id=1254244
  * https://bugzilla.suse.com/show_bug.cgi?id=1254373
  * https://bugzilla.suse.com/show_bug.cgi?id=1254378
  * https://bugzilla.suse.com/show_bug.cgi?id=1254447
  * https://bugzilla.suse.com/show_bug.cgi?id=1254465
  * https://bugzilla.suse.com/show_bug.cgi?id=1254510
  * https://bugzilla.suse.com/show_bug.cgi?id=1254518
  * https://bugzilla.suse.com/show_bug.cgi?id=1254520
  * https://bugzilla.suse.com/show_bug.cgi?id=1254599
  * https://bugzilla.suse.com/show_bug.cgi?id=1254606
  * https://bugzilla.suse.com/show_bug.cgi?id=1254611
  * https://bugzilla.suse.com/show_bug.cgi?id=1254613
  * https://bugzilla.suse.com/show_bug.cgi?id=1254615
  * https://bugzilla.suse.com/show_bug.cgi?id=1254621
  * https://bugzilla.suse.com/show_bug.cgi?id=1254623
  * https://bugzilla.suse.com/show_bug.cgi?id=1254624
  * https://bugzilla.suse.com/show_bug.cgi?id=1254626
  * https://bugzilla.suse.com/show_bug.cgi?id=1254648
  * https://bugzilla.suse.com/show_bug.cgi?id=1254649
  * https://bugzilla.suse.com/show_bug.cgi?id=1254653
  * https://bugzilla.suse.com/show_bug.cgi?id=1254655
  * https://bugzilla.suse.com/show_bug.cgi?id=1254657
  * https://bugzilla.suse.com/show_bug.cgi?id=1254660
  * https://bugzilla.suse.com/show_bug.cgi?id=1254661
  * https://bugzilla.suse.com/show_bug.cgi?id=1254663
  * https://bugzilla.suse.com/show_bug.cgi?id=1254669
  * https://bugzilla.suse.com/show_bug.cgi?id=1254677
  * https://bugzilla.suse.com/show_bug.cgi?id=1254678
  * https://bugzilla.suse.com/show_bug.cgi?id=1254688
  * https://bugzilla.suse.com/show_bug.cgi?id=1254690
  * https://bugzilla.suse.com/show_bug.cgi?id=1254691
  * https://bugzilla.suse.com/show_bug.cgi?id=1254693
  * https://bugzilla.suse.com/show_bug.cgi?id=1254695
  * https://bugzilla.suse.com/show_bug.cgi?id=1254698
  * https://bugzilla.suse.com/show_bug.cgi?id=1254701
  * https://bugzilla.suse.com/show_bug.cgi?id=1254704
  * https://bugzilla.suse.com/show_bug.cgi?id=1254705
  * https://bugzilla.suse.com/show_bug.cgi?id=1254707
  * https://bugzilla.suse.com/show_bug.cgi?id=1254712
  * https://bugzilla.suse.com/show_bug.cgi?id=1254715
  * https://bugzilla.suse.com/show_bug.cgi?id=1254717
  * https://bugzilla.suse.com/show_bug.cgi?id=1254723
  * https://bugzilla.suse.com/show_bug.cgi?id=1254724
  * https://bugzilla.suse.com/show_bug.cgi?id=1254732
  * https://bugzilla.suse.com/show_bug.cgi?id=1254733
  * https://bugzilla.suse.com/show_bug.cgi?id=1254737
  * https://bugzilla.suse.com/show_bug.cgi?id=1254739
  * https://bugzilla.suse.com/show_bug.cgi?id=1254742
  * https://bugzilla.suse.com/show_bug.cgi?id=1254743
  * https://bugzilla.suse.com/show_bug.cgi?id=1254749
  * https://bugzilla.suse.com/show_bug.cgi?id=1254750
  * https://bugzilla.suse.com/show_bug.cgi?id=1254753
  * https://bugzilla.suse.com/show_bug.cgi?id=1254754
  * https://bugzilla.suse.com/show_bug.cgi?id=1254758
  * https://bugzilla.suse.com/show_bug.cgi?id=1254761
  * https://bugzilla.suse.com/show_bug.cgi?id=1254762
  * https://bugzilla.suse.com/show_bug.cgi?id=1254765
  * https://bugzilla.suse.com/show_bug.cgi?id=1254767
  * https://bugzilla.suse.com/show_bug.cgi?id=1254782
  * https://bugzilla.suse.com/show_bug.cgi?id=1254791
  * https://bugzilla.suse.com/show_bug.cgi?id=1254793
  * https://bugzilla.suse.com/show_bug.cgi?id=1254794
  * https://bugzilla.suse.com/show_bug.cgi?id=1254795
  * https://bugzilla.suse.com/show_bug.cgi?id=1254796
  * https://bugzilla.suse.com/show_bug.cgi?id=1254797
  * https://bugzilla.suse.com/show_bug.cgi?id=1254798
  * https://bugzilla.suse.com/show_bug.cgi?id=1254813
  * https://bugzilla.suse.com/show_bug.cgi?id=1254815
  * https://bugzilla.suse.com/show_bug.cgi?id=1254825
  * https://bugzilla.suse.com/show_bug.cgi?id=1254828
  * https://bugzilla.suse.com/show_bug.cgi?id=1254829
  * https://bugzilla.suse.com/show_bug.cgi?id=1254830
  * https://bugzilla.suse.com/show_bug.cgi?id=1254832
  * https://bugzilla.suse.com/show_bug.cgi?id=1254835
  * https://bugzilla.suse.com/show_bug.cgi?id=1254839
  * https://bugzilla.suse.com/show_bug.cgi?id=1254840
  * https://bugzilla.suse.com/show_bug.cgi?id=1254842
  * https://bugzilla.suse.com/show_bug.cgi?id=1254843
  * https://bugzilla.suse.com/show_bug.cgi?id=1254845
  * https://bugzilla.suse.com/show_bug.cgi?id=1254846
  * https://bugzilla.suse.com/show_bug.cgi?id=1254847
  * https://bugzilla.suse.com/show_bug.cgi?id=1254849
  * https://bugzilla.suse.com/show_bug.cgi?id=1254850
  * https://bugzilla.suse.com/show_bug.cgi?id=1254851
  * https://bugzilla.suse.com/show_bug.cgi?id=1254852
  * https://bugzilla.suse.com/show_bug.cgi?id=1254854
  * https://bugzilla.suse.com/show_bug.cgi?id=1254856
  * https://bugzilla.suse.com/show_bug.cgi?id=1254858
  * https://bugzilla.suse.com/show_bug.cgi?id=1254860
  * https://bugzilla.suse.com/show_bug.cgi?id=1254864
  * https://bugzilla.suse.com/show_bug.cgi?id=1254869
  * https://bugzilla.suse.com/show_bug.cgi?id=1254871
  * https://bugzilla.suse.com/show_bug.cgi?id=1254894
  * https://bugzilla.suse.com/show_bug.cgi?id=1254918
  * https://bugzilla.suse.com/show_bug.cgi?id=1254957
  * https://bugzilla.suse.com/show_bug.cgi?id=1254959
  * https://bugzilla.suse.com/show_bug.cgi?id=1254983
  * https://bugzilla.suse.com/show_bug.cgi?id=1254992
  * https://bugzilla.suse.com/show_bug.cgi?id=1255005
  * https://bugzilla.suse.com/show_bug.cgi?id=1255009
  * https://bugzilla.suse.com/show_bug.cgi?id=1255025
  * https://bugzilla.suse.com/show_bug.cgi?id=1255026
  * https://bugzilla.suse.com/show_bug.cgi?id=1255030
  * https://bugzilla.suse.com/show_bug.cgi?id=1255033
  * https://bugzilla.suse.com/show_bug.cgi?id=1255034
  * https://bugzilla.suse.com/show_bug.cgi?id=1255035
  * https://bugzilla.suse.com/show_bug.cgi?id=1255039
  * https://bugzilla.suse.com/show_bug.cgi?id=1255041
  * https://bugzilla.suse.com/show_bug.cgi?id=1255042
  * https://bugzilla.suse.com/show_bug.cgi?id=1255046
  * https://bugzilla.suse.com/show_bug.cgi?id=1255057
  * https://bugzilla.suse.com/show_bug.cgi?id=1255062
  * https://bugzilla.suse.com/show_bug.cgi?id=1255064
  * https://bugzilla.suse.com/show_bug.cgi?id=1255065
  * https://bugzilla.suse.com/show_bug.cgi?id=1255068
  * https://bugzilla.suse.com/show_bug.cgi?id=1255072
  * https://bugzilla.suse.com/show_bug.cgi?id=1255075
  * https://bugzilla.suse.com/show_bug.cgi?id=1255077
  * https://bugzilla.suse.com/show_bug.cgi?id=1255081
  * https://bugzilla.suse.com/show_bug.cgi?id=1255082
  * https://bugzilla.suse.com/show_bug.cgi?id=1255083
  * https://bugzilla.suse.com/show_bug.cgi?id=1255092
  * https://bugzilla.suse.com/show_bug.cgi?id=1255094
  * https://bugzilla.suse.com/show_bug.cgi?id=1255095
  * https://bugzilla.suse.com/show_bug.cgi?id=1255100
  * https://bugzilla.suse.com/show_bug.cgi?id=1255102
  * https://bugzilla.suse.com/show_bug.cgi?id=1255120
  * https://bugzilla.suse.com/show_bug.cgi?id=1255122
  * https://bugzilla.suse.com/show_bug.cgi?id=1255128
  * https://bugzilla.suse.com/show_bug.cgi?id=1255129
  * https://bugzilla.suse.com/show_bug.cgi?id=1255131
  * https://bugzilla.suse.com/show_bug.cgi?id=1255134
  * https://bugzilla.suse.com/show_bug.cgi?id=1255135
  * https://bugzilla.suse.com/show_bug.cgi?id=1255136
  * https://bugzilla.suse.com/show_bug.cgi?id=1255138
  * https://bugzilla.suse.com/show_bug.cgi?id=1255140
  * https://bugzilla.suse.com/show_bug.cgi?id=1255142
  * https://bugzilla.suse.com/show_bug.cgi?id=1255146
  * https://bugzilla.suse.com/show_bug.cgi?id=1255149
  * https://bugzilla.suse.com/show_bug.cgi?id=1255152
  * https://bugzilla.suse.com/show_bug.cgi?id=1255154
  * https://bugzilla.suse.com/show_bug.cgi?id=1255155
  * https://bugzilla.suse.com/show_bug.cgi?id=1255157
  * https://bugzilla.suse.com/show_bug.cgi?id=1255163
  * https://bugzilla.suse.com/show_bug.cgi?id=1255164
  * https://bugzilla.suse.com/show_bug.cgi?id=1255167
  * https://bugzilla.suse.com/show_bug.cgi?id=1255169
  * https://bugzilla.suse.com/show_bug.cgi?id=1255171
  * https://bugzilla.suse.com/show_bug.cgi?id=1255172
  * https://bugzilla.suse.com/show_bug.cgi?id=1255175
  * https://bugzilla.suse.com/show_bug.cgi?id=1255179
  * https://bugzilla.suse.com/show_bug.cgi?id=1255182
  * https://bugzilla.suse.com/show_bug.cgi?id=1255187
  * https://bugzilla.suse.com/show_bug.cgi?id=1255190
  * https://bugzilla.suse.com/show_bug.cgi?id=1255193
  * https://bugzilla.suse.com/show_bug.cgi?id=1255197
  * https://bugzilla.suse.com/show_bug.cgi?id=1255199
  * https://bugzilla.suse.com/show_bug.cgi?id=1255202
  * https://bugzilla.suse.com/show_bug.cgi?id=1255203
  * https://bugzilla.suse.com/show_bug.cgi?id=1255206
  * https://bugzilla.suse.com/show_bug.cgi?id=1255209
  * https://bugzilla.suse.com/show_bug.cgi?id=1255216
  * https://bugzilla.suse.com/show_bug.cgi?id=1255218
  * https://bugzilla.suse.com/show_bug.cgi?id=1255221
  * https://bugzilla.suse.com/show_bug.cgi?id=1255224
  * https://bugzilla.suse.com/show_bug.cgi?id=1255227
  * https://bugzilla.suse.com/show_bug.cgi?id=1255230
  * https://bugzilla.suse.com/show_bug.cgi?id=1255233
  * https://bugzilla.suse.com/show_bug.cgi?id=1255241
  * https://bugzilla.suse.com/show_bug.cgi?id=1255245
  * https://bugzilla.suse.com/show_bug.cgi?id=1255246
  * https://bugzilla.suse.com/show_bug.cgi?id=1255251
  * https://bugzilla.suse.com/show_bug.cgi?id=1255252
  * https://bugzilla.suse.com/show_bug.cgi?id=1255253
  * https://bugzilla.suse.com/show_bug.cgi?id=1255255
  * https://bugzilla.suse.com/show_bug.cgi?id=1255259
  * https://bugzilla.suse.com/show_bug.cgi?id=1255260
  * https://bugzilla.suse.com/show_bug.cgi?id=1255261
  * https://bugzilla.suse.com/show_bug.cgi?id=1255262
  * https://bugzilla.suse.com/show_bug.cgi?id=1255265
  * https://bugzilla.suse.com/show_bug.cgi?id=1255266
  * https://bugzilla.suse.com/show_bug.cgi?id=1255268
  * https://bugzilla.suse.com/show_bug.cgi?id=1255269
  * https://bugzilla.suse.com/show_bug.cgi?id=1255272
  * https://bugzilla.suse.com/show_bug.cgi?id=1255273
  * https://bugzilla.suse.com/show_bug.cgi?id=1255274
  * https://bugzilla.suse.com/show_bug.cgi?id=1255276
  * https://bugzilla.suse.com/show_bug.cgi?id=1255279
  * https://bugzilla.suse.com/show_bug.cgi?id=1255280
  * https://bugzilla.suse.com/show_bug.cgi?id=1255281
  * https://bugzilla.suse.com/show_bug.cgi?id=1255297
  * https://bugzilla.suse.com/show_bug.cgi?id=1255318
  * https://bugzilla.suse.com/show_bug.cgi?id=1255325
  * https://bugzilla.suse.com/show_bug.cgi?id=1255327
  * https://bugzilla.suse.com/show_bug.cgi?id=1255329
  * https://bugzilla.suse.com/show_bug.cgi?id=1255351
  * https://bugzilla.suse.com/show_bug.cgi?id=1255377
  * https://bugzilla.suse.com/show_bug.cgi?id=1255379
  * https://bugzilla.suse.com/show_bug.cgi?id=1255380
  * https://bugzilla.suse.com/show_bug.cgi?id=1255395
  * https://bugzilla.suse.com/show_bug.cgi?id=1255401
  * https://bugzilla.suse.com/show_bug.cgi?id=1255403
  * https://bugzilla.suse.com/show_bug.cgi?id=1255415
  * https://bugzilla.suse.com/show_bug.cgi?id=1255417
  * https://bugzilla.suse.com/show_bug.cgi?id=1255428
  * https://bugzilla.suse.com/show_bug.cgi?id=1255480
  * https://bugzilla.suse.com/show_bug.cgi?id=1255482
  * https://bugzilla.suse.com/show_bug.cgi?id=1255483
  * https://bugzilla.suse.com/show_bug.cgi?id=1255488
  * https://bugzilla.suse.com/show_bug.cgi?id=1255489
  * https://bugzilla.suse.com/show_bug.cgi?id=1255493
  * https://bugzilla.suse.com/show_bug.cgi?id=1255495
  * https://bugzilla.suse.com/show_bug.cgi?id=1255505
  * https://bugzilla.suse.com/show_bug.cgi?id=1255507
  * https://bugzilla.suse.com/show_bug.cgi?id=1255530
  * https://bugzilla.suse.com/show_bug.cgi?id=1255537
  * https://bugzilla.suse.com/show_bug.cgi?id=1255538
  * https://bugzilla.suse.com/show_bug.cgi?id=1255539
  * https://bugzilla.suse.com/show_bug.cgi?id=1255540
  * https://bugzilla.suse.com/show_bug.cgi?id=1255544
  * https://bugzilla.suse.com/show_bug.cgi?id=1255545
  * https://bugzilla.suse.com/show_bug.cgi?id=1255547
  * https://bugzilla.suse.com/show_bug.cgi?id=1255548
  * https://bugzilla.suse.com/show_bug.cgi?id=1255549
  * https://bugzilla.suse.com/show_bug.cgi?id=1255550
  * https://bugzilla.suse.com/show_bug.cgi?id=1255552
  * https://bugzilla.suse.com/show_bug.cgi?id=1255553
  * https://bugzilla.suse.com/show_bug.cgi?id=1255557
  * https://bugzilla.suse.com/show_bug.cgi?id=1255558
  * https://bugzilla.suse.com/show_bug.cgi?id=1255563
  * https://bugzilla.suse.com/show_bug.cgi?id=1255564
  * https://bugzilla.suse.com/show_bug.cgi?id=1255567
  * https://bugzilla.suse.com/show_bug.cgi?id=1255568
  * https://bugzilla.suse.com/show_bug.cgi?id=1255569
  * https://bugzilla.suse.com/show_bug.cgi?id=1255570
  * https://bugzilla.suse.com/show_bug.cgi?id=1255578
  * https://bugzilla.suse.com/show_bug.cgi?id=1255579
  * https://bugzilla.suse.com/show_bug.cgi?id=1255580
  * https://bugzilla.suse.com/show_bug.cgi?id=1255583
  * https://bugzilla.suse.com/show_bug.cgi?id=1255591
  * https://bugzilla.suse.com/show_bug.cgi?id=1255601
  * https://bugzilla.suse.com/show_bug.cgi?id=1255603
  * https://bugzilla.suse.com/show_bug.cgi?id=1255605
  * https://bugzilla.suse.com/show_bug.cgi?id=1255611
  * https://bugzilla.suse.com/show_bug.cgi?id=1255614
  * https://bugzilla.suse.com/show_bug.cgi?id=1255615
  * https://bugzilla.suse.com/show_bug.cgi?id=1255616
  * https://bugzilla.suse.com/show_bug.cgi?id=1255617
  * https://bugzilla.suse.com/show_bug.cgi?id=1255618
  * https://bugzilla.suse.com/show_bug.cgi?id=1255621
  * https://bugzilla.suse.com/show_bug.cgi?id=1255622
  * https://bugzilla.suse.com/show_bug.cgi?id=1255628
  * https://bugzilla.suse.com/show_bug.cgi?id=1255629
  * https://bugzilla.suse.com/show_bug.cgi?id=1255630
  * https://bugzilla.suse.com/show_bug.cgi?id=1255632
  * https://bugzilla.suse.com/show_bug.cgi?id=1255636
  * https://bugzilla.suse.com/show_bug.cgi?id=1255688
  * https://bugzilla.suse.com/show_bug.cgi?id=1255691
  * https://bugzilla.suse.com/show_bug.cgi?id=1255695
  * https://bugzilla.suse.com/show_bug.cgi?id=1255698
  * https://bugzilla.suse.com/show_bug.cgi?id=1255702
  * https://bugzilla.suse.com/show_bug.cgi?id=1255704
  * https://bugzilla.suse.com/show_bug.cgi?id=1255706
  * https://bugzilla.suse.com/show_bug.cgi?id=1255707
  * https://bugzilla.suse.com/show_bug.cgi?id=1255709
  * https://bugzilla.suse.com/show_bug.cgi?id=1255722
  * https://bugzilla.suse.com/show_bug.cgi?id=1255758
  * https://bugzilla.suse.com/show_bug.cgi?id=1255759
  * https://bugzilla.suse.com/show_bug.cgi?id=1255760
  * https://bugzilla.suse.com/show_bug.cgi?id=1255763
  * https://bugzilla.suse.com/show_bug.cgi?id=1255769
  * https://bugzilla.suse.com/show_bug.cgi?id=1255770
  * https://bugzilla.suse.com/show_bug.cgi?id=1255772
  * https://bugzilla.suse.com/show_bug.cgi?id=1255774
  * https://bugzilla.suse.com/show_bug.cgi?id=1255775
  * https://bugzilla.suse.com/show_bug.cgi?id=1255776
  * https://bugzilla.suse.com/show_bug.cgi?id=1255780
  * https://bugzilla.suse.com/show_bug.cgi?id=1255785
  * https://bugzilla.suse.com/show_bug.cgi?id=1255786
  * https://bugzilla.suse.com/show_bug.cgi?id=1255789
  * https://bugzilla.suse.com/show_bug.cgi?id=1255790
  * https://bugzilla.suse.com/show_bug.cgi?id=1255792
  * https://bugzilla.suse.com/show_bug.cgi?id=1255793
  * https://bugzilla.suse.com/show_bug.cgi?id=1255795
  * https://bugzilla.suse.com/show_bug.cgi?id=1255798
  * https://bugzilla.suse.com/show_bug.cgi?id=1255800
  * https://bugzilla.suse.com/show_bug.cgi?id=1255801
  * https://bugzilla.suse.com/show_bug.cgi?id=1255806
  * https://bugzilla.suse.com/show_bug.cgi?id=1255807
  * https://bugzilla.suse.com/show_bug.cgi?id=1255809
  * https://bugzilla.suse.com/show_bug.cgi?id=1255810
  * https://bugzilla.suse.com/show_bug.cgi?id=1255812
  * https://bugzilla.suse.com/show_bug.cgi?id=1255814
  * https://bugzilla.suse.com/show_bug.cgi?id=1255820
  * https://bugzilla.suse.com/show_bug.cgi?id=1255838
  * https://bugzilla.suse.com/show_bug.cgi?id=1255842
  * https://bugzilla.suse.com/show_bug.cgi?id=1255843
  * https://bugzilla.suse.com/show_bug.cgi?id=1255872
  * https://bugzilla.suse.com/show_bug.cgi?id=1255875
  * https://bugzilla.suse.com/show_bug.cgi?id=1255879
  * https://bugzilla.suse.com/show_bug.cgi?id=1255883
  * https://bugzilla.suse.com/show_bug.cgi?id=1255884
  * https://bugzilla.suse.com/show_bug.cgi?id=1255886
  * https://bugzilla.suse.com/show_bug.cgi?id=1255888
  * https://bugzilla.suse.com/show_bug.cgi?id=1255890
  * https://bugzilla.suse.com/show_bug.cgi?id=1255891
  * https://bugzilla.suse.com/show_bug.cgi?id=1255892
  * https://bugzilla.suse.com/show_bug.cgi?id=1255899
  * https://bugzilla.suse.com/show_bug.cgi?id=1255902
  * https://bugzilla.suse.com/show_bug.cgi?id=1255907
  * https://bugzilla.suse.com/show_bug.cgi?id=1255911
  * https://bugzilla.suse.com/show_bug.cgi?id=1255915
  * https://bugzilla.suse.com/show_bug.cgi?id=1255918
  * https://bugzilla.suse.com/show_bug.cgi?id=1255921
  * https://bugzilla.suse.com/show_bug.cgi?id=1255924
  * https://bugzilla.suse.com/show_bug.cgi?id=1255925
  * https://bugzilla.suse.com/show_bug.cgi?id=1255930
  * https://bugzilla.suse.com/show_bug.cgi?id=1255931
  * https://bugzilla.suse.com/show_bug.cgi?id=1255932
  * https://bugzilla.suse.com/show_bug.cgi?id=1255934
  * https://bugzilla.suse.com/show_bug.cgi?id=1255943
  * https://bugzilla.suse.com/show_bug.cgi?id=1255944
  * https://bugzilla.suse.com/show_bug.cgi?id=1255949
  * https://bugzilla.suse.com/show_bug.cgi?id=1255951
  * https://bugzilla.suse.com/show_bug.cgi?id=1255952
  * https://bugzilla.suse.com/show_bug.cgi?id=1255955
  * https://bugzilla.suse.com/show_bug.cgi?id=1255957
  * https://bugzilla.suse.com/show_bug.cgi?id=1255961
  * https://bugzilla.suse.com/show_bug.cgi?id=1255963
  * https://bugzilla.suse.com/show_bug.cgi?id=1255964
  * https://bugzilla.suse.com/show_bug.cgi?id=1255967
  * https://bugzilla.suse.com/show_bug.cgi?id=1255974
  * https://bugzilla.suse.com/show_bug.cgi?id=1255978
  * https://bugzilla.suse.com/show_bug.cgi?id=1255984
  * https://bugzilla.suse.com/show_bug.cgi?id=1255988
  * https://bugzilla.suse.com/show_bug.cgi?id=1255990
  * https://bugzilla.suse.com/show_bug.cgi?id=1255992
  * https://bugzilla.suse.com/show_bug.cgi?id=1255993
  * https://bugzilla.suse.com/show_bug.cgi?id=1255994
  * https://bugzilla.suse.com/show_bug.cgi?id=1255996
  * https://bugzilla.suse.com/show_bug.cgi?id=1256033
  * https://bugzilla.suse.com/show_bug.cgi?id=1256034
  * https://bugzilla.suse.com/show_bug.cgi?id=1256045
  * https://bugzilla.suse.com/show_bug.cgi?id=1256050
  * https://bugzilla.suse.com/show_bug.cgi?id=1256058
  * https://bugzilla.suse.com/show_bug.cgi?id=1256071
  * https://bugzilla.suse.com/show_bug.cgi?id=1256074
  * https://bugzilla.suse.com/show_bug.cgi?id=1256081
  * https://bugzilla.suse.com/show_bug.cgi?id=1256082
  * https://bugzilla.suse.com/show_bug.cgi?id=1256083
  * https://bugzilla.suse.com/show_bug.cgi?id=1256084
  * https://bugzilla.suse.com/show_bug.cgi?id=1256085
  * https://bugzilla.suse.com/show_bug.cgi?id=1256090
  * https://bugzilla.suse.com/show_bug.cgi?id=1256093
  * https://bugzilla.suse.com/show_bug.cgi?id=1256094
  * https://bugzilla.suse.com/show_bug.cgi?id=1256095
  * https://bugzilla.suse.com/show_bug.cgi?id=1256096
  * https://bugzilla.suse.com/show_bug.cgi?id=1256099
  * https://bugzilla.suse.com/show_bug.cgi?id=1256100
  * https://bugzilla.suse.com/show_bug.cgi?id=1256104
  * https://bugzilla.suse.com/show_bug.cgi?id=1256106
  * https://bugzilla.suse.com/show_bug.cgi?id=1256107
  * https://bugzilla.suse.com/show_bug.cgi?id=1256117
  * https://bugzilla.suse.com/show_bug.cgi?id=1256119
  * https://bugzilla.suse.com/show_bug.cgi?id=1256121
  * https://bugzilla.suse.com/show_bug.cgi?id=1256145
  * https://bugzilla.suse.com/show_bug.cgi?id=1256153
  * https://bugzilla.suse.com/show_bug.cgi?id=1256178
  * https://bugzilla.suse.com/show_bug.cgi?id=1256197
  * https://bugzilla.suse.com/show_bug.cgi?id=1256231
  * https://bugzilla.suse.com/show_bug.cgi?id=1256233
  * https://bugzilla.suse.com/show_bug.cgi?id=1256234
  * https://bugzilla.suse.com/show_bug.cgi?id=1256238
  * https://bugzilla.suse.com/show_bug.cgi?id=1256263
  * https://bugzilla.suse.com/show_bug.cgi?id=1256267
  * https://bugzilla.suse.com/show_bug.cgi?id=1256268
  * https://bugzilla.suse.com/show_bug.cgi?id=1256271
  * https://bugzilla.suse.com/show_bug.cgi?id=1256273
  * https://bugzilla.suse.com/show_bug.cgi?id=1256274
  * https://bugzilla.suse.com/show_bug.cgi?id=1256279
  * https://bugzilla.suse.com/show_bug.cgi?id=1256280
  * https://bugzilla.suse.com/show_bug.cgi?id=1256285
  * https://bugzilla.suse.com/show_bug.cgi?id=1256291
  * https://bugzilla.suse.com/show_bug.cgi?id=1256292
  * https://bugzilla.suse.com/show_bug.cgi?id=1256300
  * https://bugzilla.suse.com/show_bug.cgi?id=1256301
  * https://bugzilla.suse.com/show_bug.cgi?id=1256302
  * https://bugzilla.suse.com/show_bug.cgi?id=1256335
  * https://bugzilla.suse.com/show_bug.cgi?id=1256348
  * https://bugzilla.suse.com/show_bug.cgi?id=1256351
  * https://bugzilla.suse.com/show_bug.cgi?id=1256354
  * https://bugzilla.suse.com/show_bug.cgi?id=1256358
  * https://bugzilla.suse.com/show_bug.cgi?id=1256361
  * https://bugzilla.suse.com/show_bug.cgi?id=1256364
  * https://bugzilla.suse.com/show_bug.cgi?id=1256366
  * https://bugzilla.suse.com/show_bug.cgi?id=1256367
  * https://bugzilla.suse.com/show_bug.cgi?id=1256368
  * https://bugzilla.suse.com/show_bug.cgi?id=1256369
  * https://bugzilla.suse.com/show_bug.cgi?id=1256370
  * https://bugzilla.suse.com/show_bug.cgi?id=1256371
  * https://bugzilla.suse.com/show_bug.cgi?id=1256373
  * https://bugzilla.suse.com/show_bug.cgi?id=1256375
  * https://bugzilla.suse.com/show_bug.cgi?id=1256379
  * https://bugzilla.suse.com/show_bug.cgi?id=1256387
  * https://bugzilla.suse.com/show_bug.cgi?id=1256394
  * https://bugzilla.suse.com/show_bug.cgi?id=1256395
  * https://bugzilla.suse.com/show_bug.cgi?id=1256396
  * https://bugzilla.suse.com/show_bug.cgi?id=1256528
  * https://bugzilla.suse.com/show_bug.cgi?id=1256564
  * https://bugzilla.suse.com/show_bug.cgi?id=1256579
  * https://bugzilla.suse.com/show_bug.cgi?id=1256582
  * https://bugzilla.suse.com/show_bug.cgi?id=1256584
  * https://bugzilla.suse.com/show_bug.cgi?id=1256586
  * https://bugzilla.suse.com/show_bug.cgi?id=1256591
  * https://bugzilla.suse.com/show_bug.cgi?id=1256593
  * https://bugzilla.suse.com/show_bug.cgi?id=1256597
  * https://bugzilla.suse.com/show_bug.cgi?id=1256605
  * https://bugzilla.suse.com/show_bug.cgi?id=1256606
  * https://bugzilla.suse.com/show_bug.cgi?id=1256607
  * https://bugzilla.suse.com/show_bug.cgi?id=1256609
  * https://bugzilla.suse.com/show_bug.cgi?id=1256610
  * https://bugzilla.suse.com/show_bug.cgi?id=1256611
  * https://bugzilla.suse.com/show_bug.cgi?id=1256612
  * https://bugzilla.suse.com/show_bug.cgi?id=1256613
  * https://bugzilla.suse.com/show_bug.cgi?id=1256616
  * https://bugzilla.suse.com/show_bug.cgi?id=1256617
  * https://bugzilla.suse.com/show_bug.cgi?id=1256619
  * https://bugzilla.suse.com/show_bug.cgi?id=1256622
  * https://bugzilla.suse.com/show_bug.cgi?id=1256623
  * https://bugzilla.suse.com/show_bug.cgi?id=1256625
  * https://bugzilla.suse.com/show_bug.cgi?id=1256628
  * https://bugzilla.suse.com/show_bug.cgi?id=1256630
  * https://bugzilla.suse.com/show_bug.cgi?id=1256638
  * https://bugzilla.suse.com/show_bug.cgi?id=1256640
  * https://bugzilla.suse.com/show_bug.cgi?id=1256641
  * https://bugzilla.suse.com/show_bug.cgi?id=1256645
  * https://bugzilla.suse.com/show_bug.cgi?id=1256646
  * https://bugzilla.suse.com/show_bug.cgi?id=1256650
  * https://bugzilla.suse.com/show_bug.cgi?id=1256651
  * https://bugzilla.suse.com/show_bug.cgi?id=1256653
  * https://bugzilla.suse.com/show_bug.cgi?id=1256654
  * https://bugzilla.suse.com/show_bug.cgi?id=1256655
  * https://bugzilla.suse.com/show_bug.cgi?id=1256659
  * https://bugzilla.suse.com/show_bug.cgi?id=1256660
  * https://bugzilla.suse.com/show_bug.cgi?id=1256664
  * https://bugzilla.suse.com/show_bug.cgi?id=1256665
  * https://bugzilla.suse.com/show_bug.cgi?id=1256674
  * https://bugzilla.suse.com/show_bug.cgi?id=1256679
  * https://bugzilla.suse.com/show_bug.cgi?id=1256680
  * https://bugzilla.suse.com/show_bug.cgi?id=1256682
  * https://bugzilla.suse.com/show_bug.cgi?id=1256683
  * https://bugzilla.suse.com/show_bug.cgi?id=1256688
  * https://bugzilla.suse.com/show_bug.cgi?id=1256689
  * https://bugzilla.suse.com/show_bug.cgi?id=1256708
  * https://bugzilla.suse.com/show_bug.cgi?id=1256716
  * https://bugzilla.suse.com/show_bug.cgi?id=1256726
  * https://bugzilla.suse.com/show_bug.cgi?id=1256728
  * https://bugzilla.suse.com/show_bug.cgi?id=1256730
  * https://bugzilla.suse.com/show_bug.cgi?id=1256733
  * https://bugzilla.suse.com/show_bug.cgi?id=1256737
  * https://bugzilla.suse.com/show_bug.cgi?id=1256741
  * https://bugzilla.suse.com/show_bug.cgi?id=1256742
  * https://bugzilla.suse.com/show_bug.cgi?id=1256744
  * https://bugzilla.suse.com/show_bug.cgi?id=1256752
  * https://bugzilla.suse.com/show_bug.cgi?id=1256754
  * https://bugzilla.suse.com/show_bug.cgi?id=1256755
  * https://bugzilla.suse.com/show_bug.cgi?id=1256757
  * https://bugzilla.suse.com/show_bug.cgi?id=1256759
  * https://bugzilla.suse.com/show_bug.cgi?id=1256760
  * https://bugzilla.suse.com/show_bug.cgi?id=1256761
  * https://bugzilla.suse.com/show_bug.cgi?id=1256763
  * https://bugzilla.suse.com/show_bug.cgi?id=1256770
  * https://bugzilla.suse.com/show_bug.cgi?id=1256773
  * https://bugzilla.suse.com/show_bug.cgi?id=1256774
  * https://bugzilla.suse.com/show_bug.cgi?id=1256777
  * https://bugzilla.suse.com/show_bug.cgi?id=1256779
  * https://bugzilla.suse.com/show_bug.cgi?id=1256781
  * https://bugzilla.suse.com/show_bug.cgi?id=1256785
  * https://bugzilla.suse.com/show_bug.cgi?id=1256792
  * https://bugzilla.suse.com/show_bug.cgi?id=1256802
  * https://bugzilla.suse.com/show_bug.cgi?id=1256861
  * https://bugzilla.suse.com/show_bug.cgi?id=1256863
  * https://bugzilla.suse.com/show_bug.cgi?id=1257035
  * https://bugzilla.suse.com/show_bug.cgi?id=1257053
  * https://bugzilla.suse.com/show_bug.cgi?id=1257154
  * https://bugzilla.suse.com/show_bug.cgi?id=1257155
  * https://bugzilla.suse.com/show_bug.cgi?id=1257158
  * https://bugzilla.suse.com/show_bug.cgi?id=1257159
  * https://bugzilla.suse.com/show_bug.cgi?id=1257163
  * https://bugzilla.suse.com/show_bug.cgi?id=1257164
  * https://bugzilla.suse.com/show_bug.cgi?id=1257179
  * https://bugzilla.suse.com/show_bug.cgi?id=1257180
  * https://bugzilla.suse.com/show_bug.cgi?id=1257202
  * https://bugzilla.suse.com/show_bug.cgi?id=1257204
  * https://bugzilla.suse.com/show_bug.cgi?id=1257207
  * https://bugzilla.suse.com/show_bug.cgi?id=1257208
  * https://bugzilla.suse.com/show_bug.cgi?id=1257209
  * https://bugzilla.suse.com/show_bug.cgi?id=1257215
  * https://bugzilla.suse.com/show_bug.cgi?id=1257217
  * https://bugzilla.suse.com/show_bug.cgi?id=1257218
  * https://bugzilla.suse.com/show_bug.cgi?id=1257220
  * https://bugzilla.suse.com/show_bug.cgi?id=1257221
  * https://bugzilla.suse.com/show_bug.cgi?id=1257227
  * https://bugzilla.suse.com/show_bug.cgi?id=1257228
  * https://bugzilla.suse.com/show_bug.cgi?id=1257231
  * https://bugzilla.suse.com/show_bug.cgi?id=1257232
  * https://bugzilla.suse.com/show_bug.cgi?id=1257234
  * https://bugzilla.suse.com/show_bug.cgi?id=1257236
  * https://bugzilla.suse.com/show_bug.cgi?id=1257245
  * https://bugzilla.suse.com/show_bug.cgi?id=1257246
  * https://bugzilla.suse.com/show_bug.cgi?id=1257277
  * https://bugzilla.suse.com/show_bug.cgi?id=1257282
  * https://bugzilla.suse.com/show_bug.cgi?id=1257296
  * https://bugzilla.suse.com/show_bug.cgi?id=1257332
  * https://bugzilla.suse.com/show_bug.cgi?id=1257473
  * https://bugzilla.suse.com/show_bug.cgi?id=1257552
  * https://bugzilla.suse.com/show_bug.cgi?id=1257554
  * https://bugzilla.suse.com/show_bug.cgi?id=1257557
  * https://bugzilla.suse.com/show_bug.cgi?id=1257559
  * https://bugzilla.suse.com/show_bug.cgi?id=1257560
  * https://bugzilla.suse.com/show_bug.cgi?id=1257562
  * https://bugzilla.suse.com/show_bug.cgi?id=1257570
  * https://bugzilla.suse.com/show_bug.cgi?id=1257573
  * https://bugzilla.suse.com/show_bug.cgi?id=1257576
  * https://bugzilla.suse.com/show_bug.cgi?id=1257579
  * https://bugzilla.suse.com/show_bug.cgi?id=1257580
  * https://bugzilla.suse.com/show_bug.cgi?id=1257586
  * https://bugzilla.suse.com/show_bug.cgi?id=1257603
  * https://bugzilla.suse.com/show_bug.cgi?id=1257635
  * https://bugzilla.suse.com/show_bug.cgi?id=1257679
  * https://bugzilla.suse.com/show_bug.cgi?id=1257687
  * https://bugzilla.suse.com/show_bug.cgi?id=1257704
  * https://bugzilla.suse.com/show_bug.cgi?id=1257706
  * https://bugzilla.suse.com/show_bug.cgi?id=1257707
  * https://bugzilla.suse.com/show_bug.cgi?id=1257714
  * https://bugzilla.suse.com/show_bug.cgi?id=1257715
  * https://bugzilla.suse.com/show_bug.cgi?id=1257716
  * https://bugzilla.suse.com/show_bug.cgi?id=1257718
  * https://bugzilla.suse.com/show_bug.cgi?id=1257722
  * https://bugzilla.suse.com/show_bug.cgi?id=1257723
  * https://bugzilla.suse.com/show_bug.cgi?id=1257729
  * https://bugzilla.suse.com/show_bug.cgi?id=1257735
  * https://bugzilla.suse.com/show_bug.cgi?id=1257739
  * https://bugzilla.suse.com/show_bug.cgi?id=1257740
  * https://bugzilla.suse.com/show_bug.cgi?id=1257741
  * https://bugzilla.suse.com/show_bug.cgi?id=1257743
  * https://bugzilla.suse.com/show_bug.cgi?id=1257745
  * https://bugzilla.suse.com/show_bug.cgi?id=1257749
  * https://bugzilla.suse.com/show_bug.cgi?id=1257750
  * https://bugzilla.suse.com/show_bug.cgi?id=1257757
  * https://bugzilla.suse.com/show_bug.cgi?id=1257758
  * https://bugzilla.suse.com/show_bug.cgi?id=1257759
  * https://bugzilla.suse.com/show_bug.cgi?id=1257761
  * https://bugzilla.suse.com/show_bug.cgi?id=1257762
  * https://bugzilla.suse.com/show_bug.cgi?id=1257763
  * https://bugzilla.suse.com/show_bug.cgi?id=1257765
  * https://bugzilla.suse.com/show_bug.cgi?id=1257768
  * https://bugzilla.suse.com/show_bug.cgi?id=1257770
  * https://bugzilla.suse.com/show_bug.cgi?id=1257772
  * https://bugzilla.suse.com/show_bug.cgi?id=1257775
  * https://bugzilla.suse.com/show_bug.cgi?id=1257776
  * https://bugzilla.suse.com/show_bug.cgi?id=1257788
  * https://bugzilla.suse.com/show_bug.cgi?id=1257789
  * https://bugzilla.suse.com/show_bug.cgi?id=1257790
  * https://bugzilla.suse.com/show_bug.cgi?id=1257805
  * https://bugzilla.suse.com/show_bug.cgi?id=1257808
  * https://bugzilla.suse.com/show_bug.cgi?id=1257809
  * https://bugzilla.suse.com/show_bug.cgi?id=1257811
  * https://bugzilla.suse.com/show_bug.cgi?id=1257813
  * https://bugzilla.suse.com/show_bug.cgi?id=1257816
  * https://bugzilla.suse.com/show_bug.cgi?id=1257830
  * https://bugzilla.suse.com/show_bug.cgi?id=1257891
  * https://bugzilla.suse.com/show_bug.cgi?id=1257952
  * https://bugzilla.suse.com/show_bug.cgi?id=1258153
  * https://bugzilla.suse.com/show_bug.cgi?id=1258181
  * https://bugzilla.suse.com/show_bug.cgi?id=1258184
  * https://bugzilla.suse.com/show_bug.cgi?id=1258222
  * https://bugzilla.suse.com/show_bug.cgi?id=1258234
  * https://bugzilla.suse.com/show_bug.cgi?id=1258237
  * https://bugzilla.suse.com/show_bug.cgi?id=1258245
  * https://bugzilla.suse.com/show_bug.cgi?id=1258249
  * https://bugzilla.suse.com/show_bug.cgi?id=1258252
  * https://bugzilla.suse.com/show_bug.cgi?id=1258256
  * https://bugzilla.suse.com/show_bug.cgi?id=1258259
  * https://bugzilla.suse.com/show_bug.cgi?id=1258272
  * https://bugzilla.suse.com/show_bug.cgi?id=1258273
  * https://bugzilla.suse.com/show_bug.cgi?id=1258277
  * https://bugzilla.suse.com/show_bug.cgi?id=1258278
  * https://bugzilla.suse.com/show_bug.cgi?id=1258279
  * https://bugzilla.suse.com/show_bug.cgi?id=1258299
  * https://bugzilla.suse.com/show_bug.cgi?id=1258304
  * https://bugzilla.suse.com/show_bug.cgi?id=1258309
  * https://bugzilla.suse.com/show_bug.cgi?id=1258313
  * https://bugzilla.suse.com/show_bug.cgi?id=1258317
  * https://bugzilla.suse.com/show_bug.cgi?id=1258321
  * https://bugzilla.suse.com/show_bug.cgi?id=1258326
  * https://bugzilla.suse.com/show_bug.cgi?id=1258338
  * https://bugzilla.suse.com/show_bug.cgi?id=1258349
  * https://bugzilla.suse.com/show_bug.cgi?id=1258354
  * https://bugzilla.suse.com/show_bug.cgi?id=1258358
  * https://bugzilla.suse.com/show_bug.cgi?id=1258374
  * https://bugzilla.suse.com/show_bug.cgi?id=1258377
  * https://bugzilla.suse.com/show_bug.cgi?id=1258379
  * https://bugzilla.suse.com/show_bug.cgi?id=1258394
  * https://bugzilla.suse.com/show_bug.cgi?id=1258395
  * https://bugzilla.suse.com/show_bug.cgi?id=1258397
  * https://bugzilla.suse.com/show_bug.cgi?id=1258411
  * https://bugzilla.suse.com/show_bug.cgi?id=1258415
  * https://bugzilla.suse.com/show_bug.cgi?id=1258419
  * https://bugzilla.suse.com/show_bug.cgi?id=1258422
  * https://bugzilla.suse.com/show_bug.cgi?id=1258424
  * https://bugzilla.suse.com/show_bug.cgi?id=1258429
  * https://bugzilla.suse.com/show_bug.cgi?id=1258442
  * https://bugzilla.suse.com/show_bug.cgi?id=1258464
  * https://bugzilla.suse.com/show_bug.cgi?id=1258465
  * https://bugzilla.suse.com/show_bug.cgi?id=1258468
  * https://bugzilla.suse.com/show_bug.cgi?id=1258469
  * https://bugzilla.suse.com/show_bug.cgi?id=1258484
  * https://bugzilla.suse.com/show_bug.cgi?id=1258518
  * https://bugzilla.suse.com/show_bug.cgi?id=1258519
  * https://bugzilla.suse.com/show_bug.cgi?id=1258520
  * https://bugzilla.suse.com/show_bug.cgi?id=1258524
  * https://bugzilla.suse.com/show_bug.cgi?id=1258544
  * https://bugzilla.suse.com/show_bug.cgi?id=1258660
  * https://bugzilla.suse.com/show_bug.cgi?id=1258824
  * https://bugzilla.suse.com/show_bug.cgi?id=1258928
  * https://bugzilla.suse.com/show_bug.cgi?id=1259070
  * https://jira.suse.com/browse/PED-12554
  * https://jira.suse.com/browse/PED-14062
  * https://jira.suse.com/browse/PED-14571
  * https://jira.suse.com/browse/PED-6996

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260324/35d48468/attachment-0001.htm>


More information about the sle-security-updates mailing list