From null at suse.de Mon Mar 2 08:30:12 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:12 -0000 Subject: SUSE-SU-2026:0734-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) Message-ID: <177244021257.22.5082057620707217699@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0734-1 Release Date: 2026-03-01T19:33:48Z Rating: important References: * bsc#1256097 * bsc#1258139 Cross-References: * CVE-2023-54142 * CVE-2025-38129 CVSS scores: * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.133 fixes various security issues The following security issues were fixed: * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256097). * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-734=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-734=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_34-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_133-default-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_34-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_133-default-2-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1256097 * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:19 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:19 -0000 Subject: SUSE-SU-2026:0731-1: important: Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) Message-ID: <177244021908.22.493462914904077205@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 33 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0731-1 Release Date: 2026-03-01T19:33:40Z Rating: important References: * bsc#1255577 * bsc#1256097 * bsc#1258139 Cross-References: * CVE-2022-50700 * CVE-2023-54142 * CVE-2025-38129 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.130 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256097). * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-733=1 SUSE-2026-732=1 SUSE-2026-731=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-731=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-733=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-732=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_124-default-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_127-default-2-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_33-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_130-default-2-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_31-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-5-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_32-debugsource-2-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_124-default-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_127-default-2-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_33-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_130-default-2-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_31-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-5-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_32-debugsource-2-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1256097 * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:25 -0000 Subject: SUSE-SU-2026:0727-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) Message-ID: <177244022566.22.9658747011883892457@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0727-1 Release Date: 2026-03-01T15:04:08Z Rating: important References: * bsc#1255577 * bsc#1256097 * bsc#1258139 Cross-References: * CVE-2022-50700 * CVE-2023-54142 * CVE-2025-38129 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.121 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256097). * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-728=1 SUSE-2026-729=1 SUSE-2026-730=1 SUSE-2026-727=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-727=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-728=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-729=1 SUSE-SLE-Module-Live-Patching-15-SP5-2026-730=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_29-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_30-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_30-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-10-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1256097 * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:32 -0000 Subject: SUSE-SU-2026:0725-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) Message-ID: <177244023204.22.12542502166958402895@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0725-1 Release Date: 2026-03-01T10:33:42Z Rating: important References: * bsc#1255577 * bsc#1256097 * bsc#1258139 Cross-References: * CVE-2022-50700 * CVE-2023-54142 * CVE-2025-38129 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.103 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256097). * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-725=1 SUSE-2026-724=1 SUSE-2026-726=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-725=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-724=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-726=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_25-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-14-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_25-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-14-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1256097 * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:38 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:38 -0000 Subject: SUSE-SU-2026:0713-1: important: Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) Message-ID: <177244023825.22.1040157147977996669@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0713-1 Release Date: 2026-03-01T07:33:38Z Rating: important References: * bsc#1255577 * bsc#1256097 * bsc#1258139 Cross-References: * CVE-2022-50700 * CVE-2023-54142 * CVE-2025-38129 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.94 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256097). * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-719=1 SUSE-SLE- Module-Live-Patching-15-SP4-2026-720=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-721=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-722=1 SUSE- SLE-Module-Live-Patching-15-SP4-2026-713=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-714=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-715=1 SUSE- SLE-Module-Live-Patching-15-SP4-2026-716=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-717=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-718=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-720=1 SUSE-2026-721=1 SUSE-2026-722=1 SUSE-2026-713=1 SUSE-2026-714=1 SUSE-2026-715=1 SUSE-2026-716=1 SUSE-2026-717=1 SUSE-2026-718=1 SUSE-2026-719=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-723=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-723=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_176-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_187-default-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_47-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_44-debugsource-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_184-default-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_46-debugsource-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_43-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-13-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_176-default-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_187-default-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_47-debugsource-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_44-debugsource-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_184-default-2-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_46-debugsource-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_43-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_184-default-debuginfo-2-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-13-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_94-default-15-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-15-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_94-default-15-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-15-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1256097 * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:45 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:45 -0000 Subject: SUSE-SU-2026:0711-1: important: Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) Message-ID: <177244024515.22.15419518432111655079@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 37 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0711-1 Release Date: 2026-02-28T18:33:50Z Rating: important References: * bsc#1255577 * bsc#1256097 * bsc#1258139 Cross-References: * CVE-2022-50700 * CVE-2023-54142 * CVE-2025-38129 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.153 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256097). * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-711=1 SUSE-SLE- Module-Live-Patching-15-SP4-2026-712=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-712=1 SUSE-2026-711=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-15-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-15-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1256097 * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:48 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:48 -0000 Subject: SUSE-SU-2026:0710-1: important: Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) Message-ID: <177244024853.22.14083486600055624158@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 76 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0710-1 Release Date: 2026-02-28T15:33:45Z Rating: important References: * bsc#1255845 Cross-References: * CVE-2022-50717 CVSS scores: * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.290 fixes one security issue The following security issue was fixed: * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255845). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-710=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_290-default-2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50717.html * https://bugzilla.suse.com/show_bug.cgi?id=1255845 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:53 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:53 -0000 Subject: SUSE-SU-2026:0707-1: important: Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) Message-ID: <177244025367.22.15720278901996189050@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0707-1 Release Date: 2026-02-28T15:33:39Z Rating: important References: * bsc#1255577 * bsc#1255845 Cross-References: * CVE-2022-50700 * CVE-2022-50717 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.283 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255845). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-707=1 SUSE-SLE-Live- Patching-12-SP5-2026-708=1 SUSE-SLE-Live-Patching-12-SP5-2026-709=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_280-default-2-2.1 * kgraft-patch-4_12_14-122_283-default-2-2.1 * kgraft-patch-4_12_14-122_275-default-4-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2022-50717.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1255845 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:30:58 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:30:58 -0000 Subject: SUSE-SU-2026:0700-1: important: Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) Message-ID: <177244025805.22.3434687538339883635@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0700-1 Release Date: 2026-02-28T10:33:42Z Rating: important References: * bsc#1255577 * bsc#1255845 Cross-References: * CVE-2022-50700 * CVE-2022-50717 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.272 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255845). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-701=1 SUSE-SLE-Live- Patching-12-SP5-2026-705=1 SUSE-SLE-Live-Patching-12-SP5-2026-706=1 SUSE-SLE- Live-Patching-12-SP5-2026-700=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_266-default-10-2.1 * kgraft-patch-4_12_14-122_269-default-7-2.1 * kgraft-patch-4_12_14-122_272-default-6-2.1 * kgraft-patch-4_12_14-122_261-default-10-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2022-50717.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1255845 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:31:07 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:31:07 -0000 Subject: SUSE-RU-2026:0704-1: moderate: Recommended update for fence-agents Message-ID: <177244026720.22.17323275281076306178@7fdb67da15da> # Recommended update for fence-agents Announcement ID: SUSE-RU-2026:0704-1 Release Date: 2026-02-28T10:02:10Z Rating: moderate References: * bsc#1250417 * bsc#1253230 * jsc#PED-13087 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature and has two fixes can now be installed. ## Description: This update for fence-agents fixes the following issues: * add new skip_os_shutdown flag to fence_aws fence agent (bsc#1250417). * Adding new fence agent for Nutanix AHV (jsc#PED-13087, bsc#1253230). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-704=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2026-704=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * fence-agents-debuginfo-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-devel-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-debugsource-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-amt_ws-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * openSUSE Leap 15.5 (noarch) * fence-agents-azure-arm-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * fence-agents-debuginfo-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-devel-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-debugsource-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * fence-agents-4.12.1+git.1677142927.bf55c675-150500.4.28.3 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * fence-agents-azure-arm-4.12.1+git.1677142927.bf55c675-150500.4.28.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1250417 * https://bugzilla.suse.com/show_bug.cgi?id=1253230 * https://jira.suse.com/browse/PED-13087 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:31:18 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:31:18 -0000 Subject: SUSE-SU-2026:0703-1: important: Security update for libsoup Message-ID: <177244027814.22.2005978582023146935@7fdb67da15da> # Security update for libsoup Announcement ID: SUSE-SU-2026:0703-1 Release Date: 2026-02-28T10:01:52Z Rating: important References: * bsc#1240751 * bsc#1243422 * bsc#1256418 * bsc#1258120 * bsc#1258170 * bsc#1258508 Cross-References: * CVE-2025-32049 * CVE-2025-4476 * CVE-2026-0716 * CVE-2026-2369 * CVE-2026-2443 * CVE-2026-2708 CVSS scores: * CVE-2025-32049 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32049 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32049 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-4476 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-4476 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-4476 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2026-0716 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L * CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-2369 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-2369 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-2443 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2026-2443 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2443 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2708 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-2708 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves six vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2026-0716: improper bounds handling may allow out-of-bounds read (bsc#1256418). * CVE-2025-4476: null pointer dereference may lead to denial of service (bsc#1243422). * CVE-2025-32049: denial of Service attack to websocket server (bsc#1240751). * CVE-2026-2369: buffer overread due to integer underflow when handling zero- length resources (bsc#1258120). * CVE-2026-2443: out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information disclosure to remote attackers (bsc#1258170). * CVE-2026-2708: HTTP request smuggling via duplicate Content-Length headers (bsc#1258508). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-703=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-703=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-2_4-2.62.2-5.34.1 * libsoup-2_4-1-2.62.2-5.34.1 * libsoup-debugsource-2.62.2-5.34.1 * libsoup-devel-2.62.2-5.34.1 * libsoup-2_4-1-debuginfo-2.62.2-5.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libsoup-lang-2.62.2-5.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.34.1 * libsoup-2_4-1-32bit-2.62.2-5.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * typelib-1_0-Soup-2_4-2.62.2-5.34.1 * libsoup-2_4-1-32bit-2.62.2-5.34.1 * libsoup-2_4-1-2.62.2-5.34.1 * libsoup-debugsource-2.62.2-5.34.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.34.1 * libsoup-devel-2.62.2-5.34.1 * libsoup-2_4-1-debuginfo-2.62.2-5.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libsoup-lang-2.62.2-5.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32049.html * https://www.suse.com/security/cve/CVE-2025-4476.html * https://www.suse.com/security/cve/CVE-2026-0716.html * https://www.suse.com/security/cve/CVE-2026-2369.html * https://www.suse.com/security/cve/CVE-2026-2443.html * https://www.suse.com/security/cve/CVE-2026-2708.html * https://bugzilla.suse.com/show_bug.cgi?id=1240751 * https://bugzilla.suse.com/show_bug.cgi?id=1243422 * https://bugzilla.suse.com/show_bug.cgi?id=1256418 * https://bugzilla.suse.com/show_bug.cgi?id=1258120 * https://bugzilla.suse.com/show_bug.cgi?id=1258170 * https://bugzilla.suse.com/show_bug.cgi?id=1258508 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:31:19 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:31:19 -0000 Subject: SUSE-RU-2026:0702-1: moderate: Recommended update for osc Message-ID: <177244027957.22.11256051140762665352@7fdb67da15da> # Recommended update for osc Announcement ID: SUSE-RU-2026:0702-1 Release Date: 2026-02-28T09:59:13Z Rating: moderate References: Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for osc fixes the following issues: osc was updated to 1.22.0: * Command-line: * Add 'git-obs staging' commands * Add '\--gitea-fork-org' option to 'osc fork' command * Add '\--git-branch' option to 'osc fork' command * Add 'DELETE' to 'git-obs api' allowed methods * Add commit messages as commented lines to the template in 'git-obs pr create' * Add filtering by label to 'git-obs pr list' * Properly handle fork mismatch in 'osc fork' * Change 'osc build' to build from any git repo if '\--alternative-project' is specified * Fix 'osc service' for git based packages * Fix 'git-obs pr dump' to skip the dump if the target has the same updated_at timestamp as the pull request in Gitea * Fix 'git-obs pr dump' to do case insensitive check on owner and repo * Fix retrieving 'arch' argument in 'osc buildlog' * Library: * Add 'status' to the output of gitea_api.Git.get_submodules() * Add 'remote' argument to gitea_api.Repo.clone_or_update() * Add gitea_api.common.TemporaryDirectory class that supports 'delete' argument on python 3.6+ * Add gitea_api.GitDiffGenerator class for creating submodule diffs without a git checkout * Add 'depth' argument to gitea_api.Repo.clone() and clone_or_update() * Add gitea_api.StagingPullRequestWrapper class for handling staging * Add gitea_api.PullRequest.get_host_owner_repo_number() method * Make GitObsCommand.add_argument_owner_repo() and add_argument_owner_repo_pull() reusable by allowing setting 'dest' argument * Warn if the git package doesn't have the same branch as the parent project * Extend gitea_api.PullRequest with methods that work with 'PR:' references * Support setting labels in gitea_api.PullRequest.create() * Fix gitea_api to use pagination instead of limit -1 everywhere * Remove duplicate, unused PullRequestReview class from gitea_api.pr * Move clone_or_update() from 'git-obs pr dump' command to gitea_api.Repo * Change gitea_api.Repo.clone_or_update() to take 'ssh_private_key_path' argument * Improve performance of gitea_api.IssueTimelineEntry by listing and caching requests instead of fetching them one by one * Make GitObsCommand.add_argument_owner_repo() and add_argument_owner_repo_pull() reusable by allowing setting 'help' argument * Change gitea_api.Repo.clone() to stop borrowing objects when 'reference' or 'reference_if_able' is used * Fix the resulting dictionary in gitea_api.PullRequest._get_label_ids() * Make gitea_api.RepoExists exception more helpful by giving a hint to fork under a different name * Use server_diff() instead of server_diff_noex() to exit with a non-zero return code * Return preinstallimage.info and allow podman to use preinstallimage Update to 1.21.0: * Command-line: * Modify osc subcommands to error out if they don't work with git * Add 'git-obs meta' commands for managing the local metadata * Add 'git-obs meta info' command for printing resolved metadata about the current checkout * Add -b/--branch option to 'git-obs repo clone' command * Add 'git-obs pr dump' command to store pull request information on disk * Add 'git-obs --quiet' option (that mutes printing gitea settings now) * Automatially pull meta after 'git-obs repo clone' * Change 'git-obs pr review interactive' to write 'merge ok' comment instead of scheduling a merge * Mute stderr when creating a worktree in 'git-obs pr review interactive' * Change 'git-obs -G' to accept url to select a gitea login entry * Support substitutions in 'osc build --root' * Fix crash in 'osc build' when 'build_repositories' in store was None * Fix filtering by reviewers in 'git-obs pr list' * Update 'osc rq show' command to include history comments in verbose mode * Library: * Refactor GitStore * Migrate git_scm.Store over to gitea_api.Git * Store buildinfo and buildconfig files in GitStore's cache instead directly in the repo * Move code from 'git-obs meta pull' command to GitStore.pull() * Improve GitStore.pull() to support reading project from project.build * Rephrase the error message about detached HEAD in GitStore * Improve GitStore's error messages by adding instructions on how to fix missing metadata * Be more permissive when loading parent project_store in GitStore * Fix loading _manifest in a project git * Fix git store to check if all the required fields are present * Derive package name from topdir if a package is part of a project checkout * Change 'git-obs pr review interactive' to run pager process as a context manager * Change obs_api.TarDiff to spawn a process extracting archives as a context manager * Change 'commit' argument in gitea_api.Git.reset() to optional * Add gitea_api.Git.get_owner_repo_from_url() staticmethod * Add gitea_api.Git.urljoin() static method * Fix gitea_api.Git.get_branch_head() to raise a proper exception if the HEAD cannot be retrieved * Fix gitea_api.Git to work with the current remote instead of 'origin' * Fix get_store() to throw the exception from git store if .osc directory is not present * Introduce GitObsRuntimeError exception and use it where appropriate * Fix tardiff by removing directories with shutil.rmtree() and files by os.unlink() * Add 'quiet' option to gitea_api.Git.switch() * Mute stderr in git_obs.Git.lfs_cat_file() * Treat None flavor as "" in multibuild resolve * Make Token.triggered_at optional as it's not available in the oficially released OBS code * Add BaseModel.from_string() and BaseModel.to_string() methods * Add BaseModel.from_file() and BaseModel.to_file() methods * Fix BaseModel to initialize from a dictionary via **init** instead of setattr * Docs: * Update docs for the new git metadata store * Update list of recommended gitea permissions in git-obs-quickstart * Spec: * Install git-obs-metadata man page ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-702=1 openSUSE-SLE-15.6-2026-702=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-702=1 ## Package List: * openSUSE Leap 15.6 (noarch) * osc-1.22.0-150600.15.9.1 * Development Tools Module 15-SP7 (noarch) * osc-1.22.0-150600.15.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:31:24 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:31:24 -0000 Subject: SUSE-SU-2026:0698-1: important: Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) Message-ID: <177244028408.22.13557522941092464449@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 68 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0698-1 Release Date: 2026-02-28T05:33:39Z Rating: important References: * bsc#1255577 * bsc#1255845 Cross-References: * CVE-2022-50700 * CVE-2022-50717 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.258 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255845). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-698=1 SUSE-SLE-Live- Patching-12-SP5-2026-699=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_258-default-11-2.1 * kgraft-patch-4_12_14-122_255-default-13-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2022-50717.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1255845 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:31:28 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:31:28 -0000 Subject: SUSE-SU-2026:0696-1: important: Security update for the Linux Kernel (Live Patch 66 for SUSE Linux Enterprise 12 SP5) Message-ID: <177244028891.22.1492064217569488846@7fdb67da15da> # Security update for the Linux Kernel (Live Patch 66 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0696-1 Release Date: 2026-02-27T19:33:33Z Rating: important References: * bsc#1255577 * bsc#1255845 Cross-References: * CVE-2022-50700 * CVE-2022-50717 CVSS scores: * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.250 fixes various security issues The following security issues were fixed: * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255577). * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255845). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-696=1 SUSE-SLE-Live- Patching-12-SP5-2026-697=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_247-default-14-2.1 * kgraft-patch-4_12_14-122_250-default-14-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2022-50717.html * https://bugzilla.suse.com/show_bug.cgi?id=1255577 * https://bugzilla.suse.com/show_bug.cgi?id=1255845 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 08:31:32 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 08:31:32 -0000 Subject: SUSE-RU-2026:0695-1: moderate: Recommended update for evolution Message-ID: <177244029201.22.6773873498167877909@7fdb67da15da> # Recommended update for evolution Announcement ID: SUSE-RU-2026:0695-1 Release Date: 2026-02-27T16:50:14Z Rating: moderate References: * bsc#1256465 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for evolution fixes the following issues: * Fix incorrect week numbers in calendar year view (bsc#1256465). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-695=1 openSUSE-SLE-15.6-2026-695=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-695=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-695=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glade-catalog-evolution-debuginfo-3.50.3-150600.3.8.1 * evolution-devel-3.50.3-150600.3.8.1 * evolution-plugin-bogofilter-3.50.3-150600.3.8.1 * evolution-3.50.3-150600.3.8.1 * evolution-plugin-pst-import-3.50.3-150600.3.8.1 * glade-catalog-evolution-3.50.3-150600.3.8.1 * evolution-plugin-text-highlight-3.50.3-150600.3.8.1 * evolution-plugin-spamassassin-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-text-highlight-debuginfo-3.50.3-150600.3.8.1 * evolution-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-spamassassin-3.50.3-150600.3.8.1 * evolution-debugsource-3.50.3-150600.3.8.1 * evolution-plugin-bogofilter-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-pst-import-debuginfo-3.50.3-150600.3.8.1 * openSUSE Leap 15.6 (noarch) * evolution-lang-3.50.3-150600.3.8.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * glade-catalog-evolution-debuginfo-3.50.3-150600.3.8.1 * evolution-devel-3.50.3-150600.3.8.1 * evolution-plugin-bogofilter-3.50.3-150600.3.8.1 * evolution-3.50.3-150600.3.8.1 * evolution-plugin-pst-import-3.50.3-150600.3.8.1 * glade-catalog-evolution-3.50.3-150600.3.8.1 * evolution-plugin-text-highlight-3.50.3-150600.3.8.1 * evolution-plugin-spamassassin-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-text-highlight-debuginfo-3.50.3-150600.3.8.1 * evolution-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-spamassassin-3.50.3-150600.3.8.1 * evolution-debugsource-3.50.3-150600.3.8.1 * evolution-plugin-bogofilter-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-pst-import-debuginfo-3.50.3-150600.3.8.1 * SUSE Package Hub 15 15-SP7 (noarch) * evolution-lang-3.50.3-150600.3.8.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * evolution-devel-3.50.3-150600.3.8.1 * evolution-plugin-bogofilter-3.50.3-150600.3.8.1 * evolution-3.50.3-150600.3.8.1 * evolution-plugin-pst-import-3.50.3-150600.3.8.1 * evolution-plugin-text-highlight-3.50.3-150600.3.8.1 * evolution-plugin-spamassassin-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-text-highlight-debuginfo-3.50.3-150600.3.8.1 * evolution-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-spamassassin-3.50.3-150600.3.8.1 * evolution-debugsource-3.50.3-150600.3.8.1 * evolution-plugin-bogofilter-debuginfo-3.50.3-150600.3.8.1 * evolution-plugin-pst-import-debuginfo-3.50.3-150600.3.8.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * evolution-lang-3.50.3-150600.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1256465 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 12:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 12:30:06 -0000 Subject: SUSE-SU-2026:0736-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) Message-ID: <177245460679.16.10978710882183258269@62e4b8175c7a> # Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0736-1 Release Date: 2026-03-02T07:04:29Z Rating: important References: * bsc#1258139 Cross-References: * CVE-2025-38129 CVSS scores: * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.53.3 fixes one security issue The following security issue was fixed: * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-736=1 SUSE-SLE- Module-Live-Patching-15-SP6-2026-735=1 SUSE-SLE-Module-Live- Patching-15-SP6-2026-738=1 SUSE-SLE-Module-Live-Patching-15-SP6-2026-737=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-735=1 SUSE-2026-738=1 SUSE-2026-737=1 SUSE-2026-736=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-739=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_47-default-13-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-14-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-14-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-14-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-12-150600.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_47-default-13-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-14-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-14-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-13-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-14-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-12-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_3-default-11-150700.2.1 * kernel-livepatch-6_4_0-150700_53_3-default-debuginfo-11-150700.2.1 * kernel-livepatch-SLE15-SP7_Update_1-debugsource-11-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 16:33:13 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 16:33:13 -0000 Subject: SUSE-SU-2026:0745-1: important: Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) Message-ID: <177246919375.176.9149807568464218491@322c488a20e1> # Security update for the Linux Kernel (Live Patch 9 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0745-1 Release Date: 2026-03-02T09:34:18Z Rating: important References: * bsc#1258139 Cross-References: * CVE-2025-38129 CVSS scores: * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.42 fixes one security issue The following security issue was fixed: * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-745=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-745=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-14-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-14-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-14-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_42-default-14-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-14-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-14-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 16:33:30 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 16:33:30 -0000 Subject: SUSE-RU-2026:0747-1: important: Recommended update for rmt-server Message-ID: <177246921099.176.11785226667095114990@322c488a20e1> # Recommended update for rmt-server Announcement ID: SUSE-RU-2026:0747-1 Release Date: 2026-03-02T09:38:27Z Rating: important References: * bsc#1253146 * bsc#1253147 * bsc#1256826 * bsc#1256883 * bsc#1257133 Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has five fixes can now be installed. ## Description: This update for rmt-server fixes the following issues: * Upgrade to version 2.25: * Fix rmt-cli list and purge commands for large data (bsc#1253146 and bsc#1253147) * Fix mirroring of SLE16 NVIDIA-GPU-Compute-Toolkit-CUDA repo (bsc#1256826) * Support for new redirect_repo_hosts config, to exclude some repo hosts from mirroring, and send clients directly there (jsc#SCC-452) * rmt-server-pubcloud: * Clearer error message (bsc#1256883) * Add Valkey + Sidekiq for async processing * Handle zypper response when data exporter raises an error (bsc#1257133) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-747=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-747=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-747=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-747=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-747=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-747=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-747=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-747=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-747=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-747=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-pubcloud-2.25-150500.3.41.1 * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-pubcloud-2.25-150500.3.41.1 * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * rmt-server-pubcloud-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rmt-server-pubcloud-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * rmt-server-config-2.25-150500.3.41.1 * rmt-server-debugsource-2.25-150500.3.41.1 * rmt-server-debuginfo-2.25-150500.3.41.1 * rmt-server-2.25-150500.3.41.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253146 * https://bugzilla.suse.com/show_bug.cgi?id=1253147 * https://bugzilla.suse.com/show_bug.cgi?id=1256826 * https://bugzilla.suse.com/show_bug.cgi?id=1256883 * https://bugzilla.suse.com/show_bug.cgi?id=1257133 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 16:33:41 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 16:33:41 -0000 Subject: SUSE-RU-2026:0746-1: important: Recommended update for rmt-server Message-ID: <177246922159.176.18149311316280769422@322c488a20e1> # Recommended update for rmt-server Announcement ID: SUSE-RU-2026:0746-1 Release Date: 2026-03-02T09:37:32Z Rating: important References: * bsc#1253146 * bsc#1253147 * bsc#1256826 * bsc#1256883 * bsc#1257133 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has five fixes can now be installed. ## Description: This update for rmt-server fixes the following issues: * Upgrade to version 2.25: * Fix rmt-cli list and purge commands for large data (bsc#1253146 and bsc#1253147) * Fix mirroring of SLE16 NVIDIA-GPU-Compute-Toolkit-CUDA repo (bsc#1256826) * Support for new redirect_repo_hosts config, to exclude some repo hosts from mirroring, and send clients directly there (jsc#SCC-452) * rmt-server-pubcloud: * Clearer error message (bsc#1256883) * Add Valkey + Sidekiq for async processing * Handle zypper response when data exporter raises an error (bsc#1257133) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-746=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-746=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-746=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-746=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-746=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-746=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150400.3.48.1 * rmt-server-pubcloud-2.25-150400.3.48.1 * rmt-server-2.25-150400.3.48.1 * rmt-server-debugsource-2.25-150400.3.48.1 * rmt-server-config-2.25-150400.3.48.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150400.3.48.1 * rmt-server-debugsource-2.25-150400.3.48.1 * rmt-server-pubcloud-2.25-150400.3.48.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rmt-server-debuginfo-2.25-150400.3.48.1 * rmt-server-2.25-150400.3.48.1 * rmt-server-debugsource-2.25-150400.3.48.1 * rmt-server-config-2.25-150400.3.48.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rmt-server-debuginfo-2.25-150400.3.48.1 * rmt-server-2.25-150400.3.48.1 * rmt-server-debugsource-2.25-150400.3.48.1 * rmt-server-config-2.25-150400.3.48.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150400.3.48.1 * rmt-server-2.25-150400.3.48.1 * rmt-server-debugsource-2.25-150400.3.48.1 * rmt-server-config-2.25-150400.3.48.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rmt-server-debuginfo-2.25-150400.3.48.1 * rmt-server-2.25-150400.3.48.1 * rmt-server-debugsource-2.25-150400.3.48.1 * rmt-server-config-2.25-150400.3.48.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253146 * https://bugzilla.suse.com/show_bug.cgi?id=1253147 * https://bugzilla.suse.com/show_bug.cgi?id=1256826 * https://bugzilla.suse.com/show_bug.cgi?id=1256883 * https://bugzilla.suse.com/show_bug.cgi?id=1257133 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 16:34:01 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 16:34:01 -0000 Subject: SUSE-RU-2026:0744-1: moderate: Recommended update for python-gcemetadata Message-ID: <177246924168.176.2002095779392649665@322c488a20e1> # Recommended update for python-gcemetadata Announcement ID: SUSE-RU-2026:0744-1 Release Date: 2026-03-02T09:33:50Z Rating: moderate References: * bsc#1045148 * bsc#1053687 * bsc#1053695 * bsc#1097505 * bsc#1134510 * bsc#1173136 * jsc#PM-1900 Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has six fixes can now be installed. ## Description: This update for python-gcemetadata fixes the following issues: Update to version 1.1.0 * Add licenses option in identity command. Update to version 1.0.4 (bsc#1173136) * Fix typo, missing "=" for "identity" option in processed command line options causes mis-identification of instance as missing identity data access Update to version 1.0.3 (bsc#1134510) * Handle the condition where the identity data of the instance may not be accessible from the metadata server and provide proper error messaging >From 1.0.2 * Avoid traceback when not running in GCE, by testing access to the metdata server first before performing othre operations Update to version 1.0.1 (bsc#1097505) * Support instances with multiple Nics Update to version 1.0.0 * Port to Python 3 Update to version 0.3.2 (bsc#1053695, bsc#1053695) * Implement new feature to generate license verification token * Add man page >From 0.3.1 (bsc#1053687) * The --identity argument must accept a value and the value is required >From 0.3.0 * Properly handle overlapping enpoint names >From 0.2.2 * Support writing data to a file and as XML snippets Update to version 0.2.1 (bsc#1045148) * Set proper value for dict lookup to avoid traceback Update to version 0.2.0 * Implement query functionality for all options Initial build, include in SLE 12 (FATE#318435) * Version 0.0.5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-744=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-744=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-744=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-744=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-744=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python-gcemetadata-1.1.0-150400.9.5.1 * Public Cloud Module 15-SP4 (noarch) * python-gcemetadata-1.1.0-150400.9.5.1 * Public Cloud Module 15-SP5 (noarch) * python-gcemetadata-1.1.0-150400.9.5.1 * Public Cloud Module 15-SP6 (noarch) * python-gcemetadata-1.1.0-150400.9.5.1 * Public Cloud Module 15-SP7 (noarch) * python-gcemetadata-1.1.0-150400.9.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1045148 * https://bugzilla.suse.com/show_bug.cgi?id=1053687 * https://bugzilla.suse.com/show_bug.cgi?id=1053695 * https://bugzilla.suse.com/show_bug.cgi?id=1097505 * https://bugzilla.suse.com/show_bug.cgi?id=1134510 * https://bugzilla.suse.com/show_bug.cgi?id=1173136 * https://jira.suse.com/browse/PM-1900 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 16:34:28 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 16:34:28 -0000 Subject: SUSE-SU-2026:0741-1: moderate: Security update for shim Message-ID: <177246926846.176.12181647614003225613@322c488a20e1> # Security update for shim Announcement ID: SUSE-SU-2026:0741-1 Release Date: 2026-03-02T08:11:32Z Rating: moderate References: * bsc#1240871 * bsc#1247432 Cross-References: * CVE-2024-2312 CVSS scores: * CVE-2024-2312 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-2312 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for shim fixes the following issues: shim is updated to version 16.1: * shim_start_image(): fix guid/handle pairing when uninstalling protocols * Fix uncompressed ipv6 netboot * fix test segfaults caused by uninitialized memory * SbatLevel_Variable.txt: minor typo fix. * Realloc() needs to allocate one more byte for sprintf() * IPv6: Add more check to avoid multiple double colon and illegal char * Loader proto v2 * loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages * Generate Authenticode for the entire PE file * README: mention new loader protocol and interaction with UKIs * shim: change automatically enable MOK_POLICY_REQUIRE_NX * Save var info * add SbatLevel entry 2025051000 for PSA-2025-00012-1 * Coverity fixes 20250804 * fix http boot * Fix double free and leak in the loader protocol shim is updated to version 16.0: * Validate that a supplied vendor cert is not in PEM format * sbat: Add grub.peimage,2 to latest (CVE-2024-2312) * sbat: Also bump latest for grub,4 (and to todays date) * undo change that limits certificate files to a single file * shim: don't set second_stage to the empty string * Fix SBAT.md for today's consensus about numbers * Update Code of Conduct contact address * make-certs: Handle missing OpenSSL installation * Update MokVars.txt * export DEFINES for sub makefile * Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition * Null-terminate 'arguments' in fallback * Fix "Verifiying" typo in error message * Update Fedora CI targets * Force gcc to produce DWARF4 so that gdb can use it * Minor housekeeping 2024121700 * Discard load-options that start with WINDOWS * Fix the issue that the gBS->LoadImage pointer was empty. * shim: Allow data after the end of device path node in load options * Handle network file not found like disks * Update gnu-efi submodule for EFI_HTTP_ERROR * Increase EFI file alignment * avoid EFIv2 runtime services on Apple x86 machines * Improve shortcut performance when comparing two boolean expressions * Provide better error message when MokManager is not found * tpm: Boot with a warning if the event log is full * MokManager: remove redundant logical constraints * Test import_mok_state() when MokListRT would be bigger than available size * test-mok-mirror: minor bug fix * Fix file system browser hang when enrolling MOK from disk * Ignore a minor clang-tidy nit * Allow fallback to default loader when encountering errors on network boot * test.mk: don't use a temporary random.bin * pe: Enhance debug report for update_mem_attrs * Multiple certificate handling improvements * Generate SbatLevel Metadata from SbatLevel_Variable.txt * Apply EKU check with compile option * Add configuration option to boot an alternative 2nd stage * Loader protocol (with Device Path resolution support) * netboot cleanup for additional files * Document how revocations can be delivered * post-process-pe: add tests to validate NX compliance * regression: CopyMem() in ad8692e copies out of bounds * Save the debug and error logs in mok-variables * Add features for the Host Security ID program * Mirror some more efi variables to mok-variables * This adds DXE Services measurements to HSI and uses them for NX * Add shim's current NX_COMPAT status to HSIStatus * README.tpm: reflect that vendor_db is in fact logged as "vendor_db" * Reject HTTP message with duplicate Content-Length header fields * Disable log saving * fallback: don't add new boot order entries backwards * README.tpm: Update MokList entry to MokListRT * SBAT Level update for February 2025 GRUB CVEs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-741=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-741=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-741=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-741=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-741=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-741=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-741=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-741=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-741=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-741=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-741=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-741=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-741=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-741=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-741=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-741=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-741=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-741=1 ## Package List: * openSUSE Leap 15.3 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * openSUSE Leap 15.6 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * Basesystem Module 15-SP7 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * shim-16.1-150300.4.31.3 * shim-debugsource-16.1-150300.4.31.3 * shim-debuginfo-16.1-150300.4.31.3 ## References: * https://www.suse.com/security/cve/CVE-2024-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1240871 * https://bugzilla.suse.com/show_bug.cgi?id=1247432 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 16:36:35 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 16:36:35 -0000 Subject: SUSE-SU-2026:0740-1: moderate: Security update for mozilla-nss Message-ID: <177246939542.18.4477849978886148982@13ea24840d99> # Security update for mozilla-nss Announcement ID: SUSE-SU-2026:0740-1 Release Date: 2026-03-02T08:10:38Z Rating: moderate References: * bsc#1258568 Cross-References: * CVE-2026-2781 CVSS scores: * CVE-2026-2781 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2781 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2781 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for mozilla-nss fixes the following issues: update to NSS 3.112.3: * CVE-2026-2781: Avoid integer overflow in platform-independent ghash (bsc#1258568) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-740=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-740=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoftokn3-3.112.3-150000.3.135.1 * libsoftokn3-debuginfo-3.112.3-150000.3.135.1 * libfreebl3-3.112.3-150000.3.135.1 * mozilla-nss-debuginfo-3.112.3-150000.3.135.1 * mozilla-nss-tools-3.112.3-150000.3.135.1 * mozilla-nss-certs-debuginfo-3.112.3-150000.3.135.1 * mozilla-nss-3.112.3-150000.3.135.1 * mozilla-nss-tools-debuginfo-3.112.3-150000.3.135.1 * libfreebl3-debuginfo-3.112.3-150000.3.135.1 * mozilla-nss-certs-3.112.3-150000.3.135.1 * mozilla-nss-debugsource-3.112.3-150000.3.135.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoftokn3-3.112.3-150000.3.135.1 * libsoftokn3-debuginfo-3.112.3-150000.3.135.1 * libfreebl3-3.112.3-150000.3.135.1 * mozilla-nss-debuginfo-3.112.3-150000.3.135.1 * mozilla-nss-tools-3.112.3-150000.3.135.1 * mozilla-nss-certs-debuginfo-3.112.3-150000.3.135.1 * mozilla-nss-3.112.3-150000.3.135.1 * mozilla-nss-tools-debuginfo-3.112.3-150000.3.135.1 * libfreebl3-debuginfo-3.112.3-150000.3.135.1 * mozilla-nss-certs-3.112.3-150000.3.135.1 * mozilla-nss-debugsource-3.112.3-150000.3.135.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2781.html * https://bugzilla.suse.com/show_bug.cgi?id=1258568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 20:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 20:30:10 -0000 Subject: SUSE-SU-2026:0748-1: important: Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) Message-ID: <177248341066.74.15824175969333790506@dd9735431ee0> # Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0748-1 Release Date: 2026-03-02T12:04:07Z Rating: important References: * bsc#1258139 Cross-References: * CVE-2025-38129 CVSS scores: * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.51 fixes one security issue The following security issue was fixed: * CVE-2025-38129: page_pool: fix use-after-free in page_pool_recycle_in_ring (bsc#1258139). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-748=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP7_Update_0-debugsource-11-150700.3.30.1 * kernel-livepatch-6_4_0-150700_51-default-11-150700.3.30.1 * kernel-livepatch-6_4_0-150700_51-default-debuginfo-11-150700.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38129.html * https://bugzilla.suse.com/show_bug.cgi?id=1258139 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 20:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 20:30:14 -0000 Subject: SUSE-RU-2026:0753-1: moderate: Recommended update for release-notes-sles-for-sap Message-ID: <177248341460.74.101792794523298407@dd9735431ee0> # Recommended update for release-notes-sles-for-sap Announcement ID: SUSE-RU-2026:0753-1 Release Date: 2026-03-02T15:44:44Z Rating: moderate References: * bsc#933411 * jsc#SLE-23699 Affected Products: * openSUSE Leap 15.4 * SAP Applications Module 15-SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that contains one feature and has one fix can now be installed. ## Description: This update for release-notes-sles-for-sap fixes the following issues: * Update to version 15.4.20260227 (bsc#933411) * Added note about saptune machine-readable interface (jsc#SLE-23699) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-753=1 * SAP Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP4-2026-753=1 ## Package List: * openSUSE Leap 15.4 (noarch) * release-notes-sles-for-sap-15.4.20260227-150400.3.18.1 * SAP Applications Module 15-SP4 (noarch) * release-notes-sles-for-sap-15.4.20260227-150400.3.18.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/SLE-23699 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 20:30:15 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 20:30:15 -0000 Subject: SUSE-RU-2026:0752-1: important: Recommended update for libzpc Message-ID: <177248341595.74.15799338042328080258@dd9735431ee0> # Recommended update for libzpc Announcement ID: SUSE-RU-2026:0752-1 Release Date: 2026-03-02T15:42:15Z Rating: important References: * jsc#PED-14275 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for libzpc fixes the following issues: * Upgrade libzpc to version 1.5.0 (jsc#PED-14275) * [FEATURE] Support live guest relocation * Bug fixes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-752=1 ## Package List: * Basesystem Module 15-SP7 (s390x) * libzpc1-debuginfo-1.5.0-150700.3.6.1 * libzpc-debugsource-1.5.0-150700.3.6.1 * libzpc1-1.5.0-150700.3.6.1 * libzpc-devel-1.5.0-150700.3.6.1 ## References: * https://jira.suse.com/browse/PED-14275 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 20:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 20:30:22 -0000 Subject: SUSE-RU-2026:0751-1: moderate: Recommended update for release-notes-ha Message-ID: <177248342206.74.17248459961465289897@dd9735431ee0> # Recommended update for release-notes-ha Announcement ID: SUSE-RU-2026:0751-1 Release Date: 2026-03-02T15:41:56Z Rating: moderate References: * bsc#933411 * jsc#PED-13089 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature and has one fix can now be installed. ## Description: This update for release-notes-ha fixes the following issues: * Update to version 15.6.20260227 (bsc#933411) * Added note about Nutanix AVH (jsc#PED-13089) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-751=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-751=1 openSUSE-SLE-15.6-2026-751=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP6 (noarch) * release-notes-ha-15.6.20260227-150600.3.9.1 * openSUSE Leap 15.6 (noarch) * release-notes-ha-15.6.20260227-150600.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-13089 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Mar 2 20:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 02 Mar 2026 20:30:25 -0000 Subject: SUSE-RU-2026:0750-1: moderate: Recommended update for release-notes-ha Message-ID: <177248342505.74.15911073445447111019@dd9735431ee0> # Recommended update for release-notes-ha Announcement ID: SUSE-RU-2026:0750-1 Release Date: 2026-03-02T15:41:41Z Rating: moderate References: * bsc#933411 * jsc#PED-13089 Affected Products: * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature and has one fix can now be installed. ## Description: This update for release-notes-ha fixes the following issues: * Update to version 15.7.20260227 (bsc#933411) * Added note about Nutanix AVH (jsc#PED-13089) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2026-750=1 ## Package List: * SUSE Linux Enterprise High Availability Extension 15 SP7 (noarch) * release-notes-ha-15.7.20260227-150700.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-13089 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 08:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 08:30:06 -0000 Subject: SUSE-OU-2026:0754-1: moderate: Optional update for php8-memcached Message-ID: <177252660684.143.2480473777261432324@488de5d2170e> # Optional update for php8-memcached Announcement ID: SUSE-OU-2026:0754-1 Release Date: 2026-03-02T16:23:56Z Rating: moderate References: * jsc#PED-3716 Affected Products: * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP7 An update that contains one feature can now be installed. ## Description: This update for php8-memcached ships it to Web and Scripting Module for 15 SP7. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-754=1 ## Package List: * Web and Scripting Module 15-SP7 (aarch64 ppc64le s390x x86_64) * php8-memcached-debuginfo-3.2.0-150700.18.2.1 * php8-memcached-3.2.0-150700.18.2.1 * php8-memcached-debugsource-3.2.0-150700.18.2.1 ## References: * https://jira.suse.com/browse/PED-3716 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 12:30:49 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 12:30:49 -0000 Subject: SUSE-SU-2026:20529-1: important: Security update for libsoup Message-ID: <177254104990.550.6986388556102598400@322c488a20e1> # Security update for libsoup Announcement ID: SUSE-SU-2026:20529-1 Release Date: 2026-03-02T13:19:17Z Rating: important References: * bsc#1240751 * bsc#1252555 * bsc#1258120 * bsc#1258170 * bsc#1258508 Cross-References: * CVE-2025-12105 * CVE-2025-32049 * CVE-2026-2369 * CVE-2026-2443 * CVE-2026-2708 CVSS scores: * CVE-2025-12105 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-12105 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-12105 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32049 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32049 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32049 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-2369 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-2369 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-2443 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2026-2443 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2443 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2708 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-2708 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-12105: Fixed heap use-after-free in message queue handling during HTTP/2 read completion. (bsc#1252555) * CVE-2025-32049: Fixed a Denial of Service attack to websocket server. (bsc#1240751) * CVE-2026-2443: Fixed an out-of-bounds read when processing specially crafted HTTP Range headers can lead to heap information disclosure to remote attackers. (bsc#1258170) * CVE-2026-2369: Fixed a buffer overread due to integer underflow when handling zero-length resources. (bsc#1258120) * CVE-2026-2708: Fixed HTTP request smuggling via duplicate Content-Length headers. (bsc#1258508) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-601=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoup-3_0-0-3.4.2-13.1 * libsoup-debugsource-3.4.2-13.1 * libsoup-3_0-0-debuginfo-3.4.2-13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12105.html * https://www.suse.com/security/cve/CVE-2025-32049.html * https://www.suse.com/security/cve/CVE-2026-2369.html * https://www.suse.com/security/cve/CVE-2026-2443.html * https://www.suse.com/security/cve/CVE-2026-2708.html * https://bugzilla.suse.com/show_bug.cgi?id=1240751 * https://bugzilla.suse.com/show_bug.cgi?id=1252555 * https://bugzilla.suse.com/show_bug.cgi?id=1258120 * https://bugzilla.suse.com/show_bug.cgi?id=1258170 * https://bugzilla.suse.com/show_bug.cgi?id=1258508 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 12:31:02 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 12:31:02 -0000 Subject: SUSE-SU-2026:20528-1: important: Security update for cups Message-ID: <177254106204.550.17880815113518440110@322c488a20e1> # Security update for cups Announcement ID: SUSE-SU-2026:20528-1 Release Date: 2026-03-02T13:17:29Z Rating: important References: * bsc#1244057 * bsc#1249049 * bsc#1249128 * bsc#1253783 * bsc#1254353 * jsc#PED-14688 * jsc#PED-14775 Cross-References: * CVE-2025-58060 * CVE-2025-58364 * CVE-2025-58436 * CVE-2025-61915 CVSS scores: * CVE-2025-58060 ( SUSE ): 7.7 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-58060 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58060 ( NVD ): 8.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H * CVE-2025-58364 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58364 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-58436 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61915 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61915 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-61915 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-61915 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities, contains two features and has one fix can now be installed. ## Description: This update for cups fixes the following issues: Update to version 2.4.16. Security issues fixed: * CVE-2025-58436: single client sending slow messages to cupsd can delay the application and make it unusable for other clients (bsc#1244057). * CVE-2025-58060: authentication bypass with AuthType negotiate (bsc#1249049). * CVE-2025-58364: unsafe deserialization and validation of printer attributes can lead to null dereference (bsc#1249128). * CVE-2025-61915: local denial-of-service via cupsd.conf update and related issues (bsc#1253783). Other updates and bugfixes: * Version upgrade to 2.4.16: * 'cupsUTF8ToCharset' didn't validate 2-byte UTF-8 sequences, potentially reading past the end of the source string (Issue #1438) * The web interface did not support domain usernames fully (Issue #1441) * Fixed an infinite loop issue in the GTK+ print dialog (Issue #1439 bsc#1254353) * Fixed stopping scheduler on unknown directive in configuration (Issue #1443) * Version upgrade to 2.4.15: * Fixed potential crash in 'cups-driverd' when there are duplicate PPDs (Issue #1355) * Fixed error recovery when scanning for PPDs in 'cups-driverd' (Issue #1416) * Fix packages for Immutable Mode - cups (jsc#PED-14775,jsc#PED-14688) * Version upgrade to 2.4.14. * Version upgrade to 2.4.13: * Added 'print-as-raster' printer and job attributes for forcing rasterization (Issue #1282) * Updated documentation (Issue #1086) * Updated IPP backend to try a sanitized user name if the printer/server does not like the value (Issue #1145) * Updated the scheduler to send the "printer-added" or "printer-modified" events whenever an IPP Everywhere PPD is installed (Issue #1244) * Updated the scheduler to send the "printer-modified" event whenever the system default printer is changed (Issue #1246) * Fixed a memory leak in 'httpClose' (Issue #1223) * Fixed missing commas in 'ippCreateRequestedArray' (Issue #1234) * Fixed subscription issues in the scheduler and D-Bus notifier (Issue #1235) * Fixed media-default reporting for custom sizes (Issue #1238) * Fixed support for IPP/PPD options with periods or underscores (Issue #1249) * Fixed parsing of real numbers in PPD compiler source files (Issue #1263) * Fixed scheduler freezing with zombie clients (Issue #1264) * Fixed support for the server name in the ErrorLog filename (Issue #1277) * Fixed job cleanup after daemon restart (Issue #1315) * Fixed handling of buggy DYMO USB printer serial numbers (Issue #1338) * Fixed unreachable block in IPP backend (Issue #1351) * Fixed memory leak in _cupsConvertOptions (Issue #1354) * Version upgrade to 2.4.12: * GnuTLS follows system crypto policies now (Issue #1105) * Added `NoSystem` SSLOptions value (Issue #1130) * Now we raise alert for certificate issues (Issue #1194) * Added Kyocera USB quirk (Issue #1198) * The scheduler now logs a job's debugging history if the backend fails (Issue #1205) * Fixed a potential timing issue with `cupsEnumDests` (Issue #1084) * Fixed a potential "lost PPD" condition in the scheduler (Issue #1109) * Fixed a compressed file error handling bug (Issue #1070) * Fixed a bug in the make-and-model whitespace trimming code (Issue #1096) * Fixed a removal of IPP Everywhere permanent queue if installation failed (Issue #1102) * Fixed `ServerToken None` in scheduler (Issue #1111) * Fixed invalid IPP keyword values created from PPD option names (Issue #1118) * Fixed handling of "media" and "PageSize" in the same print request (Issue #1125) * Fixed client raster printing from macOS (Issue #1143) * Fixed the default User-Agent string. * Fixed a recursion issue in `ippReadIO`. * Fixed handling incorrect radix in `scan_ps()` (Issue #1188) * Fixed validation of dateTime values with time zones more than UTC+11 (Issue #1201) * Fixed attributes returned by the Create-Xxx-Subscriptions requests (Issue #1204) * Fixed `ippDateToTime` when using a non GMT/UTC timezone (Issue #1208) * Fixed `job-completed` event notifications for jobs that are cancelled before started (Issue #1209) * Fixed DNS-SD discovery with `ippfind` (Issue #1211) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-600=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcups2-2.4.16-1.1 * cups-debugsource-2.4.16-1.1 * cups-config-2.4.16-1.1 * libcups2-debuginfo-2.4.16-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58060.html * https://www.suse.com/security/cve/CVE-2025-58364.html * https://www.suse.com/security/cve/CVE-2025-58436.html * https://www.suse.com/security/cve/CVE-2025-61915.html * https://bugzilla.suse.com/show_bug.cgi?id=1244057 * https://bugzilla.suse.com/show_bug.cgi?id=1249049 * https://bugzilla.suse.com/show_bug.cgi?id=1249128 * https://bugzilla.suse.com/show_bug.cgi?id=1253783 * https://bugzilla.suse.com/show_bug.cgi?id=1254353 * https://jira.suse.com/browse/PED-14688 * https://jira.suse.com/browse/PED-14775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 16:30:02 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 16:30:02 -0000 Subject: SUSE-SU-2026:0757-1: important: Security update for govulncheck-vulndb Message-ID: <177255540247.318.6042187446099651681@dd9735431ee0> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2026:0757-1 Release Date: 2026-03-03T11:34:10Z Rating: important References: * jsc#PED-11136 Cross-References: * CVE-2017-18873 * CVE-2017-18903 * CVE-2017-18906 * CVE-2017-18907 * CVE-2017-18908 * CVE-2017-18909 * CVE-2017-18911 * CVE-2017-18912 * CVE-2017-18915 * CVE-2017-18916 * CVE-2017-18917 * CVE-2017-18918 * CVE-2023-43635 * CVE-2023-43636 * CVE-2023-43637 * CVE-2025-13523 * CVE-2025-13767 * CVE-2025-13821 * CVE-2025-14350 * CVE-2025-14435 * CVE-2025-14573 * CVE-2025-14822 * CVE-2025-50180 * CVE-2025-64111 * CVE-2025-64175 * CVE-2025-64641 * CVE-2025-65852 * CVE-2025-66630 * CVE-2025-67860 * CVE-2025-70963 * CVE-2026-0997 * CVE-2026-0998 * CVE-2026-0999 * CVE-2026-20796 * CVE-2026-21434 * CVE-2026-21435 * CVE-2026-21438 * CVE-2026-22592 * CVE-2026-22892 * CVE-2026-23632 * CVE-2026-23633 * CVE-2026-23644 * CVE-2026-23989 * CVE-2026-23991 * CVE-2026-23992 * CVE-2026-24051 * CVE-2026-24122 * CVE-2026-24135 * CVE-2026-24137 * CVE-2026-24686 * CVE-2026-24834 * CVE-2026-24845 * CVE-2026-24851 * CVE-2026-24894 * CVE-2026-24895 * CVE-2026-25120 * CVE-2026-25140 * CVE-2026-25229 * CVE-2026-25232 * CVE-2026-25242 * CVE-2026-25518 * CVE-2026-25591 * CVE-2026-25760 * CVE-2026-25766 * CVE-2026-25791 * CVE-2026-25793 * CVE-2026-25802 * CVE-2026-25804 * CVE-2026-25882 * CVE-2026-25889 * CVE-2026-25890 * CVE-2026-25891 * CVE-2026-25899 * CVE-2026-25934 * CVE-2026-25935 * CVE-2026-25949 * CVE-2026-26014 * CVE-2026-26055 * CVE-2026-26056 * CVE-2026-26187 * CVE-2026-26190 * CVE-2026-26201 * CVE-2026-26205 * CVE-2026-26313 * CVE-2026-26314 * CVE-2026-26315 * CVE-2026-26957 * CVE-2026-26958 * CVE-2026-26963 * CVE-2026-26995 * CVE-2026-27017 * CVE-2026-27111 * CVE-2026-27112 * CVE-2026-27141 * CVE-2026-27571 * CVE-2026-27585 * CVE-2026-27586 * CVE-2026-27587 * CVE-2026-27588 * CVE-2026-27589 * CVE-2026-27590 * CVE-2026-27598 * CVE-2026-27611 * CVE-2026-27626 CVSS scores: * CVE-2017-18873 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2017-18903 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2017-18906 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2017-18907 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2017-18908 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-18909 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2017-18911 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2017-18912 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-18915 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2017-18916 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2017-18917 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2017-18918 ( NVD ): 4.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2023-43635 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-43636 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-43637 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-13523 ( NVD ): 7.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N * CVE-2025-13523 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N * CVE-2025-13767 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-13821 ( NVD ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14350 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-14435 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H * CVE-2025-14435 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-14573 ( NVD ): 3.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14573 ( NVD ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2025-14822 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-14822 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-50180 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-50180 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64111 ( NVD ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64111 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-64175 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64175 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-64641 ( NVD ): 4.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N * CVE-2025-64641 ( NVD ): 4.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N * CVE-2025-66630 ( NVD ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-66630 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L * CVE-2025-67860 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N * CVE-2025-70963 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2026-0997 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2026-0998 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2026-0999 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2026-0999 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2026-20796 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-21434 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-21434 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-21435 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-21435 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-21438 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-22592 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22892 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-23632 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-23633 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2026-23644 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23644 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-23989 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2026-23989 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2026-23991 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23991 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-23991 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23991 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23992 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-23992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2026-23992 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-23992 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-24051 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-24122 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2026-24122 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2026-24122 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2026-24135 ( NVD ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24135 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2026-24137 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-24137 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2026-24137 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N * CVE-2026-24686 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-24686 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-24686 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-24834 ( NVD ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-24834 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2026-24845 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2026-24845 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2026-24845 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2026-24851 ( NVD ): 5.8 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24851 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-24894 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24894 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2026-24895 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24895 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-25120 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25120 ( NVD ): 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N * CVE-2026-25140 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25229 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25229 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-25232 ( NVD ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25232 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-25242 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25242 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-25518 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25518 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25591 ( NVD ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25760 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2026-25766 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-25791 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25793 ( NVD ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25793 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2026-25802 ( NVD ): 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:L * CVE-2026-25802 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N * CVE-2026-25804 ( NVD ): 8.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25804 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2026-25882 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25882 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25889 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2026-25890 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2026-25891 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25891 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2026-25899 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25934 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2026-25934 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2026-25934 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2026-25934 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2026-25935 ( NVD ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25935 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N * CVE-2026-25949 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25949 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25949 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26014 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2026-26014 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2026-26055 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-26056 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-26187 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2026-26190 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-26201 ( NVD ): 7.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26205 ( NVD ): 7.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26313 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26313 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26314 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26314 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26315 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26315 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2026-26957 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26958 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-26958 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2026-26958 ( NVD ): 1.7 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-26963 ( NVD ): 5.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2026-26963 ( NVD ): 6.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2026-27017 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27017 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-27111 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27111 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N * CVE-2026-27112 ( NVD ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27112 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2026-27141 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-27141 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-27141 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-27571 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-27571 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-27585 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27585 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2026-27586 ( NVD ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27586 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2026-27587 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27587 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2026-27588 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27588 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2026-27589 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27589 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2026-27590 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27590 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-27598 ( NVD ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27598 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-27611 ( NVD ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-27611 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2026-27626 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 An update that solves 104 vulnerabilities and contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: Update to version 0.0.20260226T182644 2026-02-26T18:26:44Z (jsc#PED-11136) Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4259 CVE-2025-13767 GHSA-fmqf-pmcm-8cx9 * GO-2025-4260 CVE-2025-64641 GHSA-vww6-79rv-3j4x * GO-2026-4282 CVE-2017-18873 GHSA-x6mw-hf2j-vqpc * GO-2026-4305 CVE-2017-18903 GHSA-fcwg-45jh-5qhf * GO-2026-4325 CVE-2025-14822 GHSA-9r42-rhw3-2222 * GO-2026-4326 CVE-2025-14435 GHSA-mx8m-v8qm-xwr8 * GO-2026-4332 CVE-2026-23644 GHSA-2657-3c98-63jq * GO-2026-4348 CVE-2026-23991 GHSA-846p-jg2w-w324 * GO-2026-4349 CVE-2026-23992 GHSA-fphv-w9fq-2525 * GO-2026-4377 CVE-2026-24686 GHSA-jqc5-w2xx-5vq4 * GO-2026-4410 CVE-2026-25140 GHSA-f4w5-5xv9-85f6 * GO-2026-4502 CVE-2026-25766 GHSA-pgvm-wxw2-hrv9 * GO-2026-4534 CVE-2026-25899 GHSA-2mr3-m5q5-wgp6 * GO-2026-4535 CVE-2026-27585 GHSA-4xrr-hq4w-6vf4 * GO-2026-4536 CVE-2026-27590 GHSA-5r3v-vc8m-m96g * GO-2026-4537 CVE-2026-27589 GHSA-879p-475x-rqh2 * GO-2026-4538 CVE-2026-27587 GHSA-g7pc-pc7g-h8jh * GO-2026-4539 CVE-2026-27586 GHSA-hffm-g8v7-wrv7 * GO-2026-4540 CVE-2026-25891 GHSA-m3c2-496v-cw3v * GO-2026-4541 CVE-2026-27588 GHSA-x76f-jf84-rqj8 * GO-2026-4543 CVE-2026-25882 GHSA-mrq8-rjmw-wpq3 * GO-2026-4559 CVE-2026-27141 Update to version 0.0.20260225T230704 2026-02-25T23:07:04Z. * GO-2026-4358 CVE-2026-24137 GHSA-fcv2-xgw5-pqxf * GO-2026-4361 GHSA-c32p-wcqj-j677 * GO-2026-4394 CVE-2026-24051 GHSA-9h8m-3fm2-qjrq * GO-2026-4399 CVE-2026-25518 GHSA-gx3x-vq4p-mhhv * GO-2026-4507 CVE-2026-26314 GHSA-2gjw-fg97-vg3r * GO-2026-4508 CVE-2026-26313 GHSA-689v-6xwf-5jf3 * GO-2026-4509 CVE-2026-27017 GHSA-7m29-f4hw-g2vx * GO-2026-4511 CVE-2026-26315 GHSA-m6j8-rg6r-7mv8 * GO-2026-4512 CVE-2026-26995 GHSA-rrxv-pmq9-x67r * GO-2026-4531 CVE-2026-25591 GHSA-w6x6-9fp7-fqm4 * GO-2026-4532 CVE-2026-25802 GHSA-299v-8pq9-5gjq * GO-2026-4533 CVE-2026-27571 GHSA-qrvq-68c2-7grw * GO-2026-4542 CVE-2026-27598 GHSA-6v48-fcq6-ff23 * GO-2026-4545 CVE-2025-50180 GHSA-3c9r-837r-qqm4 * GO-2026-4546 CVE-2026-27611 GHSA-8vrh-3pm2-v4v6 * GO-2026-4547 CVE-2026-27626 GHSA-49gm-hh7w-wfvf * GO-2026-4548 GHSA-2phg-qgmm-r638 Update to version 0.0.20260223T182315 2026-02-23T18:23:15Z. * GO-2026-4392 CVE-2026-24845 GHSA-9m43-p3cx-w8j5 * GO-2026-4434 CVE-2023-43635 GHSA-4jvr-vj2c-8q37 * GO-2026-4435 CVE-2023-43636 GHSA-5h7v-g49c-h887 * GO-2026-4436 CVE-2023-43637 GHSA-g7vp-j25f-h34p * GO-2026-4442 GHSA-x9p2-77v6-6vhf * GO-2026-4444 CVE-2026-23989 GHSA-9j2f-3rj3-wgpg * GO-2026-4445 CVE-2026-25760 GHSA-2286-hxv5-cmp2 * GO-2026-4446 CVE-2026-24851 GHSA-jq9f-gm9w-rwm9 * GO-2026-4447 GHSA-vf5j-r2hw-2hrw * GO-2026-4448 CVE-2025-64111 GHSA-gg64-xxr9-qhjp * GO-2026-4449 CVE-2025-64175 GHSA-p6x6-9mx6-26wj * GO-2026-4450 CVE-2026-23632 GHSA-5qhx-gwfj-6jqr * GO-2026-4451 CVE-2026-22592 GHSA-cr88-6mqm-4g57 * GO-2026-4452 CVE-2026-24135 GHSA-jp7c-wj6q-3qf2 * GO-2026-4453 CVE-2026-23633 GHSA-mrph-w4hh-gx3g * GO-2026-4454 GHSA-26gq-grmh-6xm6 * GO-2026-4455 CVE-2025-70963 GHSA-9f8m-9547-2gqm * GO-2026-4456 CVE-2025-13523 GHSA-ffx7-34p2-vm3w * GO-2026-4457 CVE-2025-65852 GHSA-rjv5-9px2-fqw6 * GO-2026-4458 CVE-2026-25793 GHSA-69x3-g4r3-p962 * GO-2026-4459 CVE-2017-18907 GHSA-42x9-rr3c-gr59 * GO-2026-4460 CVE-2017-18918 GHSA-5ghq-28r7-qwfj * GO-2026-4461 CVE-2026-25804 GHSA-86x4-wp9f-wrr9 * GO-2026-4462 CVE-2017-18915 GHSA-hxxj-8phw-74vw * GO-2026-4463 CVE-2017-18917 GHSA-jxc4-w54c-qv5r * GO-2026-4464 CVE-2017-18911 GHSA-m462-mqw4-2c8m * GO-2026-4465 GHSA-vhvq-fv9f-wh4q * GO-2026-4466 CVE-2026-25791 GHSA-wxrw-gvg8-fqjp * GO-2026-4467 CVE-2017-18916 GHSA-x33g-375j-jhf7 * GO-2026-4471 CVE-2025-66630 GHSA-68rr-p4fp-j59v * GO-2026-4473 CVE-2026-25934 GHSA-37cx-329c-33x3 * GO-2026-4474 CVE-2026-25890 GHSA-4mh3-h929-w968 * GO-2026-4475 CVE-2026-25889 GHSA-hxw8-4h9j-hq2r * GO-2026-4476 CVE-2017-18908 GHSA-34cx-hvm4-vx7j * GO-2026-4477 CVE-2017-18906 GHSA-fpcr-4rr5-hpcp * GO-2026-4478 CVE-2017-18909 GHSA-r6j5-fqx9-7qv9 * GO-2026-4479 CVE-2026-26014 GHSA-9f3f-wv7r-qc8r * GO-2026-4480 CVE-2026-25935 GHSA-m4g2-2q66-vc9v * GO-2026-4481 CVE-2026-26190 GHSA-7ppg-37fh-vcr6 * GO-2026-4483 CVE-2026-21438 GHSA-2f2x-8mwp-p2gc * GO-2026-4484 CVE-2026-25949 GHSA-89p3-4642-cr2w * GO-2026-4485 CVE-2026-21434 GHSA-g6x7-jq8p-6q9q * GO-2026-4486 CVE-2026-24895 GHSA-g966-83w7-6w38 * GO-2026-4487 CVE-2017-18912 GHSA-m2ch-x2q7-2284 * GO-2026-4488 CVE-2026-21435 GHSA-px4r-g4p3-hhqv * GO-2026-4489 CVE-2026-24894 GHSA-r3xh-3r3w-47gp * GO-2026-4490 CVE-2025-67860 GHSA-3c9m-gq32-g4jx * GO-2026-4491 CVE-2026-26055 GHSA-965m-v4cc-6334 * GO-2026-4493 CVE-2026-26056 GHSA-wj8p-jj64-h7ff * GO-2026-4494 CVE-2026-26187 GHSA-699m-4v95-rmpm * GO-2026-4495 CVE-2026-20796 GHSA-2xf7-hmf6-p64j * GO-2026-4496 CVE-2026-22892 GHSA-9pj7-jh2r-87g8 * GO-2026-4497 GHSA-hr7j-63v7-vj7g * GO-2026-4498 CVE-2026-25232 GHSA-2c6v-8r3v-gh6p * GO-2026-4499 CVE-2026-25229 GHSA-cv22-72px-f4gh * GO-2026-4500 CVE-2026-25242 GHSA-fc3h-92p8-h36f * GO-2026-4501 CVE-2026-25120 GHSA-jj5m-h57j-5gv7 * GO-2026-4503 CVE-2026-26958 * GO-2026-4504 CVE-2026-26201 GHSA-f5p9-j34q-pwcc * GO-2026-4505 CVE-2026-26957 GHSA-wgm6-9rvv-3438 * GO-2026-4506 CVE-2026-26205 GHSA-9f29-v6mm-pw6w * GO-2026-4515 CVE-2026-27111 GHSA-5vvm-67pj-72g4 * GO-2026-4516 CVE-2026-27112 GHSA-7g9x-cp9g-92mr * GO-2026-4517 CVE-2026-24834 GHSA-wwj6-vghv-5p64 * GO-2026-4519 CVE-2026-0997 GHSA-2phx-frhf-xr55 * GO-2026-4520 CVE-2026-0999 GHSA-3c9r-7f29-qp32 * GO-2026-4521 CVE-2025-14350 GHSA-57cc-2pf4-mhmx * GO-2026-4522 CVE-2026-26963 GHSA-5r23-prx4-mqg3 * GO-2026-4523 CVE-2025-14573 GHSA-cgjg-p2m2-qm4p * GO-2026-4524 CVE-2025-13821 GHSA-pp9j-pf5c-659x * GO-2026-4525 CVE-2026-0998 GHSA-w65c-fvp5-fvc5 * GO-2026-4527 GHSA-6qr9-g2xw-cw92 * GO-2026-4528 GHSA-j9wf-6r2x-hqmx * GO-2026-4529 CVE-2026-24122 GHSA-wfqv-66vq-46rm * GO-2026-4530 GHSA-gv8r-9rw9-9697 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-757=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20260226T182644-150000.1.149.1 ## References: * https://www.suse.com/security/cve/CVE-2017-18873.html * https://www.suse.com/security/cve/CVE-2017-18903.html * https://www.suse.com/security/cve/CVE-2017-18906.html * https://www.suse.com/security/cve/CVE-2017-18907.html * https://www.suse.com/security/cve/CVE-2017-18908.html * https://www.suse.com/security/cve/CVE-2017-18909.html * https://www.suse.com/security/cve/CVE-2017-18911.html * https://www.suse.com/security/cve/CVE-2017-18912.html * https://www.suse.com/security/cve/CVE-2017-18915.html * https://www.suse.com/security/cve/CVE-2017-18916.html * https://www.suse.com/security/cve/CVE-2017-18917.html * https://www.suse.com/security/cve/CVE-2017-18918.html * https://www.suse.com/security/cve/CVE-2023-43635.html * https://www.suse.com/security/cve/CVE-2023-43636.html * https://www.suse.com/security/cve/CVE-2023-43637.html * https://www.suse.com/security/cve/CVE-2025-13523.html * https://www.suse.com/security/cve/CVE-2025-13767.html * https://www.suse.com/security/cve/CVE-2025-13821.html * https://www.suse.com/security/cve/CVE-2025-14350.html * https://www.suse.com/security/cve/CVE-2025-14435.html * https://www.suse.com/security/cve/CVE-2025-14573.html * https://www.suse.com/security/cve/CVE-2025-14822.html * https://www.suse.com/security/cve/CVE-2025-50180.html * https://www.suse.com/security/cve/CVE-2025-64111.html * https://www.suse.com/security/cve/CVE-2025-64175.html * https://www.suse.com/security/cve/CVE-2025-64641.html * https://www.suse.com/security/cve/CVE-2025-65852.html * https://www.suse.com/security/cve/CVE-2025-66630.html * https://www.suse.com/security/cve/CVE-2025-67860.html * https://www.suse.com/security/cve/CVE-2025-70963.html * https://www.suse.com/security/cve/CVE-2026-0997.html * https://www.suse.com/security/cve/CVE-2026-0998.html * https://www.suse.com/security/cve/CVE-2026-0999.html * https://www.suse.com/security/cve/CVE-2026-20796.html * https://www.suse.com/security/cve/CVE-2026-21434.html * https://www.suse.com/security/cve/CVE-2026-21435.html * https://www.suse.com/security/cve/CVE-2026-21438.html * https://www.suse.com/security/cve/CVE-2026-22592.html * https://www.suse.com/security/cve/CVE-2026-22892.html * https://www.suse.com/security/cve/CVE-2026-23632.html * https://www.suse.com/security/cve/CVE-2026-23633.html * https://www.suse.com/security/cve/CVE-2026-23644.html * https://www.suse.com/security/cve/CVE-2026-23989.html * https://www.suse.com/security/cve/CVE-2026-23991.html * https://www.suse.com/security/cve/CVE-2026-23992.html * https://www.suse.com/security/cve/CVE-2026-24051.html * https://www.suse.com/security/cve/CVE-2026-24122.html * https://www.suse.com/security/cve/CVE-2026-24135.html * https://www.suse.com/security/cve/CVE-2026-24137.html * https://www.suse.com/security/cve/CVE-2026-24686.html * https://www.suse.com/security/cve/CVE-2026-24834.html * https://www.suse.com/security/cve/CVE-2026-24845.html * https://www.suse.com/security/cve/CVE-2026-24851.html * https://www.suse.com/security/cve/CVE-2026-24894.html * https://www.suse.com/security/cve/CVE-2026-24895.html * https://www.suse.com/security/cve/CVE-2026-25120.html * https://www.suse.com/security/cve/CVE-2026-25140.html * https://www.suse.com/security/cve/CVE-2026-25229.html * https://www.suse.com/security/cve/CVE-2026-25232.html * https://www.suse.com/security/cve/CVE-2026-25242.html * https://www.suse.com/security/cve/CVE-2026-25518.html * https://www.suse.com/security/cve/CVE-2026-25591.html * https://www.suse.com/security/cve/CVE-2026-25760.html * https://www.suse.com/security/cve/CVE-2026-25766.html * https://www.suse.com/security/cve/CVE-2026-25791.html * https://www.suse.com/security/cve/CVE-2026-25793.html * https://www.suse.com/security/cve/CVE-2026-25802.html * https://www.suse.com/security/cve/CVE-2026-25804.html * https://www.suse.com/security/cve/CVE-2026-25882.html * https://www.suse.com/security/cve/CVE-2026-25889.html * https://www.suse.com/security/cve/CVE-2026-25890.html * https://www.suse.com/security/cve/CVE-2026-25891.html * https://www.suse.com/security/cve/CVE-2026-25899.html * https://www.suse.com/security/cve/CVE-2026-25934.html * https://www.suse.com/security/cve/CVE-2026-25935.html * https://www.suse.com/security/cve/CVE-2026-25949.html * https://www.suse.com/security/cve/CVE-2026-26014.html * https://www.suse.com/security/cve/CVE-2026-26055.html * https://www.suse.com/security/cve/CVE-2026-26056.html * https://www.suse.com/security/cve/CVE-2026-26187.html * https://www.suse.com/security/cve/CVE-2026-26190.html * https://www.suse.com/security/cve/CVE-2026-26201.html * https://www.suse.com/security/cve/CVE-2026-26205.html * https://www.suse.com/security/cve/CVE-2026-26313.html * https://www.suse.com/security/cve/CVE-2026-26314.html * https://www.suse.com/security/cve/CVE-2026-26315.html * https://www.suse.com/security/cve/CVE-2026-26957.html * https://www.suse.com/security/cve/CVE-2026-26958.html * https://www.suse.com/security/cve/CVE-2026-26963.html * https://www.suse.com/security/cve/CVE-2026-26995.html * https://www.suse.com/security/cve/CVE-2026-27017.html * https://www.suse.com/security/cve/CVE-2026-27111.html * https://www.suse.com/security/cve/CVE-2026-27112.html * https://www.suse.com/security/cve/CVE-2026-27141.html * https://www.suse.com/security/cve/CVE-2026-27571.html * https://www.suse.com/security/cve/CVE-2026-27585.html * https://www.suse.com/security/cve/CVE-2026-27586.html * https://www.suse.com/security/cve/CVE-2026-27587.html * https://www.suse.com/security/cve/CVE-2026-27588.html * https://www.suse.com/security/cve/CVE-2026-27589.html * https://www.suse.com/security/cve/CVE-2026-27590.html * https://www.suse.com/security/cve/CVE-2026-27598.html * https://www.suse.com/security/cve/CVE-2026-27611.html * https://www.suse.com/security/cve/CVE-2026-27626.html * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:11 -0000 Subject: SUSE-SU-2026:0790-1: critical: Security update for go1.25-openssl Message-ID: <177256981132.729.14425344984224814296@dd9735431ee0> # Security update for go1.25-openssl Announcement ID: SUSE-SU-2026:0790-1 Release Date: 2026-03-03T15:52:23Z Rating: critical References: * bsc#1256818 * bsc#1257692 * jsc#SLE-18320 Cross-References: * CVE-2025-61732 * CVE-2025-68121 CVSS scores: * CVE-2025-61732 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-61732 ( SUSE ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61732 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-68121 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-68121 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities and contains one feature can now be installed. ## Description: This update for go1.25-openssl fixes the following issues: Update to version 1.25.7. Security issues fixed: * CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692). * CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818). Other updates and bugfixes: * version update to 1.25.7: * go#75844 cmd/compile: OOM killed on linux/arm64 * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs * go#77425 crypto/tls: CL 737700 broke session resumption on macOS ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-790=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-790=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-790=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-790=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-790=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-790=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-790=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-790=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.25-openssl-debuginfo-1.25.7-150000.1.15.1 * go1.25-openssl-1.25.7-150000.1.15.1 * go1.25-openssl-race-1.25.7-150000.1.15.1 * go1.25-openssl-doc-1.25.7-150000.1.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61732.html * https://www.suse.com/security/cve/CVE-2025-68121.html * https://bugzilla.suse.com/show_bug.cgi?id=1256818 * https://bugzilla.suse.com/show_bug.cgi?id=1257692 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:18 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:18 -0000 Subject: SUSE-SU-2026:0789-1: critical: Security update for go1.24-openssl Message-ID: <177256981857.729.18142780383301263934@dd9735431ee0> # Security update for go1.24-openssl Announcement ID: SUSE-SU-2026:0789-1 Release Date: 2026-03-03T15:51:44Z Rating: critical References: * bsc#1236217 * bsc#1256818 * bsc#1256820 * bsc#1257692 * jsc#SLE-18320 Cross-References: * CVE-2025-61732 * CVE-2025-68119 * CVE-2025-68121 CVSS scores: * CVE-2025-61732 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-61732 ( SUSE ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61732 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68119 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-68121 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-68121 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities, contains one feature and has one security fix can now be installed. ## Description: This update for go1.24-openssl fixes the following issues: Update to version 1.24.13 (jsc#SLE-18320, bsc#1236217). Security issues fixed: * CVE-2025-61732: cmd/cgo: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692). * CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820). * CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818). Other updates and bugfixes: * go#77322 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs * go#77424 crypto/tls: CL 737700 broke session resumption on macOS ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-789=1 openSUSE-SLE-15.6-2026-789=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-789=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-789=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-789=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * go1.24-openssl-doc-1.24.13-150600.13.18.1 * go1.24-openssl-1.24.13-150600.13.18.1 * go1.24-openssl-debuginfo-1.24.13-150600.13.18.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.13-150600.13.18.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.13-150600.13.18.1 * go1.24-openssl-doc-1.24.13-150600.13.18.1 * go1.24-openssl-1.24.13-150600.13.18.1 * go1.24-openssl-debuginfo-1.24.13-150600.13.18.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-openssl-race-1.24.13-150600.13.18.1 * go1.24-openssl-doc-1.24.13-150600.13.18.1 * go1.24-openssl-1.24.13-150600.13.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * go1.24-openssl-race-1.24.13-150600.13.18.1 * go1.24-openssl-doc-1.24.13-150600.13.18.1 * go1.24-openssl-1.24.13-150600.13.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61732.html * https://www.suse.com/security/cve/CVE-2025-68119.html * https://www.suse.com/security/cve/CVE-2025-68121.html * https://bugzilla.suse.com/show_bug.cgi?id=1236217 * https://bugzilla.suse.com/show_bug.cgi?id=1256818 * https://bugzilla.suse.com/show_bug.cgi?id=1256820 * https://bugzilla.suse.com/show_bug.cgi?id=1257692 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:26 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:26 -0000 Subject: SUSE-SU-2026:0788-1: important: Security update for libsoup Message-ID: <177256982636.729.13157970253717534179@dd9735431ee0> # Security update for libsoup Announcement ID: SUSE-SU-2026:0788-1 Release Date: 2026-03-03T15:15:28Z Rating: important References: * bsc#1257398 * bsc#1257441 * bsc#1257597 Cross-References: * CVE-2026-1467 * CVE-2026-1539 * CVE-2026-1760 CVSS scores: * CVE-2026-1467 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N * CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2026-1539 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1760 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L * CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398). * CVE-2026-1539: proxy authentication credentials leaked via the Proxy- Authorization header when handling HTTP redirects (bsc#1257441). * CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request smuggling and potential DoS (bsc#1257597). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-788=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-788=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-788=1 openSUSE-SLE-15.6-2026-788=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-788=1 ## Package List: * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-debugsource-3.4.4-150600.3.37.1 * libsoup-devel-3.4.4-150600.3.37.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.37.1 * libsoup-3_0-0-3.4.4-150600.3.37.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.37.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * libsoup-lang-3.4.4-150600.3.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libsoup-debugsource-3.4.4-150600.3.37.1 * libsoup-devel-3.4.4-150600.3.37.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.37.1 * libsoup-3_0-0-3.4.4-150600.3.37.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * libsoup-lang-3.4.4-150600.3.37.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-debugsource-3.4.4-150600.3.37.1 * libsoup-devel-3.4.4-150600.3.37.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.37.1 * libsoup-3_0-0-3.4.4-150600.3.37.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.37.1 * openSUSE Leap 15.6 (x86_64) * libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.37.1 * libsoup-devel-32bit-3.4.4-150600.3.37.1 * libsoup-3_0-0-32bit-3.4.4-150600.3.37.1 * openSUSE Leap 15.6 (noarch) * libsoup-lang-3.4.4-150600.3.37.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-devel-64bit-3.4.4-150600.3.37.1 * libsoup-3_0-0-64bit-3.4.4-150600.3.37.1 * libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.37.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-debugsource-3.4.4-150600.3.37.1 * libsoup-devel-3.4.4-150600.3.37.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.37.1 * libsoup-3_0-0-3.4.4-150600.3.37.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.37.1 * Basesystem Module 15-SP7 (noarch) * libsoup-lang-3.4.4-150600.3.37.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1467.html * https://www.suse.com/security/cve/CVE-2026-1539.html * https://www.suse.com/security/cve/CVE-2026-1760.html * https://bugzilla.suse.com/show_bug.cgi?id=1257398 * https://bugzilla.suse.com/show_bug.cgi?id=1257441 * https://bugzilla.suse.com/show_bug.cgi?id=1257597 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:32 -0000 Subject: SUSE-SU-2026:0787-1: important: Security update for postgresql17 Message-ID: <177256983204.729.13374363635813956556@dd9735431ee0> # Security update for postgresql17 Announcement ID: SUSE-SU-2026:0787-1 Release Date: 2026-03-03T14:48:35Z Rating: important References: * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2006 CVSS scores: * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for postgresql17 fixes the following issue: Update to version 17.9 (bsc#1258754). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-787=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-787=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-787=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-787=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-787=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-787=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-787=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-787=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql17-plperl-17.9-150200.5.25.1 * postgresql17-server-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-17.9-150200.5.25.1 * postgresql17-17.9-150200.5.25.1 * postgresql17-devel-17.9-150200.5.25.1 * postgresql17-plpython-17.9-150200.5.25.1 * postgresql17-plpython-debuginfo-17.9-150200.5.25.1 * postgresql17-contrib-17.9-150200.5.25.1 * postgresql17-contrib-debuginfo-17.9-150200.5.25.1 * postgresql17-plperl-debuginfo-17.9-150200.5.25.1 * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-17.9-150200.5.25.1 * postgresql17-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql17-docs-17.9-150200.5.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql17-plperl-17.9-150200.5.25.1 * postgresql17-server-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-17.9-150200.5.25.1 * postgresql17-17.9-150200.5.25.1 * postgresql17-devel-17.9-150200.5.25.1 * postgresql17-plpython-17.9-150200.5.25.1 * postgresql17-plpython-debuginfo-17.9-150200.5.25.1 * postgresql17-contrib-17.9-150200.5.25.1 * postgresql17-contrib-debuginfo-17.9-150200.5.25.1 * postgresql17-plperl-debuginfo-17.9-150200.5.25.1 * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-17.9-150200.5.25.1 * postgresql17-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql17-docs-17.9-150200.5.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql17-plperl-17.9-150200.5.25.1 * postgresql17-server-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-17.9-150200.5.25.1 * postgresql17-17.9-150200.5.25.1 * postgresql17-devel-17.9-150200.5.25.1 * postgresql17-llvmjit-devel-17.9-150200.5.25.1 * postgresql17-plpython-17.9-150200.5.25.1 * postgresql17-contrib-17.9-150200.5.25.1 * postgresql17-plpython-debuginfo-17.9-150200.5.25.1 * postgresql17-contrib-debuginfo-17.9-150200.5.25.1 * postgresql17-llvmjit-17.9-150200.5.25.1 * postgresql17-plperl-debuginfo-17.9-150200.5.25.1 * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-17.9-150200.5.25.1 * postgresql17-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql17-docs-17.9-150200.5.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql17-plperl-17.9-150200.5.25.1 * postgresql17-server-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-17.9-150200.5.25.1 * postgresql17-17.9-150200.5.25.1 * postgresql17-devel-17.9-150200.5.25.1 * postgresql17-llvmjit-devel-17.9-150200.5.25.1 * postgresql17-plpython-17.9-150200.5.25.1 * postgresql17-contrib-17.9-150200.5.25.1 * postgresql17-plpython-debuginfo-17.9-150200.5.25.1 * postgresql17-contrib-debuginfo-17.9-150200.5.25.1 * postgresql17-llvmjit-17.9-150200.5.25.1 * postgresql17-plperl-debuginfo-17.9-150200.5.25.1 * postgresql17-debuginfo-17.9-150200.5.25.1 * postgresql17-pltcl-17.9-150200.5.25.1 * postgresql17-devel-debuginfo-17.9-150200.5.25.1 * postgresql17-server-devel-17.9-150200.5.25.1 * postgresql17-debugsource-17.9-150200.5.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql17-docs-17.9-150200.5.25.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:40 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:40 -0000 Subject: SUSE-SU-2026:0786-1: important: Security update for postgresql14 Message-ID: <177256984093.729.13631124626459947371@dd9735431ee0> # Security update for postgresql14 Announcement ID: SUSE-SU-2026:0786-1 Release Date: 2026-03-03T14:47:28Z Rating: important References: * bsc#1258008 * bsc#1258009 * bsc#1258010 * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2003 * CVE-2026-2004 * CVE-2026-2005 * CVE-2026-2006 CVSS scores: * CVE-2026-2003 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2003 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2004 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2004 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for postgresql14 fixes the following issues: Update to version 14.22 (bsc#1258754). Security issues fixed: * CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008). * CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code execution (bsc#1258009). * CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution (bsc#1258010). * CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution (bsc#1258011). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-786=1 openSUSE-SLE-15.6-2026-786=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-786=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-786=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-786=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-786=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql14-llvmjit-debuginfo-14.22-150600.16.28.1 * postgresql14-plpython-debuginfo-14.22-150600.16.28.1 * postgresql14-pltcl-14.22-150600.16.28.1 * postgresql14-test-14.22-150600.16.28.1 * postgresql14-14.22-150600.16.28.1 * postgresql14-contrib-debuginfo-14.22-150600.16.28.1 * postgresql14-plperl-debuginfo-14.22-150600.16.28.1 * postgresql14-pltcl-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-14.22-150600.16.28.1 * postgresql14-debugsource-14.22-150600.16.28.1 * postgresql14-debuginfo-14.22-150600.16.28.1 * postgresql14-server-14.22-150600.16.28.1 * postgresql14-server-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-contrib-14.22-150600.16.28.1 * postgresql14-server-debuginfo-14.22-150600.16.28.1 * postgresql14-server-devel-14.22-150600.16.28.1 * postgresql14-llvmjit-14.22-150600.16.28.1 * postgresql14-plpython-14.22-150600.16.28.1 * postgresql14-plperl-14.22-150600.16.28.1 * postgresql14-llvmjit-devel-14.22-150600.16.28.1 * openSUSE Leap 15.6 (noarch) * postgresql14-docs-14.22-150600.16.28.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-contrib-debuginfo-14.22-150600.16.28.1 * postgresql14-plperl-debuginfo-14.22-150600.16.28.1 * postgresql14-plpython-14.22-150600.16.28.1 * postgresql14-pltcl-debuginfo-14.22-150600.16.28.1 * postgresql14-debuginfo-14.22-150600.16.28.1 * postgresql14-server-14.22-150600.16.28.1 * postgresql14-server-devel-14.22-150600.16.28.1 * postgresql14-plperl-14.22-150600.16.28.1 * postgresql14-plpython-debuginfo-14.22-150600.16.28.1 * postgresql14-pltcl-14.22-150600.16.28.1 * postgresql14-server-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-14.22-150600.16.28.1 * postgresql14-contrib-14.22-150600.16.28.1 * postgresql14-server-debuginfo-14.22-150600.16.28.1 * postgresql14-debugsource-14.22-150600.16.28.1 * postgresql14-14.22-150600.16.28.1 * Legacy Module 15-SP7 (noarch) * postgresql14-docs-14.22-150600.16.28.1 * Legacy Module 15-SP7 (ppc64le s390x x86_64) * postgresql14-test-14.22-150600.16.28.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-debuginfo-14.22-150600.16.28.1 * postgresql14-llvmjit-debuginfo-14.22-150600.16.28.1 * postgresql14-test-14.22-150600.16.28.1 * postgresql14-debugsource-14.22-150600.16.28.1 * postgresql14-llvmjit-14.22-150600.16.28.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-contrib-debuginfo-14.22-150600.16.28.1 * postgresql14-plperl-debuginfo-14.22-150600.16.28.1 * postgresql14-plpython-14.22-150600.16.28.1 * postgresql14-pltcl-debuginfo-14.22-150600.16.28.1 * postgresql14-debuginfo-14.22-150600.16.28.1 * postgresql14-server-14.22-150600.16.28.1 * postgresql14-server-devel-14.22-150600.16.28.1 * postgresql14-plperl-14.22-150600.16.28.1 * postgresql14-plpython-debuginfo-14.22-150600.16.28.1 * postgresql14-pltcl-14.22-150600.16.28.1 * postgresql14-server-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-14.22-150600.16.28.1 * postgresql14-contrib-14.22-150600.16.28.1 * postgresql14-server-debuginfo-14.22-150600.16.28.1 * postgresql14-debugsource-14.22-150600.16.28.1 * postgresql14-14.22-150600.16.28.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * postgresql14-docs-14.22-150600.16.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * postgresql14-contrib-debuginfo-14.22-150600.16.28.1 * postgresql14-plperl-debuginfo-14.22-150600.16.28.1 * postgresql14-plpython-14.22-150600.16.28.1 * postgresql14-pltcl-debuginfo-14.22-150600.16.28.1 * postgresql14-debuginfo-14.22-150600.16.28.1 * postgresql14-server-14.22-150600.16.28.1 * postgresql14-server-devel-14.22-150600.16.28.1 * postgresql14-plperl-14.22-150600.16.28.1 * postgresql14-plpython-debuginfo-14.22-150600.16.28.1 * postgresql14-pltcl-14.22-150600.16.28.1 * postgresql14-server-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-debuginfo-14.22-150600.16.28.1 * postgresql14-devel-14.22-150600.16.28.1 * postgresql14-contrib-14.22-150600.16.28.1 * postgresql14-server-debuginfo-14.22-150600.16.28.1 * postgresql14-debugsource-14.22-150600.16.28.1 * postgresql14-14.22-150600.16.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * postgresql14-docs-14.22-150600.16.28.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2003.html * https://www.suse.com/security/cve/CVE-2026-2004.html * https://www.suse.com/security/cve/CVE-2026-2005.html * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258008 * https://bugzilla.suse.com/show_bug.cgi?id=1258009 * https://bugzilla.suse.com/show_bug.cgi?id=1258010 * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:45 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:45 -0000 Subject: SUSE-SU-2026:0785-1: important: Security update for postgresql18 Message-ID: <177256984574.729.1923283884286220381@dd9735431ee0> # Security update for postgresql18 Announcement ID: SUSE-SU-2026:0785-1 Release Date: 2026-03-03T14:01:39Z Rating: important References: * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2006 CVSS scores: * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for postgresql18 fixes the following issue: Update to version 18.3 (bsc#1258754). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-785=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-785=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpq5-18.3-8.9.1 * libecpg6-18.3-8.9.1 * libpq5-debuginfo-18.3-8.9.1 * libecpg6-debuginfo-18.3-8.9.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libecpg6-debuginfo-32bit-18.3-8.9.1 * libpq5-debuginfo-32bit-18.3-8.9.1 * libecpg6-32bit-18.3-8.9.1 * libpq5-32bit-18.3-8.9.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libecpg6-18.3-8.9.1 * libecpg6-32bit-18.3-8.9.1 * libpq5-debuginfo-18.3-8.9.1 * libecpg6-debuginfo-32bit-18.3-8.9.1 * libpq5-debuginfo-32bit-18.3-8.9.1 * libpq5-32bit-18.3-8.9.1 * libpq5-18.3-8.9.1 * libecpg6-debuginfo-18.3-8.9.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:50 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:50 -0000 Subject: SUSE-SU-2026:0784-1: important: Security update for postgresql16 Message-ID: <177256985005.729.17816501096861558517@dd9735431ee0> # Security update for postgresql16 Announcement ID: SUSE-SU-2026:0784-1 Release Date: 2026-03-03T13:42:39Z Rating: important References: * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2006 CVSS scores: * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for postgresql16 fixes the following issue: Update to version 16.13 (bsc#1258754). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-784=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-784=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-784=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-784=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-784=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-784=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-784=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-784=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql16-docs-16.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql16-contrib-debuginfo-16.13-150200.5.41.1 * postgresql16-debugsource-16.13-150200.5.41.1 * postgresql16-contrib-16.13-150200.5.41.1 * postgresql16-plperl-16.13-150200.5.41.1 * postgresql16-plperl-debuginfo-16.13-150200.5.41.1 * postgresql16-16.13-150200.5.41.1 * postgresql16-devel-16.13-150200.5.41.1 * postgresql16-server-debuginfo-16.13-150200.5.41.1 * postgresql16-debuginfo-16.13-150200.5.41.1 * postgresql16-pltcl-16.13-150200.5.41.1 * postgresql16-pltcl-debuginfo-16.13-150200.5.41.1 * postgresql16-server-16.13-150200.5.41.1 * postgresql16-plpython-16.13-150200.5.41.1 * postgresql16-server-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-plpython-debuginfo-16.13-150200.5.41.1 * postgresql16-devel-debuginfo-16.13-150200.5.41.1 * postgresql16-server-devel-16.13-150200.5.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql16-docs-16.13-150200.5.41.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:30:53 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:30:53 -0000 Subject: SUSE-SU-2026:0783-1: moderate: Security update for zlib Message-ID: <177256985308.729.3080396713185061761@dd9735431ee0> # Security update for zlib Announcement ID: SUSE-SU-2026:0783-1 Release Date: 2026-03-03T13:36:31Z Rating: moderate References: * bsc#1258392 Cross-References: * CVE-2026-27171 CVSS scores: * CVE-2026-27171 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-27171 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-27171 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-27171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for zlib fixes the following issue: * CVE-2026-27171: Fixed infinite loop via the `crc32_combine64` and `crc32_combine_gen64` functions due to missing checks for negative lengths (bsc#1258392). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-783=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-783=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-783=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-783=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-783=1 ## Package List: * Development Tools Module 15-SP7 (x86_64) * zlib-devel-32bit-1.2.13-150500.4.6.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * zlib-devel-static-1.2.13-150500.4.6.1 * zlib-testsuite-debuginfo-1.2.13-150500.4.6.1 * libminizip1-debuginfo-1.2.13-150500.4.6.1 * libminizip1-1.2.13-150500.4.6.1 * zlib-devel-1.2.13-150500.4.6.1 * zlib-testsuite-1.2.13-150500.4.6.1 * libz1-1.2.13-150500.4.6.1 * zlib-debugsource-1.2.13-150500.4.6.1 * libz1-debuginfo-1.2.13-150500.4.6.1 * minizip-devel-1.2.13-150500.4.6.1 * openSUSE Leap 15.5 (x86_64) * libz1-32bit-debuginfo-1.2.13-150500.4.6.1 * libz1-32bit-1.2.13-150500.4.6.1 * zlib-devel-static-32bit-1.2.13-150500.4.6.1 * libminizip1-32bit-debuginfo-1.2.13-150500.4.6.1 * zlib-devel-32bit-1.2.13-150500.4.6.1 * libminizip1-32bit-1.2.13-150500.4.6.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libminizip1-64bit-debuginfo-1.2.13-150500.4.6.1 * libz1-64bit-1.2.13-150500.4.6.1 * libz1-64bit-debuginfo-1.2.13-150500.4.6.1 * zlib-devel-64bit-1.2.13-150500.4.6.1 * zlib-devel-static-64bit-1.2.13-150500.4.6.1 * libminizip1-64bit-1.2.13-150500.4.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * zlib-devel-static-1.2.13-150500.4.6.1 * zlib-testsuite-debuginfo-1.2.13-150500.4.6.1 * libminizip1-debuginfo-1.2.13-150500.4.6.1 * libminizip1-1.2.13-150500.4.6.1 * zlib-devel-1.2.13-150500.4.6.1 * zlib-testsuite-1.2.13-150500.4.6.1 * libz1-1.2.13-150500.4.6.1 * zlib-debugsource-1.2.13-150500.4.6.1 * libz1-debuginfo-1.2.13-150500.4.6.1 * minizip-devel-1.2.13-150500.4.6.1 * openSUSE Leap 15.6 (x86_64) * libz1-32bit-debuginfo-1.2.13-150500.4.6.1 * libz1-32bit-1.2.13-150500.4.6.1 * zlib-devel-static-32bit-1.2.13-150500.4.6.1 * libminizip1-32bit-debuginfo-1.2.13-150500.4.6.1 * zlib-devel-32bit-1.2.13-150500.4.6.1 * libminizip1-32bit-1.2.13-150500.4.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libz1-debuginfo-1.2.13-150500.4.6.1 * zlib-devel-1.2.13-150500.4.6.1 * zlib-debugsource-1.2.13-150500.4.6.1 * libz1-1.2.13-150500.4.6.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * zlib-devel-static-1.2.13-150500.4.6.1 * libminizip1-debuginfo-1.2.13-150500.4.6.1 * libminizip1-1.2.13-150500.4.6.1 * zlib-devel-1.2.13-150500.4.6.1 * libz1-1.2.13-150500.4.6.1 * zlib-debugsource-1.2.13-150500.4.6.1 * libz1-debuginfo-1.2.13-150500.4.6.1 * minizip-devel-1.2.13-150500.4.6.1 * Basesystem Module 15-SP7 (x86_64) * libz1-32bit-debuginfo-1.2.13-150500.4.6.1 * libz1-32bit-1.2.13-150500.4.6.1 ## References: * https://www.suse.com/security/cve/CVE-2026-27171.html * https://bugzilla.suse.com/show_bug.cgi?id=1258392 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:08 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:08 -0000 Subject: SUSE-SU-2026:0782-1: moderate: Security update for libxml2 Message-ID: <177256986874.729.15592442604260816244@dd9735431ee0> # Security update for libxml2 Announcement ID: SUSE-SU-2026:0782-1 Release Date: 2026-03-03T13:35:15Z Rating: moderate References: * bsc#1250553 * bsc#1256807 * bsc#1256808 * bsc#1256809 * bsc#1256811 * bsc#1256812 * bsc#1257593 * bsc#1257594 * bsc#1257595 Cross-References: * CVE-2025-10911 * CVE-2026-0990 * CVE-2026-0992 * CVE-2026-1757 CVSS scores: * CVE-2025-10911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0990 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-0990 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-0990 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-0992 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-0992 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-1757 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-1757 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2026-1757 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities and has five security fixes can now be installed. ## Description: This update for libxml2 fixes the following issues: * CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811) * CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential behavior. (bsc#1256809, bsc#1256812) * CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595) * CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-782=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libxml2-2-debuginfo-32bit-2.9.4-46.99.1 * libxml2-2-2.9.4-46.99.1 * libxml2-debugsource-2.9.4-46.99.1 * libxml2-tools-2.9.4-46.99.1 * python-libxml2-debuginfo-2.9.4-46.99.1 * python-libxml2-debugsource-2.9.4-46.99.1 * libxml2-2-debuginfo-2.9.4-46.99.1 * libxml2-tools-debuginfo-2.9.4-46.99.1 * python-libxml2-2.9.4-46.99.1 * libxml2-2-32bit-2.9.4-46.99.1 * libxml2-devel-2.9.4-46.99.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libxml2-doc-2.9.4-46.99.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10911.html * https://www.suse.com/security/cve/CVE-2026-0990.html * https://www.suse.com/security/cve/CVE-2026-0992.html * https://www.suse.com/security/cve/CVE-2026-1757.html * https://bugzilla.suse.com/show_bug.cgi?id=1250553 * https://bugzilla.suse.com/show_bug.cgi?id=1256807 * https://bugzilla.suse.com/show_bug.cgi?id=1256808 * https://bugzilla.suse.com/show_bug.cgi?id=1256809 * https://bugzilla.suse.com/show_bug.cgi?id=1256811 * https://bugzilla.suse.com/show_bug.cgi?id=1256812 * https://bugzilla.suse.com/show_bug.cgi?id=1257593 * https://bugzilla.suse.com/show_bug.cgi?id=1257594 * https://bugzilla.suse.com/show_bug.cgi?id=1257595 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:13 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:13 -0000 Subject: SUSE-SU-2026:0781-1: low: Security update for patch Message-ID: <177256987344.729.12409875653459789396@dd9735431ee0> # Security update for patch Announcement ID: SUSE-SU-2026:0781-1 Release Date: 2026-03-03T13:28:12Z Rating: low References: * bsc#1194037 Cross-References: * CVE-2021-45261 CVSS scores: * CVE-2021-45261 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2021-45261 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for patch fixes the following issues: * CVE-2021-45261: Clear range of pointers before they are used/freed (bsc#1194037). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-781=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-781=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * patch-debugsource-2.7.6-150000.5.9.1 * patch-debuginfo-2.7.6-150000.5.9.1 * patch-2.7.6-150000.5.9.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * patch-debugsource-2.7.6-150000.5.9.1 * patch-debuginfo-2.7.6-150000.5.9.1 * patch-2.7.6-150000.5.9.1 ## References: * https://www.suse.com/security/cve/CVE-2021-45261.html * https://bugzilla.suse.com/show_bug.cgi?id=1194037 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:20 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:20 -0000 Subject: SUSE-SU-2026:0780-1: moderate: Security update for tracker-miners Message-ID: <177256988074.729.323164973627897715@dd9735431ee0> # Security update for tracker-miners Announcement ID: SUSE-SU-2026:0780-1 Release Date: 2026-03-03T13:26:03Z Rating: moderate References: * bsc#1257606 * bsc#1257607 * bsc#1257608 * bsc#1257609 Cross-References: * CVE-2026-1764 * CVE-2026-1765 * CVE-2026-1766 * CVE-2026-1767 CVSS scores: * CVE-2026-1764 ( SUSE ): 5.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-1764 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H * CVE-2026-1765 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H * CVE-2026-1766 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H * CVE-2026-1767 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H Affected Products: * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for tracker-miners fixes the following issues: * CVE-2026-1764: heap buffer overflow leads to denial of service or information disclosure when parsing MP3 files (bsc#1257606). * CVE-2026-1765: denial of Service and potential information disclosure via crafted MP3 files (bsc#1257607). * CVE-2026-1766: denial of Service and information disclosure via malformed MP3 files (bsc#1257608). * CVE-2026-1767: heap buffer overflow leading to denial of service or information disclosure via malformed MP3 ID3 tags (bsc#1257609). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-780=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-780=1 openSUSE-SLE-15.6-2026-780=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-780=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * tracker-miners-lang-3.6.2-150600.4.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * tracker-miner-files-debuginfo-3.6.2-150600.4.6.1 * tracker-miners-3.6.2-150600.4.6.1 * tracker-miner-files-3.6.2-150600.4.6.1 * tracker-miners-debugsource-3.6.2-150600.4.6.1 * tracker-miners-debuginfo-3.6.2-150600.4.6.1 * openSUSE Leap 15.6 (noarch) * tracker-miners-lang-3.6.2-150600.4.6.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * tracker-miner-files-debuginfo-3.6.2-150600.4.6.1 * tracker-miners-3.6.2-150600.4.6.1 * tracker-miner-files-3.6.2-150600.4.6.1 * tracker-miners-debugsource-3.6.2-150600.4.6.1 * tracker-miners-debuginfo-3.6.2-150600.4.6.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1764.html * https://www.suse.com/security/cve/CVE-2026-1765.html * https://www.suse.com/security/cve/CVE-2026-1766.html * https://www.suse.com/security/cve/CVE-2026-1767.html * https://bugzilla.suse.com/show_bug.cgi?id=1257606 * https://bugzilla.suse.com/show_bug.cgi?id=1257607 * https://bugzilla.suse.com/show_bug.cgi?id=1257608 * https://bugzilla.suse.com/show_bug.cgi?id=1257609 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:29 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:29 -0000 Subject: SUSE-SU-2026:0779-1: moderate: Security update for libssh Message-ID: <177256988963.729.8679054790754905146@dd9735431ee0> # Security update for libssh Announcement ID: SUSE-SU-2026:0779-1 Release Date: 2026-03-03T13:25:13Z Rating: moderate References: * bsc#1258045 * bsc#1258049 * bsc#1258054 * bsc#1258080 * bsc#1258081 Cross-References: * CVE-2026-0964 * CVE-2026-0965 * CVE-2026-0966 * CVE-2026-0967 * CVE-2026-0968 CVSS scores: * CVE-2026-0964 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-0965 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2026-0966 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2026-0967 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0967 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2026-0968 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0968 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves five vulnerabilities can now be installed. ## Description: This update for libssh fixes the following issues: * CVE-2026-0964: improper sanitation of paths received from SCP servers can cause path traversal (bsc#1258049). * CVE-2026-0965: possible denial of service when parsing unexpected configuration files (bsc#1258045). * CVE-2026-0966: buffer underflow in ssh_get_hexa() on invalid input (bsc#1258054). * CVE-2026-0967: specially crafted patterns could cause denial of service (bsc#1258081). * CVE-2026-0968: malformed SFTP message can lead to out of bound read (bsc#1258080). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-779=1 openSUSE-SLE-15.6-2026-779=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-779=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libssh4-debuginfo-0.9.8-150600.11.9.1 * libssh-debugsource-0.9.8-150600.11.9.1 * libssh-config-0.9.8-150600.11.9.1 * libssh4-0.9.8-150600.11.9.1 * libssh-devel-0.9.8-150600.11.9.1 * openSUSE Leap 15.6 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150600.11.9.1 * libssh4-32bit-0.9.8-150600.11.9.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libssh4-64bit-0.9.8-150600.11.9.1 * libssh4-64bit-debuginfo-0.9.8-150600.11.9.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libssh4-debuginfo-0.9.8-150600.11.9.1 * libssh-debugsource-0.9.8-150600.11.9.1 * libssh-config-0.9.8-150600.11.9.1 * libssh4-0.9.8-150600.11.9.1 * libssh-devel-0.9.8-150600.11.9.1 * Basesystem Module 15-SP7 (x86_64) * libssh4-32bit-debuginfo-0.9.8-150600.11.9.1 * libssh4-32bit-0.9.8-150600.11.9.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0964.html * https://www.suse.com/security/cve/CVE-2026-0965.html * https://www.suse.com/security/cve/CVE-2026-0966.html * https://www.suse.com/security/cve/CVE-2026-0967.html * https://www.suse.com/security/cve/CVE-2026-0968.html * https://bugzilla.suse.com/show_bug.cgi?id=1258045 * https://bugzilla.suse.com/show_bug.cgi?id=1258049 * https://bugzilla.suse.com/show_bug.cgi?id=1258054 * https://bugzilla.suse.com/show_bug.cgi?id=1258080 * https://bugzilla.suse.com/show_bug.cgi?id=1258081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:38 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:38 -0000 Subject: SUSE-SU-2026:0778-1: moderate: Security update for libssh Message-ID: <177256989826.729.14765987811454290619@dd9735431ee0> # Security update for libssh Announcement ID: SUSE-SU-2026:0778-1 Release Date: 2026-03-03T13:24:29Z Rating: moderate References: * bsc#1258045 * bsc#1258049 * bsc#1258054 * bsc#1258080 * bsc#1258081 Cross-References: * CVE-2026-0964 * CVE-2026-0965 * CVE-2026-0966 * CVE-2026-0967 * CVE-2026-0968 CVSS scores: * CVE-2026-0964 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-0965 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2026-0966 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2026-0967 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0967 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2026-0968 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0968 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for libssh fixes the following issues: * CVE-2026-0964: improper sanitation of paths received from SCP servers can cause path traversal (bsc#1258049). * CVE-2026-0965: possible denial of service when parsing unexpected configuration files (bsc#1258045). * CVE-2026-0966: buffer underflow in ssh_get_hexa() on invalid input (bsc#1258054). * CVE-2026-0967: specially crafted patterns could cause denial of service (bsc#1258081). * CVE-2026-0968: malformed SFTP message can lead to out of bound read (bsc#1258080). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-778=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libssh-devel-0.9.8-3.21.1 * libssh-debugsource-0.9.8-3.21.1 * libssh4-0.9.8-3.21.1 * libssh4-debuginfo-0.9.8-3.21.1 * libssh-config-0.9.8-3.21.1 * libssh4-32bit-0.9.8-3.21.1 * libssh4-debuginfo-32bit-0.9.8-3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0964.html * https://www.suse.com/security/cve/CVE-2026-0965.html * https://www.suse.com/security/cve/CVE-2026-0966.html * https://www.suse.com/security/cve/CVE-2026-0967.html * https://www.suse.com/security/cve/CVE-2026-0968.html * https://bugzilla.suse.com/show_bug.cgi?id=1258045 * https://bugzilla.suse.com/show_bug.cgi?id=1258049 * https://bugzilla.suse.com/show_bug.cgi?id=1258054 * https://bugzilla.suse.com/show_bug.cgi?id=1258080 * https://bugzilla.suse.com/show_bug.cgi?id=1258081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:52 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:52 -0000 Subject: SUSE-SU-2026:0777-1: moderate: Security update for cosign Message-ID: <177256991264.729.3072770046238262115@dd9735431ee0> # Security update for cosign Announcement ID: SUSE-SU-2026:0777-1 Release Date: 2026-03-03T13:22:36Z Rating: moderate References: * bsc#1250620 * bsc#1253913 * bsc#1256496 * bsc#1256562 * bsc#1257080 * bsc#1257085 * bsc#1257139 * bsc#1258542 * bsc#1258612 * jsc#SLE-23879 Cross-References: * CVE-2025-11065 * CVE-2025-58181 * CVE-2026-22703 * CVE-2026-22772 * CVE-2026-23991 * CVE-2026-23992 * CVE-2026-24122 * CVE-2026-24137 * CVE-2026-26958 CVSS scores: * CVE-2025-11065 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-11065 ( SUSE ): 4.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N * CVE-2025-11065 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-22703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-22703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-22703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2026-22772 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2026-22772 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-22772 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-23991 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23991 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-23991 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23991 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23992 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-23992 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2026-23992 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-23992 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-24122 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2026-24122 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2026-24122 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2026-24137 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-24137 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2026-24137 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N * CVE-2026-26958 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-26958 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2026-26958 ( NVD ): 1.7 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves nine vulnerabilities and contains one feature can now be installed. ## Description: This update for cosign fixes the following issues: Update to version 3.0.5 (jsc#SLE-23879). Security issues fixed: * CVE-2025-11065: github.com/go-viper/mapstructure/v2: sensitive Information leak in logs (bsc#1250620). * CVE-2025-58181: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption (bsc#1253913). * CVE-2026-22703: Verification accepts any valid Rekor entry under certain conditions (bsc#1256496). * CVE-2026-22772: github.com/sigstore/fulcio: bypass MetaIssuer URL validation bypass can trigger SSRF to arbitrary internal services (bsc#1256562). * CVE-2026-23991: github.com/theupdateframework/go-tuf/v2: denial of service due to invalid TUF metadata JSON returned by TUF repository (bsc#1257080). * CVE-2026-23992: github.com/theupdateframework/go-tuf/v2: unauthorized modification to TUF metadata files due to a compromised or misconfigured TUF repository (bsc#1257085). * CVE-2026-24122: improper validation of certificates that outlive expired CA certificates (bsc#1258542). * CVE-2026-24137: github.com/sigstore/sigstore/pkg/tuf: legacy TUF client allows for arbitrary file writes with target cache path traversal (bsc#1257139). * CVE-2026-26958: filippo.io/edwards25519: failure to initialize receiver in MultiScalarMult can produce invalid results and lead to undefined behavior (bsc#1258612). Other updates and bugfixes: * chore(deps): bump google.golang.org/api from 0.260.0 to 0.264.0 (#4679) * chore(deps): bump github.com/sigstore/rekor-tiles/v2 from 2.0.1 to 2.1.0 (#4670) * chore(deps): bump filippo.io/edwards25519 from 1.1.0 to 1.1.1 (#4712) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4680) * chore(deps): bump the gomod group across 1 directory with 4 updates (#4702) * chore(deps): bump the actions group with 3 updates (#4703) * update golang builder to use go1.25.7 (#4687) * update golangci-lint to v2.8.x (#4688) * Support DSSE signing conformance test (#4685) * chore(deps): bump the actions group across 1 directory with 8 updates (#4689) * Deprecate rekor-entry-type flag (#4691) * Deprecate cosign triangulate (#4676) * Deprecate cosign copy (#4681) * Enforce TSA requirement for Rekor v2, Fuclio signing (#4683) * chore(deps): bump github.com/theupdateframework/go-tuf/v2 (#4668) * chore(deps): bump golang from 1.25.5 to 1.25.6 in the all group (#4673) * Automatically require signed timestamp with Rekor v2 entries (#4666) * Fix syntax issue in conformance test, update nightly (#4664) * Add mTLS support for TSA client connections when signing with a signing config (#4620) * fix: avoid panic on malformed tlog entry body (#4652) * Verify validity of chain rather than just certificate (#4663) * Allow --local-image with --new-bundle-format for v2 and v3 signatures (#4626) * chore(deps): bump the gomod group across 1 directory with 3 updates (#4662) * Bump sigstore/sigstore to resolve GHSA (#4660) * Gracefully fail if bundle payload body is not a string (#4648) * fix: avoid panic on malformed replace payload (#4653) * chore(deps): bump github.com/sigstore/rekor from 1.4.3 to 1.5.0 (#4659) * fix: avoid panic on malformed attestation payload (#4651) * fix: avoid panic on malformed tlog entries (#4649) * Update conformance to latest * docs(cosign): clarify RFC3161 revocation semantics (#4642) * Add empty predicate to cosign sign when payload type is application/vnd.in- toto+json (#4635) * chore(deps): bump github.com/sigstore/fulcio from 1.8.4 to 1.8.5 (#4637) * Add origin key for ctfe trusted root * Add changelog updates for v3.0.4 and v2.6.2 (#4625) * Update to version 3.0.4: * Fix bundle verify path for old bundle/trusted root (#4623) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4616) * chore(deps): bump cuelang.org/go in the gomod group (#4615) * Optimize cosign tree performance by caching digest resolution (#4612) * Don't require a trusted root to verify offline with a key (#4613) * Support default services for trusted-root and signing-config creation (#4592) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4602) * chore(deps): bump github.com/sigstore/sigstore-go (#4578) * chore(deps): bump github.com/buildkite/agent/v3 from 3.114.1 to 3.115.2 (#4601) * chore(deps): bump google.golang.org/api from 0.257.0 to 0.258.0 (#4611) * chore(deps): bump k8s.io/client-go from 0.34.3 to 0.35.0 (#4604) * chore(deps): bump actions/upload-artifact from 5.0.0 to 6.0.0 (#4588) * chore(deps): bump golang.org/x/oauth2 from 0.33.0 to 0.34.0 (#4586) * chore(deps): bump the gomod group with 5 updates (#4599) * chore(deps): bump github.com/open-policy-agent/opa from 1.10.1 to 1.12.1 (#4600) * chore(deps): bump golang.org/x/term from 0.37.0 to 0.38.0 (#4584) * chore(deps): bump the actions group with 3 updates (#4587) * chore(deps): bump actions/cache from 4.3.0 to 5.0.1 (#4589) * chore(deps): bump the gomod group with 9 updates (#4577) * Update to version 3.0.3: * 4554: Closes 4554 - Add warning when --output* is used (#4556) * chore(deps): bump golangci/golangci-lint-action from 8.0.0 to 9.1.0 (#4545) * chore(deps): bump github.com/buildkite/agent/v3 from 3.111.0 to 3.113.0 (#4542) * chore(deps): bump github.com/awslabs/amazon-ecr-credential-helper/ecr-login (#4543) * chore(deps): bump actions/checkout from 5.0.0 to 6.0.0 (#4546) * chore(deps): bump the actions group with 4 updates (#4544) * chore(deps): bump the gomod group across 1 directory with 5 updates (#4567) * chore(deps): bump golang from 1.25.4 to 1.25.5 in the all group (#4568) * update builder to use go1.25.5 (#4566) * Protobuf bundle support for subcommand `clean` (#4539) * Add staging flag to initialize with staging TUF metadata * update slack invite link (#4560) * Updating sign-blob to also support signing with a certificate (#4547) * Bump sigstore library dependencies (#4532) * Protobuf bundle support for subcommands `save` and `load` (#4538) * Fix cert attachment for new bundle with signing config * Fix OCI verification with local cert - old bundle * chore(deps): bump github.com/sigstore/fulcio from 1.7.1 to 1.8.1 (#4519) * chore(deps): bump golang.org/x/crypto in /test/fakeoidc (#4535) * chore(deps): bump golang.org/x/crypto from 0.43.0 to 0.45.0 (#4536) * update go builder and cosign (#4529) * chore(deps): bump the gomod group across 1 directory with 7 updates (#4528) * chore(deps): bump sigstore/cosign-installer from 3.10.0 to 4.0.0 (#4478) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4520) * chore(deps): bump golang from 1.25.3 to 1.25.4 in the all group (#4515) * chore(deps): bump golang.org/x/oauth2 from 0.32.0 to 0.33.0 (#4518) * chore(deps): bump cuelang.org/go from 0.14.2 to 0.15.0 (#4524) * chore(deps): bump github.com/open-policy-agent/opa from 1.9.0 to 1.10.1 (#4521) * chore(deps): bump actions/upload-artifact from 4.6.2 to 5.0.0 (#4502) * chore(deps): bump the actions group across 1 directory with 2 updates (#4516) * chore(deps): bump github.com/buildkite/agent/v3 from 3.110.0 to 3.111.0 (#4523) * chore(deps): bump github.com/theupdateframework/go-tuf/v2 (#4522) * Deprecate tlog-upload flag (#4458) * fix: Use signal context for `sign` cli package. * update offline verification directions (#4526) * Fix signing/verifying annotations for new bundle * Add support to download and attach for protobuf bundles (#4477) * Add --signing-algorithm flag (#3497) * Refactor signcommon bundle helpers * Add --bundle and fix --upload for new bundle * Pass insecure registry flags through to referrers * chore(deps): bump github.com/buildkite/agent/v3 from 3.108.0 to 3.109.1 (#4483) * Add protobuf bundle support for tree subcommand (#4491) * Remove stale embed import (#4492) * Support multiple container identities * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4484) * chore(deps): bump chainguard-dev/actions in the actions group (#4480) * chore(deps): bump github.com/sigstore/rekor-tiles/v2 (#4485) * chore(deps): bump golang.org/x/crypto from 0.42.0 to 0.43.0 (#4486) * chore(deps): bump cuelang.org/go in the gomod group (#4479) * upgrade OSS-Fuzz build tooling (#4487) * Fix segfault when no attestations are found (#4472) * Use overridden repository for new bundle format (#4473) * update go to 1.25.3 (#4471) * Remove --out flag from `cosign initialize` (#4462) * chore(deps): bump the actions group with 2 updates (#4460) * Deprecate offline flag (#4457) * Deduplicate code in sign/attest _and verify_ commands (#4449) * Cache signing config when calling initialize (#4456) * Update changelog for v3.0.2 (#4455) * chore(deps): bump google.golang.org/api from 0.250.0 to 0.251.0 * chore(deps): bump gitlab.com/gitlab-org/api/client-go * chore(deps): bump the actions group with 3 updates * chore(deps): bump github.com/buildkite/agent/v3 from 3.107.2 to 3.108.0 * choose different signature filename for KMS-signed release signatures (#4448) * chore(deps): bump github.com/go-jose/go-jose/v4 (#4451) * Update rekor-tiles version path * update CL for v3.0.1 release (#4447) * update goreleaser config for v3.0.0 release (#4446) * Create changelog for v3.0.0 (#4440) * Fetch service URLs from the TUF PGI signing config by default (#4428) * Create changelog for v2.6.1 (#4439) * chore(deps): bump google.golang.org/api from 0.249.0 to 0.250.0 (#4432) * chore(deps): bump the gomod group with 2 updates (#4429) * chore(deps): bump github.com/open-policy-agent/opa from 1.8.0 to 1.9.0 (#4433) * chore(deps): bump the actions group with 3 updates (#4434) * chore(deps): bump github.com/go-openapi/swag from 0.24.1 to 0.25.1 (#4435) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4436) * chore(deps): bump github.com/go-openapi/runtime from 0.28.0 to 0.29.0 (#4437) * Bump module version to v3 for Cosign v3.0 (#4427) * Move sigstore-conformance back to tagged release (#4425) * Bump sigstore-go to v1.1.3 (#4423) * Partially populate the output of cosign verify when working with new bundles (#4416) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4419) * chore(deps): bump github.com/theupdateframework/go-tuf/v2 (#4418) * chore(deps): bump github.com/buildkite/agent/v3 from 3.105.0 to 3.107.0 (#4420) * chore(deps): bump chainguard-dev/actions in the actions group (#4421) * bump go builder to use 1.25.1 and cosign (#4417) * Bump sigstore-go for more precise user agents (#4413) * chore(deps): bump github.com/spf13/viper from 1.20.1 to 1.21.0 (#4408) * chore(deps): bump the actions group with 2 updates (#4407) * chore(deps): bump gitlab.com/gitlab-org/api/client-go (#4410) * chore(deps): bump github.com/buildkite/agent/v3 from 3.104.0 to 3.105.0 (#4411) * Default to using the new protobuf format (#4318) * Update to version 2.6.0: * Require exclusively a SigningConfig or service URLs when signing (#4403) * Add a terminal spinner while signing with sigstore-go (#4402) * Bump sigstore-go, support alternative hash algorithms with keys (#4386) * Add support for SigningConfig in sign/attest (#4371) * Support self-managed keys when signing with sigstore-go (#4368) * Remove SHA256 assumption in sign-blob/verify-blob (#4050) * introduce dockerfile to pin the go version to decouple go version from go.mod (#4369) * refactor: extract function to write referrer attestations (#4357) * Break import cycle with e2e build tag (#4370) * Update conformance test binary for signing config (#4367) * update builder image to use go1.25 (#4366) * Don't load content from TUF if trusted root path is specified (#4347) * Don't require timestamps when verifying with a key (#4337) * Fixes to cosign sign / verify for the new bundle format (#4346) * update builder to use go1.24.6 (#4334) * bump golangci-lint to v2.3.x (#4333) * Have cosign sign support bundle format (#4316) * Add support for SigningConfig for sign-blob/attest-blob, support Rekor v2 (#4319) * Verify subject with bundle only when checking claims (#4320) * Add to `attest-blob` the ability to supply a complete in-toto statement, and add to `verify-blob-attestation` the ability to verify with just a digest (#4306) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-777=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-777=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-777=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * cosign-3.0.5-150400.3.35.1 * cosign-debuginfo-3.0.5-150400.3.35.1 * Basesystem Module 15-SP7 (noarch) * cosign-zsh-completion-3.0.5-150400.3.35.1 * cosign-bash-completion-3.0.5-150400.3.35.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cosign-3.0.5-150400.3.35.1 * cosign-debuginfo-3.0.5-150400.3.35.1 * openSUSE Leap 15.4 (noarch) * cosign-zsh-completion-3.0.5-150400.3.35.1 * cosign-bash-completion-3.0.5-150400.3.35.1 * cosign-fish-completion-3.0.5-150400.3.35.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cosign-3.0.5-150400.3.35.1 * cosign-debuginfo-3.0.5-150400.3.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11065.html * https://www.suse.com/security/cve/CVE-2025-58181.html * https://www.suse.com/security/cve/CVE-2026-22703.html * https://www.suse.com/security/cve/CVE-2026-22772.html * https://www.suse.com/security/cve/CVE-2026-23991.html * https://www.suse.com/security/cve/CVE-2026-23992.html * https://www.suse.com/security/cve/CVE-2026-24122.html * https://www.suse.com/security/cve/CVE-2026-24137.html * https://www.suse.com/security/cve/CVE-2026-26958.html * https://bugzilla.suse.com/show_bug.cgi?id=1250620 * https://bugzilla.suse.com/show_bug.cgi?id=1253913 * https://bugzilla.suse.com/show_bug.cgi?id=1256496 * https://bugzilla.suse.com/show_bug.cgi?id=1256562 * https://bugzilla.suse.com/show_bug.cgi?id=1257080 * https://bugzilla.suse.com/show_bug.cgi?id=1257085 * https://bugzilla.suse.com/show_bug.cgi?id=1257139 * https://bugzilla.suse.com/show_bug.cgi?id=1258542 * https://bugzilla.suse.com/show_bug.cgi?id=1258612 * https://jira.suse.com/browse/SLE-23879 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:55 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:55 -0000 Subject: SUSE-SU-2026:0776-1: moderate: Security update for evolution-data-server Message-ID: <177256991598.729.3171999878399626395@dd9735431ee0> # Security update for evolution-data-server Announcement ID: SUSE-SU-2026:0776-1 Release Date: 2026-03-03T13:20:27Z Rating: moderate References: * bsc#1258307 Cross-References: * CVE-2026-2604 CVSS scores: * CVE-2026-2604 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-2604 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for evolution-data-server fixes the following issue: * CVE-2026-2604: arbitrary file deletion via inconsistent URI handling (bsc#1258307). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-776=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-776=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-776=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libebackend-1_2-10-debuginfo-3.42.5-150400.3.10.1 * libecal-2_0-1-3.42.5-150400.3.10.1 * typelib-1_0-EBackend-1_2-3.42.5-150400.3.10.1 * libedataserverui-1_2-3-3.42.5-150400.3.10.1 * typelib-1_0-EBook-1_2-3.42.5-150400.3.10.1 * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.10.1 * typelib-1_0-Camel-1_2-3.42.5-150400.3.10.1 * libedata-book-1_2-26-3.42.5-150400.3.10.1 * libebook-contacts-1_2-3-3.42.5-150400.3.10.1 * typelib-1_0-EBookContacts-1_2-3.42.5-150400.3.10.1 * libebackend-1_2-10-3.42.5-150400.3.10.1 * libebook-1_2-20-debuginfo-3.42.5-150400.3.10.1 * libebook-1_2-20-3.42.5-150400.3.10.1 * libedata-cal-2_0-1-3.42.5-150400.3.10.1 * libcamel-1_2-63-3.42.5-150400.3.10.1 * evolution-data-server-devel-3.42.5-150400.3.10.1 * libedataserver-1_2-26-debuginfo-3.42.5-150400.3.10.1 * typelib-1_0-EDataServerUI-1_2-3.42.5-150400.3.10.1 * typelib-1_0-EDataServer-1_2-3.42.5-150400.3.10.1 * typelib-1_0-ECal-2_0-3.42.5-150400.3.10.1 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.10.1 * typelib-1_0-EDataCal-2_0-3.42.5-150400.3.10.1 * evolution-data-server-debuginfo-3.42.5-150400.3.10.1 * libedataserverui-1_2-3-debuginfo-3.42.5-150400.3.10.1 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.10.1 * libecal-2_0-1-debuginfo-3.42.5-150400.3.10.1 * libedataserver-1_2-26-3.42.5-150400.3.10.1 * evolution-data-server-3.42.5-150400.3.10.1 * typelib-1_0-EDataBook-1_2-3.42.5-150400.3.10.1 * evolution-data-server-debugsource-3.42.5-150400.3.10.1 * libcamel-1_2-63-debuginfo-3.42.5-150400.3.10.1 * openSUSE Leap 15.4 (noarch) * evolution-data-server-lang-3.42.5-150400.3.10.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * libecal-2_0-1-debuginfo-3.42.5-150400.3.10.1 * libebackend-1_2-10-debuginfo-3.42.5-150400.3.10.1 * libebackend-1_2-10-3.42.5-150400.3.10.1 * libecal-2_0-1-3.42.5-150400.3.10.1 * libebook-1_2-20-debuginfo-3.42.5-150400.3.10.1 * libebook-1_2-20-3.42.5-150400.3.10.1 * libedata-cal-2_0-1-3.42.5-150400.3.10.1 * libedata-cal-2_0-1-debuginfo-3.42.5-150400.3.10.1 * evolution-data-server-debugsource-3.42.5-150400.3.10.1 * evolution-data-server-debuginfo-3.42.5-150400.3.10.1 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.10.1 * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.10.1 * libedata-book-1_2-26-3.42.5-150400.3.10.1 * libebook-contacts-1_2-3-3.42.5-150400.3.10.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libebackend-1_2-10-debuginfo-3.42.5-150400.3.10.1 * libebackend-1_2-10-3.42.5-150400.3.10.1 * libebook-1_2-20-debuginfo-3.42.5-150400.3.10.1 * libebook-1_2-20-3.42.5-150400.3.10.1 * libedataserver-1_2-26-3.42.5-150400.3.10.1 * libcamel-1_2-63-3.42.5-150400.3.10.1 * evolution-data-server-debugsource-3.42.5-150400.3.10.1 * evolution-data-server-debuginfo-3.42.5-150400.3.10.1 * libedata-book-1_2-26-debuginfo-3.42.5-150400.3.10.1 * libebook-contacts-1_2-3-debuginfo-3.42.5-150400.3.10.1 * libedataserver-1_2-26-debuginfo-3.42.5-150400.3.10.1 * libedata-book-1_2-26-3.42.5-150400.3.10.1 * libebook-contacts-1_2-3-3.42.5-150400.3.10.1 * libcamel-1_2-63-debuginfo-3.42.5-150400.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2604.html * https://bugzilla.suse.com/show_bug.cgi?id=1258307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:31:59 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:31:59 -0000 Subject: SUSE-SU-2026:0775-1: moderate: Security update for evolution-data-server Message-ID: <177256991913.729.4650296023346274291@dd9735431ee0> # Security update for evolution-data-server Announcement ID: SUSE-SU-2026:0775-1 Release Date: 2026-03-03T13:19:22Z Rating: moderate References: * bsc#1258307 Cross-References: * CVE-2026-2604 CVSS scores: * CVE-2026-2604 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-2604 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for evolution-data-server fixes the following issue: * CVE-2026-2604: arbitrary file deletion via inconsistent URI handling (bsc#1258307). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-775=1 SUSE-2026-775=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-775=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-775=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-EBook-1_2-3.50.3-150600.3.9.1 * typelib-1_0-EDataServerUI4-1_0-3.50.3-150600.3.9.1 * libedataserverui4-1_0-0-3.50.3-150600.3.9.1 * libedataserverui-1_2-4-3.50.3-150600.3.9.1 * typelib-1_0-EDataBook-1_2-3.50.3-150600.3.9.1 * typelib-1_0-EDataServerUI-1_2-3.50.3-150600.3.9.1 * typelib-1_0-ECal-2_0-3.50.3-150600.3.9.1 * libebook-1_2-21-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-debuginfo-3.50.3-150600.3.9.1 * libedata-book-1_2-27-3.50.3-150600.3.9.1 * libcamel-1_2-64-3.50.3-150600.3.9.1 * libedata-cal-2_0-2-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-devel-3.50.3-150600.3.9.1 * libebook-contacts-1_2-4-3.50.3-150600.3.9.1 * typelib-1_0-Camel-1_2-3.50.3-150600.3.9.1 * libecal-2_0-2-debuginfo-3.50.3-150600.3.9.1 * libebook-contacts-1_2-4-debuginfo-3.50.3-150600.3.9.1 * libebackend-1_2-11-3.50.3-150600.3.9.1 * typelib-1_0-EDataServer-1_2-3.50.3-150600.3.9.1 * libebackend-1_2-11-debuginfo-3.50.3-150600.3.9.1 * libedataserverui-1_2-4-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-3.50.3-150600.3.9.1 * libedataserver-1_2-27-debuginfo-3.50.3-150600.3.9.1 * libedataserverui4-1_0-0-debuginfo-3.50.3-150600.3.9.1 * libcamel-1_2-64-debuginfo-3.50.3-150600.3.9.1 * libedata-cal-2_0-2-3.50.3-150600.3.9.1 * typelib-1_0-EBackend-1_2-3.50.3-150600.3.9.1 * libecal-2_0-2-3.50.3-150600.3.9.1 * libedata-book-1_2-27-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-debugsource-3.50.3-150600.3.9.1 * libedataserver-1_2-27-3.50.3-150600.3.9.1 * typelib-1_0-EBookContacts-1_2-3.50.3-150600.3.9.1 * typelib-1_0-EDataCal-2_0-3.50.3-150600.3.9.1 * libebook-1_2-21-3.50.3-150600.3.9.1 * openSUSE Leap 15.6 (noarch) * evolution-data-server-lang-3.50.3-150600.3.9.1 * SUSE Package Hub 15 15-SP7 (aarch64 s390x) * evolution-data-server-3.50.3-150600.3.9.1 * evolution-data-server-devel-3.50.3-150600.3.9.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * typelib-1_0-EBook-1_2-3.50.3-150600.3.9.1 * libedataserverui-1_2-4-3.50.3-150600.3.9.1 * typelib-1_0-EDataBook-1_2-3.50.3-150600.3.9.1 * typelib-1_0-EDataServerUI-1_2-3.50.3-150600.3.9.1 * typelib-1_0-ECal-2_0-3.50.3-150600.3.9.1 * libebook-1_2-21-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-debuginfo-3.50.3-150600.3.9.1 * libedata-book-1_2-27-3.50.3-150600.3.9.1 * libcamel-1_2-64-3.50.3-150600.3.9.1 * libedata-cal-2_0-2-debuginfo-3.50.3-150600.3.9.1 * libebook-contacts-1_2-4-3.50.3-150600.3.9.1 * typelib-1_0-Camel-1_2-3.50.3-150600.3.9.1 * libecal-2_0-2-debuginfo-3.50.3-150600.3.9.1 * libebook-contacts-1_2-4-debuginfo-3.50.3-150600.3.9.1 * libebackend-1_2-11-3.50.3-150600.3.9.1 * typelib-1_0-EDataServer-1_2-3.50.3-150600.3.9.1 * libebackend-1_2-11-debuginfo-3.50.3-150600.3.9.1 * libedataserverui-1_2-4-debuginfo-3.50.3-150600.3.9.1 * libedataserver-1_2-27-debuginfo-3.50.3-150600.3.9.1 * libcamel-1_2-64-debuginfo-3.50.3-150600.3.9.1 * libedata-cal-2_0-2-3.50.3-150600.3.9.1 * typelib-1_0-EBackend-1_2-3.50.3-150600.3.9.1 * libecal-2_0-2-3.50.3-150600.3.9.1 * libedata-book-1_2-27-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-debugsource-3.50.3-150600.3.9.1 * libedataserver-1_2-27-3.50.3-150600.3.9.1 * typelib-1_0-EBookContacts-1_2-3.50.3-150600.3.9.1 * typelib-1_0-EDataCal-2_0-3.50.3-150600.3.9.1 * libebook-1_2-21-3.50.3-150600.3.9.1 * SUSE Package Hub 15 15-SP7 (noarch) * evolution-data-server-lang-3.50.3-150600.3.9.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * typelib-1_0-EBook-1_2-3.50.3-150600.3.9.1 * typelib-1_0-EDataServerUI4-1_0-3.50.3-150600.3.9.1 * libedataserverui4-1_0-0-3.50.3-150600.3.9.1 * libedataserverui-1_2-4-3.50.3-150600.3.9.1 * typelib-1_0-EDataServerUI-1_2-3.50.3-150600.3.9.1 * typelib-1_0-ECal-2_0-3.50.3-150600.3.9.1 * libebook-1_2-21-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-debuginfo-3.50.3-150600.3.9.1 * libedata-book-1_2-27-3.50.3-150600.3.9.1 * libcamel-1_2-64-3.50.3-150600.3.9.1 * libedata-cal-2_0-2-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-devel-3.50.3-150600.3.9.1 * libebook-contacts-1_2-4-3.50.3-150600.3.9.1 * typelib-1_0-Camel-1_2-3.50.3-150600.3.9.1 * libecal-2_0-2-debuginfo-3.50.3-150600.3.9.1 * libebook-contacts-1_2-4-debuginfo-3.50.3-150600.3.9.1 * libebackend-1_2-11-3.50.3-150600.3.9.1 * typelib-1_0-EDataServer-1_2-3.50.3-150600.3.9.1 * libebackend-1_2-11-debuginfo-3.50.3-150600.3.9.1 * libedataserverui-1_2-4-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-3.50.3-150600.3.9.1 * libedataserver-1_2-27-debuginfo-3.50.3-150600.3.9.1 * libedataserverui4-1_0-0-debuginfo-3.50.3-150600.3.9.1 * libcamel-1_2-64-debuginfo-3.50.3-150600.3.9.1 * libedata-cal-2_0-2-3.50.3-150600.3.9.1 * libecal-2_0-2-3.50.3-150600.3.9.1 * libedata-book-1_2-27-debuginfo-3.50.3-150600.3.9.1 * evolution-data-server-debugsource-3.50.3-150600.3.9.1 * libedataserver-1_2-27-3.50.3-150600.3.9.1 * typelib-1_0-EBookContacts-1_2-3.50.3-150600.3.9.1 * libebook-1_2-21-3.50.3-150600.3.9.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * evolution-data-server-lang-3.50.3-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2604.html * https://bugzilla.suse.com/show_bug.cgi?id=1258307 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:02 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:02 -0000 Subject: SUSE-SU-2026:0774-1: low: Security update for python Message-ID: <177256992266.729.3325241824875043349@dd9735431ee0> # Security update for python Announcement ID: SUSE-SU-2026:0774-1 Release Date: 2026-03-03T13:18:24Z Rating: low References: * bsc#1229596 Cross-References: * CVE-2024-7592 CVSS scores: * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python fixes the following issue: * CVE-2024-7592: uncontrolled CPU resource consumption when in http.cookies module (bsc#1229596). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-774=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-774=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libpython2_7-1_0-debuginfo-2.7.18-150000.105.1 * python-demo-2.7.18-150000.105.1 * python-debuginfo-2.7.18-150000.105.1 * python-xml-debuginfo-2.7.18-150000.105.1 * python-tk-debuginfo-2.7.18-150000.105.1 * libpython2_7-1_0-2.7.18-150000.105.1 * python-idle-2.7.18-150000.105.1 * python-2.7.18-150000.105.1 * python-base-2.7.18-150000.105.1 * python-base-debuginfo-2.7.18-150000.105.1 * python-debugsource-2.7.18-150000.105.1 * python-tk-2.7.18-150000.105.1 * python-curses-debuginfo-2.7.18-150000.105.1 * python-gdbm-debuginfo-2.7.18-150000.105.1 * python-gdbm-2.7.18-150000.105.1 * python-xml-2.7.18-150000.105.1 * python-base-debugsource-2.7.18-150000.105.1 * python-curses-2.7.18-150000.105.1 * python-devel-2.7.18-150000.105.1 * openSUSE Leap 15.6 (x86_64) * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.105.1 * python-base-32bit-2.7.18-150000.105.1 * python-32bit-debuginfo-2.7.18-150000.105.1 * python-base-32bit-debuginfo-2.7.18-150000.105.1 * libpython2_7-1_0-32bit-2.7.18-150000.105.1 * python-32bit-2.7.18-150000.105.1 * openSUSE Leap 15.6 (noarch) * python-doc-pdf-2.7.18-150000.105.1 * python-doc-2.7.18-150000.105.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libpython2_7-1_0-debuginfo-2.7.18-150000.105.1 * python-xml-debuginfo-2.7.18-150000.105.1 * python-debuginfo-2.7.18-150000.105.1 * libpython2_7-1_0-2.7.18-150000.105.1 * python-2.7.18-150000.105.1 * python-base-2.7.18-150000.105.1 * python-base-debuginfo-2.7.18-150000.105.1 * python-debugsource-2.7.18-150000.105.1 * python-curses-debuginfo-2.7.18-150000.105.1 * python-gdbm-debuginfo-2.7.18-150000.105.1 * python-gdbm-2.7.18-150000.105.1 * python-xml-2.7.18-150000.105.1 * python-base-debugsource-2.7.18-150000.105.1 * python-curses-2.7.18-150000.105.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7592.html * https://bugzilla.suse.com/show_bug.cgi?id=1229596 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:06 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:06 -0000 Subject: SUSE-SU-2026:0772-1: moderate: Security update for docker Message-ID: <177256992677.729.14792757240588851479@dd9735431ee0> # Security update for docker Announcement ID: SUSE-SU-2026:0772-1 Release Date: 2026-03-03T13:14:59Z Rating: moderate References: * bsc#1253904 Cross-References: * CVE-2025-58181 CVSS scores: * CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for docker fixes the following issues: * CVE-2025-58181: Fixed a bug in crypto/ssh where invalidated number of mechanisms can cause unbounded memory consumption. (bsc#1253904) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-772=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-28.5.1_ce-98.151.1 * docker-debuginfo-28.5.1_ce-98.151.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-bash-completion-28.5.1_ce-98.151.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58181.html * https://bugzilla.suse.com/show_bug.cgi?id=1253904 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:15 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:15 -0000 Subject: SUSE-SU-2026:0771-1: important: Security update for postgresql15 Message-ID: <177256993570.729.13289410348169524661@dd9735431ee0> # Security update for postgresql15 Announcement ID: SUSE-SU-2026:0771-1 Release Date: 2026-03-03T13:13:57Z Rating: important References: * bsc#1258008 * bsc#1258009 * bsc#1258010 * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2003 * CVE-2026-2004 * CVE-2026-2005 * CVE-2026-2006 CVSS scores: * CVE-2026-2003 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2003 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2004 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2004 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Legacy Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for postgresql15 fixes the following issues: Update to version 15.17 (bsc#1258754). Security issues fixed: * CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008). * CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code execution (bsc#1258009). * CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution (bsc#1258010). * CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution (bsc#1258011). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-771=1 SUSE-2026-771=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-771=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-771=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-771=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql15-debuginfo-15.17-150600.16.28.1 * postgresql15-server-debuginfo-15.17-150600.16.28.1 * postgresql15-15.17-150600.16.28.1 * postgresql15-contrib-15.17-150600.16.28.1 * postgresql15-contrib-debuginfo-15.17-150600.16.28.1 * postgresql15-llvmjit-debuginfo-15.17-150600.16.28.1 * postgresql15-debugsource-15.17-150600.16.28.1 * postgresql15-plpython-15.17-150600.16.28.1 * postgresql15-plperl-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-15.17-150600.16.28.1 * postgresql15-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-debuginfo-15.17-150600.16.28.1 * postgresql15-plpython-debuginfo-15.17-150600.16.28.1 * postgresql15-devel-15.17-150600.16.28.1 * postgresql15-plperl-15.17-150600.16.28.1 * postgresql15-test-15.17-150600.16.28.1 * postgresql15-server-devel-15.17-150600.16.28.1 * postgresql15-server-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-llvmjit-devel-15.17-150600.16.28.1 * postgresql15-server-15.17-150600.16.28.1 * postgresql15-llvmjit-15.17-150600.16.28.1 * openSUSE Leap 15.6 (noarch) * postgresql15-docs-15.17-150600.16.28.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql15-contrib-15.17-150600.16.28.1 * postgresql15-plpython-debuginfo-15.17-150600.16.28.1 * postgresql15-contrib-debuginfo-15.17-150600.16.28.1 * postgresql15-debuginfo-15.17-150600.16.28.1 * postgresql15-debugsource-15.17-150600.16.28.1 * postgresql15-server-15.17-150600.16.28.1 * postgresql15-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-debuginfo-15.17-150600.16.28.1 * postgresql15-server-debuginfo-15.17-150600.16.28.1 * postgresql15-plpython-15.17-150600.16.28.1 * postgresql15-plperl-debuginfo-15.17-150600.16.28.1 * postgresql15-server-devel-15.17-150600.16.28.1 * postgresql15-server-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-15.17-150600.16.28.1 * postgresql15-15.17-150600.16.28.1 * postgresql15-devel-15.17-150600.16.28.1 * postgresql15-plperl-15.17-150600.16.28.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-contrib-15.17-150600.16.28.1 * postgresql15-plpython-debuginfo-15.17-150600.16.28.1 * postgresql15-contrib-debuginfo-15.17-150600.16.28.1 * postgresql15-debuginfo-15.17-150600.16.28.1 * postgresql15-debugsource-15.17-150600.16.28.1 * postgresql15-server-15.17-150600.16.28.1 * postgresql15-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-debuginfo-15.17-150600.16.28.1 * postgresql15-server-debuginfo-15.17-150600.16.28.1 * postgresql15-plpython-15.17-150600.16.28.1 * postgresql15-plperl-debuginfo-15.17-150600.16.28.1 * postgresql15-server-devel-15.17-150600.16.28.1 * postgresql15-server-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-15.17-150600.16.28.1 * postgresql15-15.17-150600.16.28.1 * postgresql15-devel-15.17-150600.16.28.1 * postgresql15-plperl-15.17-150600.16.28.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * postgresql15-docs-15.17-150600.16.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * postgresql15-contrib-15.17-150600.16.28.1 * postgresql15-plpython-debuginfo-15.17-150600.16.28.1 * postgresql15-contrib-debuginfo-15.17-150600.16.28.1 * postgresql15-debuginfo-15.17-150600.16.28.1 * postgresql15-debugsource-15.17-150600.16.28.1 * postgresql15-server-15.17-150600.16.28.1 * postgresql15-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-debuginfo-15.17-150600.16.28.1 * postgresql15-server-debuginfo-15.17-150600.16.28.1 * postgresql15-plpython-15.17-150600.16.28.1 * postgresql15-plperl-debuginfo-15.17-150600.16.28.1 * postgresql15-server-devel-15.17-150600.16.28.1 * postgresql15-server-devel-debuginfo-15.17-150600.16.28.1 * postgresql15-pltcl-15.17-150600.16.28.1 * postgresql15-15.17-150600.16.28.1 * postgresql15-devel-15.17-150600.16.28.1 * postgresql15-plperl-15.17-150600.16.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * postgresql15-docs-15.17-150600.16.28.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2003.html * https://www.suse.com/security/cve/CVE-2026-2004.html * https://www.suse.com/security/cve/CVE-2026-2005.html * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258008 * https://bugzilla.suse.com/show_bug.cgi?id=1258009 * https://bugzilla.suse.com/show_bug.cgi?id=1258010 * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:24 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:24 -0000 Subject: SUSE-SU-2026:0770-1: important: Security update for postgresql15 Message-ID: <177256994455.729.17652010373379066234@dd9735431ee0> # Security update for postgresql15 Announcement ID: SUSE-SU-2026:0770-1 Release Date: 2026-03-03T13:12:54Z Rating: important References: * bsc#1258008 * bsc#1258009 * bsc#1258010 * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2003 * CVE-2026-2004 * CVE-2026-2005 * CVE-2026-2006 CVSS scores: * CVE-2026-2003 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2003 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2004 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2004 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for postgresql15 fixes the following issues: Update to version 15.17 (bsc#1258754). Security issues fixed: * CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008). * CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code execution (bsc#1258009). * CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution (bsc#1258010). * CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution (bsc#1258011). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-770=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-770=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-770=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-770=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-770=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-770=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-770=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-770=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql15-docs-15.17-150200.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql15-server-devel-15.17-150200.5.54.1 * postgresql15-plperl-debuginfo-15.17-150200.5.54.1 * postgresql15-contrib-15.17-150200.5.54.1 * postgresql15-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-plpython-debuginfo-15.17-150200.5.54.1 * postgresql15-server-debuginfo-15.17-150200.5.54.1 * postgresql15-devel-15.17-150200.5.54.1 * postgresql15-pltcl-15.17-150200.5.54.1 * postgresql15-pltcl-debuginfo-15.17-150200.5.54.1 * postgresql15-15.17-150200.5.54.1 * postgresql15-plpython-15.17-150200.5.54.1 * postgresql15-server-15.17-150200.5.54.1 * postgresql15-server-devel-debuginfo-15.17-150200.5.54.1 * postgresql15-debugsource-15.17-150200.5.54.1 * postgresql15-contrib-debuginfo-15.17-150200.5.54.1 * postgresql15-plperl-15.17-150200.5.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql15-docs-15.17-150200.5.54.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2003.html * https://www.suse.com/security/cve/CVE-2026-2004.html * https://www.suse.com/security/cve/CVE-2026-2005.html * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258008 * https://bugzilla.suse.com/show_bug.cgi?id=1258009 * https://bugzilla.suse.com/show_bug.cgi?id=1258010 * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:28 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:28 -0000 Subject: SUSE-SU-2026:0769-1: important: Security update for postgresql18 Message-ID: <177256994890.729.8778265073004431117@dd9735431ee0> # Security update for postgresql18 Announcement ID: SUSE-SU-2026:0769-1 Release Date: 2026-03-03T13:11:51Z Rating: important References: * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2006 CVSS scores: * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for postgresql18 fixes the following issue: Update to version 18.3 (bsc#1258754). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-769=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-769=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-769=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-769=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-769=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-769=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-769=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-769=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libpq5-debuginfo-18.3-150200.5.9.1 * libecpg6-18.3-150200.5.9.1 * postgresql18-debuginfo-18.3-150200.5.9.1 * postgresql18-debugsource-18.3-150200.5.9.1 * libecpg6-debuginfo-18.3-150200.5.9.1 * libpq5-18.3-150200.5.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libpq5-32bit-debuginfo-18.3-150200.5.9.1 * libpq5-32bit-18.3-150200.5.9.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:37 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:37 -0000 Subject: SUSE-SU-2026:0768-1: important: Security update for postgresql14 Message-ID: <177256995792.729.8162237812455560074@dd9735431ee0> # Security update for postgresql14 Announcement ID: SUSE-SU-2026:0768-1 Release Date: 2026-03-03T13:10:06Z Rating: important References: * bsc#1258008 * bsc#1258009 * bsc#1258010 * bsc#1258011 * bsc#1258754 Cross-References: * CVE-2026-2003 * CVE-2026-2004 * CVE-2026-2005 * CVE-2026-2006 CVSS scores: * CVE-2026-2003 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2003 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2004 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2004 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves four vulnerabilities and has one security fix can now be installed. ## Description: This update for postgresql14 fixes the following issues: Update to version 14.22 (bsc#1258754). Security issues fixed: * CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008). * CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code execution (bsc#1258009). * CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution (bsc#1258010). * CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution (bsc#1258011). Regression fixes: * the substring() function raises an error "invalid byte sequence for encoding" on non-ASCII text values if the source of that value is a database column (caused by CVE-2026-2006 fix). * a standby may halt and return an error "could not access status of transaction". ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-768=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-768=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-768=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-768=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-768=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-768=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * postgresql14-pltcl-14.22-150200.5.69.1 * postgresql14-contrib-14.22-150200.5.69.1 * postgresql14-server-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-14.22-150200.5.69.1 * postgresql14-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-14.22-150200.5.69.1 * postgresql14-pltcl-debuginfo-14.22-150200.5.69.1 * postgresql14-contrib-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-14.22-150200.5.69.1 * postgresql14-debugsource-14.22-150200.5.69.1 * postgresql14-server-14.22-150200.5.69.1 * postgresql14-plperl-14.22-150200.5.69.1 * postgresql14-plperl-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-14.22-150200.5.69.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * postgresql14-docs-14.22-150200.5.69.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * postgresql14-pltcl-14.22-150200.5.69.1 * postgresql14-contrib-14.22-150200.5.69.1 * postgresql14-server-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-14.22-150200.5.69.1 * postgresql14-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-14.22-150200.5.69.1 * postgresql14-pltcl-debuginfo-14.22-150200.5.69.1 * postgresql14-contrib-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-14.22-150200.5.69.1 * postgresql14-debugsource-14.22-150200.5.69.1 * postgresql14-server-14.22-150200.5.69.1 * postgresql14-plperl-14.22-150200.5.69.1 * postgresql14-plperl-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-14.22-150200.5.69.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * postgresql14-docs-14.22-150200.5.69.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-pltcl-14.22-150200.5.69.1 * postgresql14-contrib-14.22-150200.5.69.1 * postgresql14-server-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-14.22-150200.5.69.1 * postgresql14-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-14.22-150200.5.69.1 * postgresql14-pltcl-debuginfo-14.22-150200.5.69.1 * postgresql14-contrib-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-14.22-150200.5.69.1 * postgresql14-debugsource-14.22-150200.5.69.1 * postgresql14-server-14.22-150200.5.69.1 * postgresql14-plperl-14.22-150200.5.69.1 * postgresql14-plperl-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-14.22-150200.5.69.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * postgresql14-docs-14.22-150200.5.69.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-pltcl-14.22-150200.5.69.1 * postgresql14-contrib-14.22-150200.5.69.1 * postgresql14-llvmjit-14.22-150200.5.69.1 * postgresql14-plpython-14.22-150200.5.69.1 * postgresql14-server-debuginfo-14.22-150200.5.69.1 * postgresql14-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-14.22-150200.5.69.1 * postgresql14-pltcl-debuginfo-14.22-150200.5.69.1 * postgresql14-contrib-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-14.22-150200.5.69.1 * postgresql14-llvmjit-debuginfo-14.22-150200.5.69.1 * postgresql14-llvmjit-devel-14.22-150200.5.69.1 * postgresql14-debugsource-14.22-150200.5.69.1 * postgresql14-server-14.22-150200.5.69.1 * postgresql14-plperl-14.22-150200.5.69.1 * postgresql14-plperl-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-14.22-150200.5.69.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * postgresql14-docs-14.22-150200.5.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * postgresql14-pltcl-14.22-150200.5.69.1 * postgresql14-contrib-14.22-150200.5.69.1 * postgresql14-server-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-14.22-150200.5.69.1 * postgresql14-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-14.22-150200.5.69.1 * postgresql14-pltcl-debuginfo-14.22-150200.5.69.1 * postgresql14-contrib-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-14.22-150200.5.69.1 * postgresql14-debugsource-14.22-150200.5.69.1 * postgresql14-server-14.22-150200.5.69.1 * postgresql14-plperl-14.22-150200.5.69.1 * postgresql14-plperl-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-14.22-150200.5.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * postgresql14-docs-14.22-150200.5.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * postgresql14-pltcl-14.22-150200.5.69.1 * postgresql14-contrib-14.22-150200.5.69.1 * postgresql14-llvmjit-14.22-150200.5.69.1 * postgresql14-plpython-14.22-150200.5.69.1 * postgresql14-server-debuginfo-14.22-150200.5.69.1 * postgresql14-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-14.22-150200.5.69.1 * postgresql14-pltcl-debuginfo-14.22-150200.5.69.1 * postgresql14-contrib-debuginfo-14.22-150200.5.69.1 * postgresql14-plpython-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-14.22-150200.5.69.1 * postgresql14-llvmjit-debuginfo-14.22-150200.5.69.1 * postgresql14-llvmjit-devel-14.22-150200.5.69.1 * postgresql14-debugsource-14.22-150200.5.69.1 * postgresql14-server-14.22-150200.5.69.1 * postgresql14-plperl-14.22-150200.5.69.1 * postgresql14-plperl-debuginfo-14.22-150200.5.69.1 * postgresql14-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-server-devel-debuginfo-14.22-150200.5.69.1 * postgresql14-14.22-150200.5.69.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * postgresql14-docs-14.22-150200.5.69.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2003.html * https://www.suse.com/security/cve/CVE-2026-2004.html * https://www.suse.com/security/cve/CVE-2026-2005.html * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1258008 * https://bugzilla.suse.com/show_bug.cgi?id=1258009 * https://bugzilla.suse.com/show_bug.cgi?id=1258010 * https://bugzilla.suse.com/show_bug.cgi?id=1258011 * https://bugzilla.suse.com/show_bug.cgi?id=1258754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:48 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:48 -0000 Subject: SUSE-SU-2026:0767-1: important: Security update for python311 Message-ID: <177256996889.729.5896172282129131153@dd9735431ee0> # Security update for python311 Announcement ID: SUSE-SU-2026:0767-1 Release Date: 2026-03-03T13:05:58Z Rating: important References: * bsc#1257029 * bsc#1257031 * bsc#1257041 * bsc#1257042 * bsc#1257044 * bsc#1257046 * bsc#1257108 Cross-References: * CVE-2025-11468 * CVE-2025-12781 * CVE-2025-15282 * CVE-2025-15366 * CVE-2025-15367 * CVE-2026-0672 * CVE-2026-0865 CVSS scores: * CVE-2025-11468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-11468 ( NVD ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12781 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12781 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-12781 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12781 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-15282 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-15282 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-15366 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15366 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2025-15366 ( NVD ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-15367 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15367 ( SUSE ): 6.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H * CVE-2025-15367 ( NVD ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0672 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0672 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0865 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2026-0865 ( NVD ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: * CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable characters (bsc#1257029). * CVE-2025-12781: inadequate parameter check can cause data integrity issues (bsc#1257108). * CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046). * CVE-2025-15366: user-controlled command can allow additional commands injected using newlines (bsc#1257044). * CVE-2025-15367: control characters may allow the injection of additional commands (bsc#1257041). * CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel (bsc#1257031). * CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-767=1 openSUSE-SLE-15.6-2026-767=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-767=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-767=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-767=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-767=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-testsuite-3.11.14-150600.3.44.1 * libpython3_11-1_0-3.11.14-150600.3.44.1 * python311-doc-3.11.14-150600.3.44.1 * python311-testsuite-debuginfo-3.11.14-150600.3.44.1 * python311-dbm-3.11.14-150600.3.44.1 * python311-debugsource-3.11.14-150600.3.44.1 * libpython3_11-1_0-debuginfo-3.11.14-150600.3.44.1 * python311-base-debuginfo-3.11.14-150600.3.44.1 * python311-debuginfo-3.11.14-150600.3.44.1 * python311-tk-3.11.14-150600.3.44.1 * python311-doc-devhelp-3.11.14-150600.3.44.1 * python311-tk-debuginfo-3.11.14-150600.3.44.1 * python311-core-debugsource-3.11.14-150600.3.44.1 * python311-3.11.14-150600.3.44.1 * python311-idle-3.11.14-150600.3.44.1 * python311-base-3.11.14-150600.3.44.1 * python311-curses-3.11.14-150600.3.44.1 * python311-curses-debuginfo-3.11.14-150600.3.44.1 * python311-dbm-debuginfo-3.11.14-150600.3.44.1 * python311-tools-3.11.14-150600.3.44.1 * python311-devel-3.11.14-150600.3.44.1 * openSUSE Leap 15.6 (x86_64) * python311-32bit-3.11.14-150600.3.44.1 * python311-base-32bit-debuginfo-3.11.14-150600.3.44.1 * python311-base-32bit-3.11.14-150600.3.44.1 * python311-32bit-debuginfo-3.11.14-150600.3.44.1 * libpython3_11-1_0-32bit-debuginfo-3.11.14-150600.3.44.1 * libpython3_11-1_0-32bit-3.11.14-150600.3.44.1 * openSUSE Leap 15.6 (aarch64_ilp32) * python311-base-64bit-3.11.14-150600.3.44.1 * python311-base-64bit-debuginfo-3.11.14-150600.3.44.1 * libpython3_11-1_0-64bit-debuginfo-3.11.14-150600.3.44.1 * libpython3_11-1_0-64bit-3.11.14-150600.3.44.1 * python311-64bit-3.11.14-150600.3.44.1 * python311-64bit-debuginfo-3.11.14-150600.3.44.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpython3_11-1_0-debuginfo-3.11.14-150600.3.44.1 * python311-base-debuginfo-3.11.14-150600.3.44.1 * python311-base-3.11.14-150600.3.44.1 * libpython3_11-1_0-3.11.14-150600.3.44.1 * python311-core-debugsource-3.11.14-150600.3.44.1 * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-3.11.14-150600.3.44.1 * python311-tk-debuginfo-3.11.14-150600.3.44.1 * python311-idle-3.11.14-150600.3.44.1 * python311-dbm-3.11.14-150600.3.44.1 * python311-debugsource-3.11.14-150600.3.44.1 * python311-curses-3.11.14-150600.3.44.1 * python311-debuginfo-3.11.14-150600.3.44.1 * python311-curses-debuginfo-3.11.14-150600.3.44.1 * python311-core-debugsource-3.11.14-150600.3.44.1 * python311-dbm-debuginfo-3.11.14-150600.3.44.1 * python311-tools-3.11.14-150600.3.44.1 * python311-tk-3.11.14-150600.3.44.1 * python311-devel-3.11.14-150600.3.44.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * python311-3.11.14-150600.3.44.1 * python311-tk-debuginfo-3.11.14-150600.3.44.1 * python311-idle-3.11.14-150600.3.44.1 * python311-dbm-3.11.14-150600.3.44.1 * python311-debugsource-3.11.14-150600.3.44.1 * libpython3_11-1_0-debuginfo-3.11.14-150600.3.44.1 * python311-base-debuginfo-3.11.14-150600.3.44.1 * python311-base-3.11.14-150600.3.44.1 * libpython3_11-1_0-3.11.14-150600.3.44.1 * python311-curses-3.11.14-150600.3.44.1 * python311-debuginfo-3.11.14-150600.3.44.1 * python311-curses-debuginfo-3.11.14-150600.3.44.1 * python311-core-debugsource-3.11.14-150600.3.44.1 * python311-dbm-debuginfo-3.11.14-150600.3.44.1 * python311-tools-3.11.14-150600.3.44.1 * python311-tk-3.11.14-150600.3.44.1 * python311-devel-3.11.14-150600.3.44.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * python311-3.11.14-150600.3.44.1 * python311-tk-debuginfo-3.11.14-150600.3.44.1 * python311-idle-3.11.14-150600.3.44.1 * python311-dbm-3.11.14-150600.3.44.1 * python311-debugsource-3.11.14-150600.3.44.1 * libpython3_11-1_0-debuginfo-3.11.14-150600.3.44.1 * python311-base-debuginfo-3.11.14-150600.3.44.1 * python311-base-3.11.14-150600.3.44.1 * libpython3_11-1_0-3.11.14-150600.3.44.1 * python311-curses-3.11.14-150600.3.44.1 * python311-debuginfo-3.11.14-150600.3.44.1 * python311-curses-debuginfo-3.11.14-150600.3.44.1 * python311-core-debugsource-3.11.14-150600.3.44.1 * python311-dbm-debuginfo-3.11.14-150600.3.44.1 * python311-tools-3.11.14-150600.3.44.1 * python311-tk-3.11.14-150600.3.44.1 * python311-devel-3.11.14-150600.3.44.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11468.html * https://www.suse.com/security/cve/CVE-2025-12781.html * https://www.suse.com/security/cve/CVE-2025-15282.html * https://www.suse.com/security/cve/CVE-2025-15366.html * https://www.suse.com/security/cve/CVE-2025-15367.html * https://www.suse.com/security/cve/CVE-2026-0672.html * https://www.suse.com/security/cve/CVE-2026-0865.html * https://bugzilla.suse.com/show_bug.cgi?id=1257029 * https://bugzilla.suse.com/show_bug.cgi?id=1257031 * https://bugzilla.suse.com/show_bug.cgi?id=1257041 * https://bugzilla.suse.com/show_bug.cgi?id=1257042 * https://bugzilla.suse.com/show_bug.cgi?id=1257044 * https://bugzilla.suse.com/show_bug.cgi?id=1257046 * https://bugzilla.suse.com/show_bug.cgi?id=1257108 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:52 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:52 -0000 Subject: SUSE-SU-2026:0766-1: moderate: Security update for gnome-remote-desktop Message-ID: <177256997239.729.11568602093673281891@dd9735431ee0> # Security update for gnome-remote-desktop Announcement ID: SUSE-SU-2026:0766-1 Release Date: 2026-03-03T13:02:48Z Rating: moderate References: * bsc#1244053 Cross-References: * CVE-2025-5024 CVSS scores: * CVE-2025-5024 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-5024 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H * CVE-2025-5024 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for gnome-remote-desktop fixes the following issue: * CVE-2025-5024: an unauthenticated attacker can exhaust system resources (bsc#1244053). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-766=1 openSUSE-SLE-15.6-2026-766=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gnome-remote-desktop-debugsource-45.1-150600.3.6.1 * gnome-remote-desktop-debuginfo-45.1-150600.3.6.1 * gnome-remote-desktop-45.1-150600.3.6.1 * openSUSE Leap 15.6 (noarch) * gnome-remote-desktop-lang-45.1-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5024.html * https://bugzilla.suse.com/show_bug.cgi?id=1244053 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:32:56 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:32:56 -0000 Subject: SUSE-SU-2026:0765-1: important: Security update for smc-tools Message-ID: <177256997687.729.7689909644382375263@dd9735431ee0> # Security update for smc-tools Announcement ID: SUSE-SU-2026:0765-1 Release Date: 2026-03-03T12:59:51Z Rating: important References: * bsc#1230052 * bsc#1258495 * jsc#PED-14601 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that contains one feature and has two security fixes can now be installed. ## Description: This update for smc-tools fixes the following issues: Update to version 1.8.7 (jsc#PED-14601). Security issues fixed: * VUL-1: smc-tools: predictable /tmp file allows for local denial of service (bsc#1230052, bsc#1258495). Other updates and bugfixes: * smc_rnics: fix regression when PFT not available * smcd/smcr: prevent DoS on statistics workfile present in /tmp/ * man pages: update man page for smc_pnet * smc-tools: display sndbuf/RMB stats only if supported by the kernel * smc_rnics: add support for Network Express RNIC in smc_rnics * smc_rnics: add PFT and VF columns to smc_rnics output * libnetlink: fix function declaration to use a void prototype * smc_rnics: update smc_chk to extract PNetID from column 9 * man pages: update man page for --rawids option and PFT and VF columns * smc_rnics: fix missing PPrt values in smc_rnics -r output ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-765=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-765=1 ## Package List: * Basesystem Module 15-SP7 (s390x) * smc-tools-1.8.7-150700.3.3.1 * smc-tools-completion-1.8.7-150700.3.3.1 * smc-tools-debuginfo-1.8.7-150700.3.3.1 * smc-tools-debugsource-1.8.7-150700.3.3.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le) * smc-tools-1.8.7-150700.3.3.1 * smc-tools-completion-1.8.7-150700.3.3.1 * smc-tools-debuginfo-1.8.7-150700.3.3.1 * smc-tools-debugsource-1.8.7-150700.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230052 * https://bugzilla.suse.com/show_bug.cgi?id=1258495 * https://jira.suse.com/browse/PED-14601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:33:13 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:33:13 -0000 Subject: SUSE-SU-2026:0763-1: important: Security update for freerdp Message-ID: <177256999397.729.5904421040158079736@dd9735431ee0> # Security update for freerdp Announcement ID: SUSE-SU-2026:0763-1 Release Date: 2026-03-03T12:49:14Z Rating: important References: * bsc#1257981 * bsc#1257982 * bsc#1257983 * bsc#1257984 * bsc#1257985 * bsc#1257986 * bsc#1257987 * bsc#1257988 * bsc#1257989 * bsc#1257990 * bsc#1257991 Cross-References: * CVE-2026-24491 * CVE-2026-24675 * CVE-2026-24676 * CVE-2026-24677 * CVE-2026-24678 * CVE-2026-24679 * CVE-2026-24680 * CVE-2026-24681 * CVE-2026-24682 * CVE-2026-24683 * CVE-2026-24684 CVSS scores: * CVE-2026-24491 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24491 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24491 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24491 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24675 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24675 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24675 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24675 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24676 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24676 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24676 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24676 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24677 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24677 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24677 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24677 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2026-24678 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24678 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24678 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24678 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24679 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24679 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24679 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24679 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2026-24680 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24680 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24680 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24680 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24681 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2026-24681 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24681 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24681 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24682 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24682 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24682 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24682 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24683 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24683 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24683 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24683 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24684 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24684 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24684 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24684 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for freerdp fixes the following issues: * CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981). * CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982). * CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983). * CVE-2026-24677: heap-buffer-overflow in ecam_encoder_compress_h264 (bsc#1257984). * CVE-2026-24678: heap-use-after-free in cam_v4l_stream_capture_thread (bsc#1257985). * CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986). * CVE-2026-24680: heap-use-after-free in update_pointer_new(SDL) (bsc#1257987). * CVE-2026-24681: heap-use-after-free in urb_bulk_transfer_cb (bsc#1257988). * CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989). * CVE-2026-24683: heap-use-after-free in ainput_send_input_event (bsc#1257990). * CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-763=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-763=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * freerdp-proxy-3.10.3-150700.3.6.1 * libuwac0-0-3.10.3-150700.3.6.1 * freerdp-debugsource-3.10.3-150700.3.6.1 * freerdp-wayland-debuginfo-3.10.3-150700.3.6.1 * freerdp-server-3.10.3-150700.3.6.1 * freerdp-server-debuginfo-3.10.3-150700.3.6.1 * freerdp-3.10.3-150700.3.6.1 * freerdp-proxy-debuginfo-3.10.3-150700.3.6.1 * freerdp-debuginfo-3.10.3-150700.3.6.1 * freerdp-wayland-3.10.3-150700.3.6.1 * freerdp-devel-3.10.3-150700.3.6.1 * libuwac0-0-debuginfo-3.10.3-150700.3.6.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * winpr-devel-3.10.3-150700.3.6.1 * libfreerdp-server-proxy3-3-3.10.3-150700.3.6.1 * freerdp-server-debuginfo-3.10.3-150700.3.6.1 * librdtk0-0-debuginfo-3.10.3-150700.3.6.1 * libfreerdp3-3-debuginfo-3.10.3-150700.3.6.1 * librdtk0-0-3.10.3-150700.3.6.1 * freerdp-3.10.3-150700.3.6.1 * freerdp-proxy-debuginfo-3.10.3-150700.3.6.1 * freerdp-proxy-plugins-3.10.3-150700.3.6.1 * freerdp-proxy-3.10.3-150700.3.6.1 * libwinpr3-3-3.10.3-150700.3.6.1 * libfreerdp-server-proxy3-3-debuginfo-3.10.3-150700.3.6.1 * freerdp-debuginfo-3.10.3-150700.3.6.1 * freerdp-debugsource-3.10.3-150700.3.6.1 * freerdp-server-3.10.3-150700.3.6.1 * freerdp-sdl-debuginfo-3.10.3-150700.3.6.1 * libwinpr3-3-debuginfo-3.10.3-150700.3.6.1 * libfreerdp3-3-3.10.3-150700.3.6.1 * freerdp-proxy-plugins-debuginfo-3.10.3-150700.3.6.1 * freerdp-sdl-3.10.3-150700.3.6.1 * freerdp-devel-3.10.3-150700.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2026-24491.html * https://www.suse.com/security/cve/CVE-2026-24675.html * https://www.suse.com/security/cve/CVE-2026-24676.html * https://www.suse.com/security/cve/CVE-2026-24677.html * https://www.suse.com/security/cve/CVE-2026-24678.html * https://www.suse.com/security/cve/CVE-2026-24679.html * https://www.suse.com/security/cve/CVE-2026-24680.html * https://www.suse.com/security/cve/CVE-2026-24681.html * https://www.suse.com/security/cve/CVE-2026-24682.html * https://www.suse.com/security/cve/CVE-2026-24683.html * https://www.suse.com/security/cve/CVE-2026-24684.html * https://bugzilla.suse.com/show_bug.cgi?id=1257981 * https://bugzilla.suse.com/show_bug.cgi?id=1257982 * https://bugzilla.suse.com/show_bug.cgi?id=1257983 * https://bugzilla.suse.com/show_bug.cgi?id=1257984 * https://bugzilla.suse.com/show_bug.cgi?id=1257985 * https://bugzilla.suse.com/show_bug.cgi?id=1257986 * https://bugzilla.suse.com/show_bug.cgi?id=1257987 * https://bugzilla.suse.com/show_bug.cgi?id=1257988 * https://bugzilla.suse.com/show_bug.cgi?id=1257989 * https://bugzilla.suse.com/show_bug.cgi?id=1257990 * https://bugzilla.suse.com/show_bug.cgi?id=1257991 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:33:31 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:33:31 -0000 Subject: SUSE-SU-2026:0762-1: important: Security update for freerdp Message-ID: <177257001131.729.13821311294301104506@dd9735431ee0> # Security update for freerdp Announcement ID: SUSE-SU-2026:0762-1 Release Date: 2026-03-03T12:41:22Z Rating: important References: * bsc#1256721 * bsc#1256723 * bsc#1256943 * bsc#1256945 * bsc#1256947 * bsc#1257981 * bsc#1257982 * bsc#1257983 * bsc#1257986 * bsc#1257989 * bsc#1257991 Cross-References: * CVE-2026-22855 * CVE-2026-22857 * CVE-2026-23533 * CVE-2026-23732 * CVE-2026-23884 * CVE-2026-24491 * CVE-2026-24675 * CVE-2026-24676 * CVE-2026-24679 * CVE-2026-24682 * CVE-2026-24684 CVSS scores: * CVE-2026-22855 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22855 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2026-22855 ( NVD ): 5.6 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-22855 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2026-22857 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-22857 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-22857 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-22857 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23533 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23533 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-23533 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23732 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-23732 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2026-23732 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23732 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23884 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23884 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-23884 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-24491 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24491 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24491 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24491 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24675 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24675 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24675 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24675 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24676 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24676 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24676 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24676 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24679 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24679 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24679 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24679 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2026-24682 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24682 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24682 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24682 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24684 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-24684 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-24684 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-24684 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for freerdp fixes the following issues: * CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721). * CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723). * CVE-2026-23533: improper validation can lead to heap buffer overflow in `clear_decompress_residual_data` (bsc#1256943). * CVE-2026-23732: improper validation can lead to heap buffer overflow in `Glyph_Alloc` (bsc#1256945). * CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947). * CVE-2026-24491: heap-use-after-free in video_timer (bsc#1257981). * CVE-2026-24675: heap-use-after-free in urb_select_interface (bsc#1257982). * CVE-2026-24676: heap-use-after-free in audio_format_compatible (bsc#1257983). * CVE-2026-24679: heap-buffer-overflow in urb_select_interface (bsc#1257986). * CVE-2026-24682: heap-buffer-overflow in audio_formats_free (bsc#1257989). * CVE-2026-24684: heap-use-after-free in play_thread (bsc#1257991). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-762=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-762=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * winpr2-devel-2.1.2-12.57.1 * freerdp-devel-2.1.2-12.57.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * winpr2-devel-2.1.2-12.57.1 * freerdp-devel-2.1.2-12.57.1 ## References: * https://www.suse.com/security/cve/CVE-2026-22855.html * https://www.suse.com/security/cve/CVE-2026-22857.html * https://www.suse.com/security/cve/CVE-2026-23533.html * https://www.suse.com/security/cve/CVE-2026-23732.html * https://www.suse.com/security/cve/CVE-2026-23884.html * https://www.suse.com/security/cve/CVE-2026-24491.html * https://www.suse.com/security/cve/CVE-2026-24675.html * https://www.suse.com/security/cve/CVE-2026-24676.html * https://www.suse.com/security/cve/CVE-2026-24679.html * https://www.suse.com/security/cve/CVE-2026-24682.html * https://www.suse.com/security/cve/CVE-2026-24684.html * https://bugzilla.suse.com/show_bug.cgi?id=1256721 * https://bugzilla.suse.com/show_bug.cgi?id=1256723 * https://bugzilla.suse.com/show_bug.cgi?id=1256943 * https://bugzilla.suse.com/show_bug.cgi?id=1256945 * https://bugzilla.suse.com/show_bug.cgi?id=1256947 * https://bugzilla.suse.com/show_bug.cgi?id=1257981 * https://bugzilla.suse.com/show_bug.cgi?id=1257982 * https://bugzilla.suse.com/show_bug.cgi?id=1257983 * https://bugzilla.suse.com/show_bug.cgi?id=1257986 * https://bugzilla.suse.com/show_bug.cgi?id=1257989 * https://bugzilla.suse.com/show_bug.cgi?id=1257991 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:33:41 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:33:41 -0000 Subject: SUSE-SU-2026:0761-1: important: Security update for freerdp Message-ID: <177257002198.729.17141805857507044443@dd9735431ee0> # Security update for freerdp Announcement ID: SUSE-SU-2026:0761-1 Release Date: 2026-03-03T12:40:27Z Rating: important References: * bsc#1256721 * bsc#1256723 * bsc#1256943 * bsc#1256945 * bsc#1256946 * bsc#1256947 Cross-References: * CVE-2026-22855 * CVE-2026-22857 * CVE-2026-23533 * CVE-2026-23732 * CVE-2026-23883 * CVE-2026-23884 CVSS scores: * CVE-2026-22855 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22855 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2026-22855 ( NVD ): 5.6 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-22855 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2026-22857 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-22857 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-22857 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-22857 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23533 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23533 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-23533 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23533 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23732 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-23732 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2026-23732 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23732 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23883 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23883 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-23883 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23883 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23884 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23884 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-23884 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-23884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves six vulnerabilities can now be installed. ## Description: This update for freerdp fixes the following issues: * CVE-2026-22855: heap-buffer-overflow in smartcard_unpack_set_attrib_call (bsc#1256721). * CVE-2026-22857: heap-use-after-free in irp_thread_func (bsc#1256723). * CVE-2026-23533: improper validation can lead to heap buffer overflow in `clear_decompress_residual_data` (bsc#1256943). * CVE-2026-23732: improper validation can lead to heap buffer overflow in `Glyph_Alloc` (bsc#1256945). * CVE-2026-23883: use-after-free when `update_pointer_color` and `freerdp_image_copy_from_pointer_data` fail (bsc#1256946). * CVE-2026-23884: use-after-free in `gdi_set_bounds` (bsc#1256947). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-761=1 SUSE-2026-761=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-761=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libfreerdp2-2-2.11.2-150600.4.12.1 * freerdp-devel-2.11.2-150600.4.12.1 * freerdp-proxy-debuginfo-2.11.2-150600.4.12.1 * libuwac0-0-debuginfo-2.11.2-150600.4.12.1 * freerdp-proxy-2.11.2-150600.4.12.1 * libwinpr2-2-debuginfo-2.11.2-150600.4.12.1 * freerdp-2.11.2-150600.4.12.1 * uwac0-0-devel-2.11.2-150600.4.12.1 * freerdp-wayland-debuginfo-2.11.2-150600.4.12.1 * winpr-devel-2.11.2-150600.4.12.1 * freerdp-debuginfo-2.11.2-150600.4.12.1 * freerdp-server-2.11.2-150600.4.12.1 * libuwac0-0-2.11.2-150600.4.12.1 * libfreerdp2-2-debuginfo-2.11.2-150600.4.12.1 * freerdp-wayland-2.11.2-150600.4.12.1 * libwinpr2-2-2.11.2-150600.4.12.1 * freerdp-debugsource-2.11.2-150600.4.12.1 * freerdp-server-debuginfo-2.11.2-150600.4.12.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * uwac0-0-devel-2.11.2-150600.4.12.1 * freerdp-debuginfo-2.11.2-150600.4.12.1 * freerdp-debugsource-2.11.2-150600.4.12.1 ## References: * https://www.suse.com/security/cve/CVE-2026-22855.html * https://www.suse.com/security/cve/CVE-2026-22857.html * https://www.suse.com/security/cve/CVE-2026-23533.html * https://www.suse.com/security/cve/CVE-2026-23732.html * https://www.suse.com/security/cve/CVE-2026-23883.html * https://www.suse.com/security/cve/CVE-2026-23884.html * https://bugzilla.suse.com/show_bug.cgi?id=1256721 * https://bugzilla.suse.com/show_bug.cgi?id=1256723 * https://bugzilla.suse.com/show_bug.cgi?id=1256943 * https://bugzilla.suse.com/show_bug.cgi?id=1256945 * https://bugzilla.suse.com/show_bug.cgi?id=1256946 * https://bugzilla.suse.com/show_bug.cgi?id=1256947 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:33:46 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:33:46 -0000 Subject: SUSE-SU-2026:0760-1: critical: Security update for go1.25-openssl Message-ID: <177257002667.729.17061511565830929664@dd9735431ee0> # Security update for go1.25-openssl Announcement ID: SUSE-SU-2026:0760-1 Release Date: 2026-03-03T12:38:14Z Rating: critical References: * bsc#1256818 * bsc#1257692 * jsc#SLE-18320 Cross-References: * CVE-2025-61732 * CVE-2025-68121 CVSS scores: * CVE-2025-61732 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-61732 ( SUSE ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61732 ( NVD ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-68121 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-68121 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and contains one feature can now be installed. ## Description: This update for go1.25-openssl fixes the following issues: Update to version 1.25.7. Security issues fixed: * CVE-2025-61732: cmd/go: discrepancy between Go and C/C++ comment parsing allows for C code smuggling (bsc#1257692). * CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818). Other updates and bugfixes: * version update to 1.25.7: * go#75844 cmd/compile: OOM killed on linux/arm64 * go#77323 crypto/x509: single-label excluded DNS name constraints incorrectly match all wildcard SANs * go#77425 crypto/tls: CL 737700 broke session resumption on macOS ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-760=1 openSUSE-SLE-15.6-2026-760=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-760=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-760=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-760=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * go1.25-openssl-doc-1.25.7-150600.13.12.1 * go1.25-openssl-debuginfo-1.25.7-150600.13.12.1 * go1.25-openssl-1.25.7-150600.13.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.25-openssl-race-1.25.7-150600.13.12.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.25-openssl-doc-1.25.7-150600.13.12.1 * go1.25-openssl-debuginfo-1.25.7-150600.13.12.1 * go1.25-openssl-1.25.7-150600.13.12.1 * go1.25-openssl-race-1.25.7-150600.13.12.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-openssl-doc-1.25.7-150600.13.12.1 * go1.25-openssl-debuginfo-1.25.7-150600.13.12.1 * go1.25-openssl-1.25.7-150600.13.12.1 * go1.25-openssl-race-1.25.7-150600.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * go1.25-openssl-doc-1.25.7-150600.13.12.1 * go1.25-openssl-debuginfo-1.25.7-150600.13.12.1 * go1.25-openssl-1.25.7-150600.13.12.1 * go1.25-openssl-race-1.25.7-150600.13.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61732.html * https://www.suse.com/security/cve/CVE-2025-68121.html * https://bugzilla.suse.com/show_bug.cgi?id=1256818 * https://bugzilla.suse.com/show_bug.cgi?id=1257692 * https://jira.suse.com/browse/SLE-18320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:33:50 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:33:50 -0000 Subject: SUSE-SU-2026:0759-1: important: Security update for busybox Message-ID: <177257003098.729.1491216166417843720@dd9735431ee0> # Security update for busybox Announcement ID: SUSE-SU-2026:0759-1 Release Date: 2026-03-03T12:16:50Z Rating: important References: * bsc#1258163 * bsc#1258167 Cross-References: * CVE-2026-26157 * CVE-2026-26158 CVSS scores: * CVE-2026-26157 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-26157 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-26157 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-26158 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-26158 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-26158 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for busybox fixes the following issues: * CVE-2026-26157: Arbitrary file overwrite and potential code execution via incomplete path sanitization (bsc#1258163). * CVE-2026-26158: Arbitrary file modification and privilege escalation via unvalidated tar archive entries (bsc#1258167). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-759=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * busybox-1.37.0-150700.18.15.1 * busybox-static-1.37.0-150700.18.15.1 ## References: * https://www.suse.com/security/cve/CVE-2026-26157.html * https://www.suse.com/security/cve/CVE-2026-26158.html * https://bugzilla.suse.com/show_bug.cgi?id=1258163 * https://bugzilla.suse.com/show_bug.cgi?id=1258167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Mar 3 20:33:55 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 03 Mar 2026 20:33:55 -0000 Subject: SUSE-SU-2026:0758-1: important: Security update for busybox Message-ID: <177257003513.729.4049730176898476189@dd9735431ee0> # Security update for busybox Announcement ID: SUSE-SU-2026:0758-1 Release Date: 2026-03-03T12:16:21Z Rating: important References: * bsc#1258163 * bsc#1258167 Cross-References: * CVE-2026-26157 * CVE-2026-26158 CVSS scores: * CVE-2026-26157 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-26157 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-26157 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-26158 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-26158 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-26158 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for busybox fixes the following issues: * CVE-2026-26157: Arbitrary file overwrite and potential code execution via incomplete path sanitization (bsc#1258163). * CVE-2026-26158: Arbitrary file modification and privilege escalation via unvalidated tar archive entries (bsc#1258167). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-758=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-758=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-758=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-758=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-758=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-758=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-758=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-758=1 ## Package List: * openSUSE Leap 15.5 (noarch) * busybox-policycoreutils-1.37.0-150500.7.11.1 * busybox-vi-1.37.0-150500.7.11.1 * busybox-psmisc-1.37.0-150500.7.11.1 * busybox-attr-1.37.0-150500.7.11.1 * busybox-telnet-1.37.0-150500.7.11.1 * busybox-cpio-1.37.0-150500.7.11.1 * busybox-dos2unix-1.37.0-150500.7.11.1 * busybox-ed-1.37.0-150500.7.11.1 * busybox-sendmail-1.37.0-150500.7.11.1 * busybox-vlan-1.37.0-150500.7.11.1 * busybox-misc-1.37.0-150500.7.11.1 * busybox-coreutils-1.37.0-150500.7.11.1 * busybox-sed-1.37.0-150500.7.11.1 * busybox-traceroute-1.37.0-150500.7.11.1 * busybox-diffutils-1.37.0-150500.7.11.1 * busybox-unzip-1.37.0-150500.7.11.1 * busybox-bzip2-1.37.0-150500.7.11.1 * busybox-sharutils-1.37.0-150500.7.11.1 * busybox-links-1.37.0-150500.7.11.1 * busybox-syslogd-1.37.0-150500.7.11.1 * busybox-kbd-1.37.0-150500.7.11.1 * busybox-util-linux-1.37.0-150500.7.11.1 * busybox-tftp-1.37.0-150500.7.11.1 * busybox-wget-1.37.0-150500.7.11.1 * busybox-patch-1.37.0-150500.7.11.1 * busybox-tunctl-1.37.0-150500.7.11.1 * busybox-less-1.37.0-150500.7.11.1 * busybox-hexedit-1.37.0-150500.7.11.1 * busybox-time-1.37.0-150500.7.11.1 * busybox-sha3sum-1.37.0-150500.7.11.1 * busybox-net-tools-1.37.0-150500.7.11.1 * busybox-kmod-1.37.0-150500.7.11.1 * busybox-sh-1.37.0-150500.7.11.1 * busybox-ncurses-utils-1.37.0-150500.7.11.1 * busybox-netcat-1.37.0-150500.7.11.1 * busybox-which-1.37.0-150500.7.11.1 * busybox-tar-1.37.0-150500.7.11.1 * busybox-selinux-tools-1.37.0-150500.7.11.1 * busybox-bc-1.37.0-150500.7.11.1 * busybox-gzip-1.37.0-150500.7.11.1 * busybox-iproute2-1.37.0-150500.7.11.1 * busybox-man-1.37.0-150500.7.11.1 * busybox-whois-1.37.0-150500.7.11.1 * busybox-procps-1.37.0-150500.7.11.1 * busybox-adduser-1.37.0-150500.7.11.1 * busybox-udhcpc-1.37.0-150500.7.11.1 * busybox-hostname-1.37.0-150500.7.11.1 * busybox-xz-1.37.0-150500.7.11.1 * busybox-findutils-1.37.0-150500.7.11.1 * busybox-gawk-1.37.0-150500.7.11.1 * busybox-bind-utils-1.37.0-150500.7.11.1 * busybox-grep-1.37.0-150500.7.11.1 * busybox-iputils-1.37.0-150500.7.11.1 * busybox-sysvinit-tools-1.37.0-150500.7.11.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * busybox-debugsource-1.37.0-150500.10.17.1 * busybox-debuginfo-1.37.0-150500.10.17.1 * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * busybox-static-debuginfo-1.37.0-150500.10.17.1 * busybox-testsuite-1.37.0-150500.10.17.1 * openSUSE Leap 15.5 (aarch64 x86_64 i586) * busybox-warewulf3-1.37.0-150500.10.17.1 * busybox-warewulf3-debuginfo-1.37.0-150500.10.17.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * busybox-testsuite-1.37.0-150500.10.17.1 * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * openSUSE Leap 15.6 (noarch) * busybox-policycoreutils-1.37.0-150500.7.11.1 * busybox-vi-1.37.0-150500.7.11.1 * busybox-psmisc-1.37.0-150500.7.11.1 * busybox-attr-1.37.0-150500.7.11.1 * busybox-telnet-1.37.0-150500.7.11.1 * busybox-cpio-1.37.0-150500.7.11.1 * busybox-dos2unix-1.37.0-150500.7.11.1 * busybox-ed-1.37.0-150500.7.11.1 * busybox-sendmail-1.37.0-150500.7.11.1 * busybox-vlan-1.37.0-150500.7.11.1 * busybox-misc-1.37.0-150500.7.11.1 * busybox-coreutils-1.37.0-150500.7.11.1 * busybox-sed-1.37.0-150500.7.11.1 * busybox-traceroute-1.37.0-150500.7.11.1 * busybox-diffutils-1.37.0-150500.7.11.1 * busybox-unzip-1.37.0-150500.7.11.1 * busybox-bzip2-1.37.0-150500.7.11.1 * busybox-sharutils-1.37.0-150500.7.11.1 * busybox-links-1.37.0-150500.7.11.1 * busybox-syslogd-1.37.0-150500.7.11.1 * busybox-kbd-1.37.0-150500.7.11.1 * busybox-util-linux-1.37.0-150500.7.11.1 * busybox-tftp-1.37.0-150500.7.11.1 * busybox-wget-1.37.0-150500.7.11.1 * busybox-patch-1.37.0-150500.7.11.1 * busybox-tunctl-1.37.0-150500.7.11.1 * busybox-less-1.37.0-150500.7.11.1 * busybox-hexedit-1.37.0-150500.7.11.1 * busybox-time-1.37.0-150500.7.11.1 * busybox-sha3sum-1.37.0-150500.7.11.1 * busybox-net-tools-1.37.0-150500.7.11.1 * busybox-kmod-1.37.0-150500.7.11.1 * busybox-sh-1.37.0-150500.7.11.1 * busybox-ncurses-utils-1.37.0-150500.7.11.1 * busybox-netcat-1.37.0-150500.7.11.1 * busybox-which-1.37.0-150500.7.11.1 * busybox-tar-1.37.0-150500.7.11.1 * busybox-selinux-tools-1.37.0-150500.7.11.1 * busybox-bc-1.37.0-150500.7.11.1 * busybox-gzip-1.37.0-150500.7.11.1 * busybox-iproute2-1.37.0-150500.7.11.1 * busybox-man-1.37.0-150500.7.11.1 * busybox-whois-1.37.0-150500.7.11.1 * busybox-procps-1.37.0-150500.7.11.1 * busybox-adduser-1.37.0-150500.7.11.1 * busybox-udhcpc-1.37.0-150500.7.11.1 * busybox-hostname-1.37.0-150500.7.11.1 * busybox-xz-1.37.0-150500.7.11.1 * busybox-findutils-1.37.0-150500.7.11.1 * busybox-gawk-1.37.0-150500.7.11.1 * busybox-bind-utils-1.37.0-150500.7.11.1 * busybox-grep-1.37.0-150500.7.11.1 * busybox-iputils-1.37.0-150500.7.11.1 * busybox-sysvinit-tools-1.37.0-150500.7.11.1 * openSUSE Leap 15.6 (aarch64 x86_64) * busybox-warewulf3-1.37.0-150500.10.17.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * busybox-static-1.37.0-150500.10.17.1 * busybox-1.37.0-150500.10.17.1 ## References: * https://www.suse.com/security/cve/CVE-2026-26157.html * https://www.suse.com/security/cve/CVE-2026-26158.html * https://bugzilla.suse.com/show_bug.cgi?id=1258163 * https://bugzilla.suse.com/show_bug.cgi?id=1258167 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 08:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 08:30:14 -0000 Subject: SUSE-RU-2026:0791-1: moderate: Recommended update for gcc15 Message-ID: <177261301451.1335.9199257121249937041@322c488a20e1> # Recommended update for gcc15 Announcement ID: SUSE-RU-2026:0791-1 Release Date: 2026-03-03T16:01:16Z Rating: moderate References: * bsc#1257463 Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP4 * SUSE Linux Enterprise Desktop 15 SP5 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP7 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for gcc15 fixes the following issues: * Fix bogus expression simplification (bsc#1257463) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-791=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 SUSE-SLE-Product- SLES_SAP-15-SP4-2026-791=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2026-791=1 SUSE-SLE-Product- SLES_SAP-15-SP5-2026-791=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2026-791=1 SUSE-SLE-Product- SLES_SAP-15-SP6-2026-791=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-791=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-791=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-791=1 * SUSE Linux Enterprise High Performance Computing 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 * SUSE Linux Enterprise Server 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 * SUSE Linux Enterprise Desktop 15 SP4 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-INSTALLER-15-SP4-2026-791=1 * SUSE Linux Enterprise High Performance Computing 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2026-791=1 * SUSE Linux Enterprise Server 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2026-791=1 * SUSE Linux Enterprise Desktop 15 SP5 zypper in -t patch SUSE-SLE-INSTALLER-15-SP5-2026-791=1 * SUSE Linux Enterprise High Performance Computing 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2026-791=1 * SUSE Linux Enterprise Server 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2026-791=1 * SUSE Linux Enterprise Desktop 15 SP6 zypper in -t patch SUSE-SLE-INSTALLER-15-SP6-2026-791=1 * SUSE Linux Enterprise Server 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2026-791=1 * SUSE Linux Enterprise High Performance Computing 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2026-791=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2026-791=1 * SUSE Linux Enterprise Desktop 15 SP7 zypper in -t patch SUSE-SLE-INSTALLER-15-SP7-2026-791=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-791=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-791=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-791=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-791=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-791=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-791=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-791=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-791=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-791=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-791=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-791=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-791=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-791=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-791=1 ## Package List: * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64) * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * cross-riscv64-elf-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * libgo24-15.2.0+git10201-150000.1.9.1 * libm2iso20-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * cross-arm-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-rx-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-ada-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * libm2log20-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libgo24-debuginfo-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-arm-none-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * cross-riscv64-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2min20-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cross-hppa-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-pru-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * libm2cor20-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-avr-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-bpf-gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * cross-avr-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * gcc15-obj-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-arm-gcc15-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * gcc15-m2-15.2.0+git10201-150000.1.9.1 * gcc15-ada-15.2.0+git10201-150000.1.9.1 * gcc15-m2-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-riscv64-elf-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-rx-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * cross-arm-gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libm2pim20-15.2.0+git10201-150000.1.9.1 * libm2pim20-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-hppa-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * gcc15-go-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-avr-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * cross-arm-none-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * gcc15-obj-c++-15.2.0+git10201-150000.1.9.1 * libm2log20-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-objc-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * libm2cor20-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-arm-none-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-riscv64-elf-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libada15-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-pru-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-objc-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * gcc15-go-15.2.0+git10201-150000.1.9.1 * libada15-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * cross-pru-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * libm2iso20-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-testresults-15.2.0+git10201-150000.1.9.1 * libm2min20-15.2.0+git10201-150000.1.9.1 * cross-bpf-gcc15-15.2.0+git10201-150000.1.9.1 * cross-riscv64-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * cross-hppa-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-rx-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-bpf-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-riscv64-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * cross-aarch64-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-aarch64-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * cross-aarch64-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (x86_64) * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (aarch64 s390x x86_64) * libgphobos6-15.2.0+git10201-150000.1.9.1 * libgphobos6-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-ppc64-gcc15-15.2.0+git10201-150000.1.9.1 * cross-ppc64le-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-d-15.2.0+git10201-150000.1.9.1 * cross-ppc64le-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * cross-ppc64le-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * libgdruntime6-15.2.0+git10201-150000.1.9.1 * cross-ppc64-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgdruntime6-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-ppc64-gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-d-debuginfo-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * cross-s390x-gcc15-bootstrap-15.2.0+git10201-150000.1.9.1 * cross-s390x-gcc15-bootstrap-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-s390x-gcc15-bootstrap-debugsource-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (s390x x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libgo24-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2iso20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2min20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2cor20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2pim20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2pim20-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgdruntime6-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-objc-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgdruntime6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-ada-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-d-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libada15-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2log20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libgphobos6-32bit-15.2.0+git10201-150000.1.9.1 * libgphobos6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libgo24-32bit-15.2.0+git10201-150000.1.9.1 * libada15-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-obj-c++-32bit-15.2.0+git10201-150000.1.9.1 * libm2log20-32bit-15.2.0+git10201-150000.1.9.1 * libm2min20-32bit-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libm2cor20-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-m2-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-go-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * libm2iso20-32bit-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x) * cross-x86_64-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * cross-x86_64-gcc15-15.2.0+git10201-150000.1.9.1 * cross-x86_64-gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP4 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP4 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Desktop 15 SP4 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Manager Proxy 4.3 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP5 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP5 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Desktop 15 SP5 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP6 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP6 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Desktop 15 SP6 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP7 (aarch64 ppc64le s390x x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing 15 SP7 (aarch64 x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 (ppc64le x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Desktop 15 SP7 (x86_64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * Basesystem Module 15-SP7 (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * Basesystem Module 15-SP7 (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * Basesystem Module 15-SP7 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * Development Tools Module 15-SP7 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * Development Tools Module 15-SP7 (ppc64le x86_64) * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * Development Tools Module 15-SP7 (x86_64) * cross-nvptx-gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * cross-nvptx-newlib15-devel-15.2.0+git10201-150000.1.9.1 * cross-nvptx-gcc15-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * gcc15-ada-15.2.0+git10201-150000.1.9.1 * gcc15-m2-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-obj-c++-15.2.0+git10201-150000.1.9.1 * libm2log20-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2min20-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-objc-15.2.0+git10201-150000.1.9.1 * libm2iso20-15.2.0+git10201-150000.1.9.1 * libgo24-15.2.0+git10201-150000.1.9.1 * libm2pim20-15.2.0+git10201-150000.1.9.1 * libm2cor20-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2pim20-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2cor20-15.2.0+git10201-150000.1.9.1 * libada15-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-objc-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-go-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-ada-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-go-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-obj-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libada15-15.2.0+git10201-150000.1.9.1 * libm2log20-15.2.0+git10201-150000.1.9.1 * libm2iso20-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2min20-15.2.0+git10201-150000.1.9.1 * gcc15-m2-15.2.0+git10201-150000.1.9.1 * libgo24-debuginfo-15.2.0+git10201-150000.1.9.1 * SUSE Package Hub 15 15-SP7 (aarch64 s390x x86_64) * libgphobos6-15.2.0+git10201-150000.1.9.1 * gcc15-d-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-d-15.2.0+git10201-150000.1.9.1 * libgdruntime6-15.2.0+git10201-150000.1.9.1 * libgphobos6-debuginfo-15.2.0+git10201-150000.1.9.1 * libgdruntime6-debuginfo-15.2.0+git10201-150000.1.9.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libgo24-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2iso20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2min20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2pim20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2cor20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2pim20-32bit-15.2.0+git10201-150000.1.9.1 * libgdruntime6-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-objc-32bit-15.2.0+git10201-150000.1.9.1 * libgdruntime6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-ada-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-d-32bit-15.2.0+git10201-150000.1.9.1 * libada15-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libm2log20-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgphobos6-32bit-15.2.0+git10201-150000.1.9.1 * libgphobos6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgo24-32bit-15.2.0+git10201-150000.1.9.1 * libada15-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-obj-c++-32bit-15.2.0+git10201-150000.1.9.1 * libm2log20-32bit-15.2.0+git10201-150000.1.9.1 * libm2min20-32bit-15.2.0+git10201-150000.1.9.1 * libm2cor20-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-m2-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-go-32bit-15.2.0+git10201-150000.1.9.1 * libm2iso20-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * libstdc++6-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * gcc15-locale-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * gcc15-c++-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * gcc15-info-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * gcc15-c++-15.2.0+git10201-150000.1.9.1 * libtsan2-15.2.0+git10201-150000.1.9.1 * libitm1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-debuginfo-15.2.0+git10201-150000.1.9.1 * libubsan1-15.2.0+git10201-150000.1.9.1 * libgcc_s1-15.2.0+git10201-150000.1.9.1 * liblsan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-locale-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-15.2.0+git10201-150000.1.9.1 * cpp15-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-15.2.0+git10201-150000.1.9.1 * libgcc_s1-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-15.2.0+git10201-150000.1.9.1 * gcc15-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libgfortran5-15.2.0+git10201-150000.1.9.1 * cpp15-15.2.0+git10201-150000.1.9.1 * libitm1-15.2.0+git10201-150000.1.9.1 * libobjc4-15.2.0+git10201-150000.1.9.1 * gcc15-debugsource-15.2.0+git10201-150000.1.9.1 * gcc15-debuginfo-15.2.0+git10201-150000.1.9.1 * libgfortran5-debuginfo-15.2.0+git10201-150000.1.9.1 * liblsan0-15.2.0+git10201-150000.1.9.1 * libgomp1-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-15.2.0+git10201-150000.1.9.1 * gcc15-PIE-15.2.0+git10201-150000.1.9.1 * libasan8-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-15.2.0+git10201-150000.1.9.1 * libstdc++6-debuginfo-15.2.0+git10201-150000.1.9.1 * libtsan2-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-150000.1.9.1 * libhwasan0-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-15.2.0+git10201-150000.1.9.1 * libquadmath0-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le s390x x86_64) * libubsan1-debuginfo-15.2.0+git10201-150000.1.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libobjc4-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libquadmath0-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-15.2.0+git10201-150000.1.9.1 * libitm1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libgomp1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-fortran-32bit-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * gcc15-c++-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-15.2.0+git10201-150000.1.9.1 * libatomic1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-devel-gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libgcc_s1-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-pp-32bit-15.2.0+git10201-150000.1.9.1 * libubsan1-32bit-15.2.0+git10201-150000.1.9.1 * libquadmath0-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libstdc++6-32bit-15.2.0+git10201-150000.1.9.1 * libgfortran5-32bit-15.2.0+git10201-150000.1.9.1 * gcc15-32bit-15.2.0+git10201-150000.1.9.1 * libasan8-32bit-debuginfo-15.2.0+git10201-150000.1.9.1 * libobjc4-32bit-15.2.0+git10201-150000.1.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257463 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:30:06 -0000 Subject: SUSE-RU-2026:20537-1: moderate: Recommended update for python-kiwi Message-ID: <177262740686.1032.18036951563854426422@488de5d2170e> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2026:20537-1 Release Date: 2026-03-02T08:44:01Z Rating: moderate References: * bsc#1253637 * bsc#1254116 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that has two fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Fix spec file for SLFO 1.1 target glibc-gconv-modules-extra does not exist in SLFO 1.1 * Fix upstream merge README * Fixed ramdisk sysroot generator Do not use a custom _dev name and stick with the UUID representation of the disk image in RAM after deployment. Former versions of udev did not create a by-uuid device representation which now seems to have changed. This then leads to the device name RamDisk_rootfs not being created the and respective .device unit times out. In addition the timer unit for the standard device representation changed to infinity. This fixes bsc#1254116 * Delete workflows conflicting with upstream * Fixed spec file requires The package requirement for binutils was set to TW (>=1650) only but is also required for SLES16/Leap16 which is 1600 This commit fixes the condition to match with all required distributions and fixes bsc#1253637 * Bump version: 10.2.32 ? 10.2.33 * Run grub mkconfig with os-prober disabled Set GRUB_DISABLE_OS_PROBER=true to the caller environment such that it gets consumed via /etc/grub.d/30_os-prober This Fixes #2883 * Fixed typo in documentation Invalid XML syntax, missing end tag. This Fixes #2882 * References #2474 and #2475 poweroff instead of halt on oem shutdown * Fix rawhide integration test The package shim-ia32 got dropped * Add test for profiled overlays kiwi supports overlay files per profile, but we didn't had a proper integration test for it. This commit adds one * Mount proc when needed Using cp -a might lookup in proc/self/.. under certain conditions. Make sure to mount proc for config/function that might trigger this condition. This Fixes #2876 * Update test-image-custom-partitions test build Fix patch files to match with new dracut module dirs * Update dracut version compat runtime check Update check_dracut_module_versions_compatible_to_kiwi to match with new dracut module dirs which have changed due to recommended dracut module ordering for out-of-tree modules. * Fix dracut Makefile install target module dir names have changed due to recommended dracut module ordering for out- of-tree modules. * Update pacman spec to dract changed module dirs Follow up change for the fix of the recommended dracut module ordering for out- of-tree modules. * Update spec file due to dract changed module dirs Follow up change for the fix of the recommended dracut module ordering for out- of-tree modules. * Follow the recommended dracut module ordering for out-of-tree modules In dracut release v108 or later the recommended ordering for out out of tree modules is 50-59 range. The following is a section from dracut documentation: > Not using the 50-59 range for out of tree dracut modules will likely > lead to > unintended errors in the initramfs generation process as your > dracut module > will either run too early or too late in the generation process. > You have > been warned. * Fix agama integration test Disable no longer existing agama-auto.service * Fixed agama integration test nothing provides agama-auto anymore * Update SLFO integration test Make sure ps tool is installed * Fix exclude list for live image builds When specifying a filesystem attribute for a live image build, the rootfs gets build directly into this filesystem instead of being a squashfs wraped ext4 which is the default layout for compatibility reasons. In this direct filesystem mode the exclude list was not passed along to the filesystem creation and causes unwanted metadata to be part of the final image. This Fixes #2873 * Fix test-image-custom-partitions integration test Same fix as for the Tumbleweed test now also applied to the Leap test. Patching of the new root device did no longer apply * Fix test-image-custom-partitions integration test Patching of the new root device did no longer apply * Bump version: 10.2.31 ? 10.2.32 * fix: resize for raid device, ensure vars like kiwi_RaidDev are loaded before setting disk variable * Do not clobber initialize method There was a method named initialize defined and implemented differently in the dracut modules kiwi-lib and kiwi-repart. kiwi-lib is expected to be shared code across all kiwi dracut modules. However if one module redefines a method of the same name which is used in another module and expected to work differently there, this is evil. This commit cleans up the name conflict and names the kiwi library init function as lib_initialize. All dracut code that is expected to make use of this method has been adopted too. * Skip kiwi-repart module in install ISOs In case the kiwi-repart module is explicitly requested in a dracut.conf file and the image is also configured to build an install ISO image this leads the install ISO to contain the kiwi-repart module as well which is unwanted. This commit explicitly omits the kiwi-repart when creating the initrd for the install image * Skip repart when booting install/live iso * Update leap test-image-disk integration test Add test for alternative volume ID in install ISO * Bump version: 10.2.30 ? 10.2.31 * Consolidate device lock into its own method Add set_device_lock method which uses udevadm lock preferable but also supports an flock fallback in case there is no lock command provided via systemd/udev * Fix bug in shell condition The shell code test ... || warn A; warn B will always print the warning for B despite the test result. This lead to the warning message "Settings from the kiwi description will be ignored" to be printed always. This commit fixes it with a clean if/then condition * Fix documentation rendering There was an indentation bug which caused the docs to render wrong. This commit fixes it * solver/repository: Handle zstd-compressed metadata files `_create_solvables` assumes metadata files are gzip-compressed, but modern Fedora ones are not, they are zstd-compressed. Signed-off-by: Adam Williamson * uri: If we fail to resolve the metalink URI, log it It's rather useful to know _what_ the URI is when something goes wrong, after all. Signed-off-by: Adam Williamson * Bump version: 10.2.29 ? 10.2.30 * Fix repartitioning with parted parted does locking itself already. Wrapping it in udevadm lock results in a deadlock, breaking boot. * Update test-image-disk-simple integration test Update slfo/test-image-disk-simple. Add more space for flake testing and add a user to test flakes for non root * Catch potential exceptions from pathlib.Path.mkdir Creating a directory can fail, we should catch this error instead of ending up in a stack trace ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-Extras-6.1-416=1 ## Package List: * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * python3-kiwi-10.2.33-slfo.1.1_1.1 * kiwi-systemdeps-core-10.2.33-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253637 * https://bugzilla.suse.com/show_bug.cgi?id=1254116 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:30:21 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:30:21 -0000 Subject: SUSE-SU-2026:20536-1: important: Security update for glibc Message-ID: <177262742136.1032.8210626805909403224@488de5d2170e> # Security update for glibc Announcement ID: SUSE-SU-2026:20536-1 Release Date: 2026-03-02T14:52:11Z Rating: important References: * bsc#1246965 * bsc#1256766 * bsc#1256822 * bsc#1257005 Cross-References: * CVE-2025-15281 * CVE-2025-8058 * CVE-2026-0861 * CVE-2026-0915 CVSS scores: * CVE-2025-15281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-15281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-15281 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8058 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H * CVE-2025-8058 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H * CVE-2025-8058 ( NVD ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0861 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0861 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0915 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2026-0915 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0915 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for glibc fixes the following issues: * CVE-2026-0861: inadequate size check in the memalign suite may result in an integer overflow (bsc#1256766). * CVE-2026-0915: uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822). * CVE-2025-15281: uninitialized memory may cause the process abort (bsc#1257005). * CVE-2025-8058: a malloc failure in regcomp function can lead to a double free (bsc#1246965). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-417=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * glibc-locale-base-2.38-slfo.1.1_6.1 * glibc-devel-debuginfo-2.38-slfo.1.1_6.1 * glibc-devel-2.38-slfo.1.1_6.1 * glibc-locale-base-debuginfo-2.38-slfo.1.1_6.1 * glibc-debugsource-2.38-slfo.1.1_6.1 * glibc-locale-2.38-slfo.1.1_6.1 * glibc-debuginfo-2.38-slfo.1.1_6.1 * glibc-2.38-slfo.1.1_6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-15281.html * https://www.suse.com/security/cve/CVE-2025-8058.html * https://www.suse.com/security/cve/CVE-2026-0861.html * https://www.suse.com/security/cve/CVE-2026-0915.html * https://bugzilla.suse.com/show_bug.cgi?id=1246965 * https://bugzilla.suse.com/show_bug.cgi?id=1256766 * https://bugzilla.suse.com/show_bug.cgi?id=1256822 * https://bugzilla.suse.com/show_bug.cgi?id=1257005 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:30:32 -0000 Subject: SUSE-SU-2026:20535-1: important: Security update for cups Message-ID: <177262743278.1032.16800464942653871359@488de5d2170e> # Security update for cups Announcement ID: SUSE-SU-2026:20535-1 Release Date: 2026-03-02T14:20:42Z Rating: important References: * bsc#1244057 * bsc#1249049 * bsc#1249128 * bsc#1253783 * bsc#1254353 * jsc#PED-14688 * jsc#PED-14775 Cross-References: * CVE-2025-58060 * CVE-2025-58364 * CVE-2025-58436 * CVE-2025-61915 CVSS scores: * CVE-2025-58060 ( SUSE ): 7.7 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-58060 ( SUSE ): 7.5 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58060 ( NVD ): 8.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H * CVE-2025-58364 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58364 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-58436 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61915 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61915 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-61915 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-61915 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities, contains two features and has one fix can now be installed. ## Description: This update for cups fixes the following issues: Update to version 2.4.16. Security issues fixed: * CVE-2025-58436: single client sending slow messages to cupsd can delay the application and make it unusable for other clients (bsc#1244057). * CVE-2025-58060: authentication bypass with AuthType negotiate (bsc#1249049). * CVE-2025-58364: unsafe deserialization and validation of printer attributes can lead to null dereference (bsc#1249128). * CVE-2025-61915: local denial-of-service via cupsd.conf update and related issues (bsc#1253783). Other updates and bugfixes: * Version upgrade to 2.4.16: * 'cupsUTF8ToCharset' didn't validate 2-byte UTF-8 sequences, potentially reading past the end of the source string (Issue #1438) * The web interface did not support domain usernames fully (Issue #1441) * Fixed an infinite loop issue in the GTK+ print dialog (Issue #1439 bsc#1254353) * Fixed stopping scheduler on unknown directive in configuration (Issue #1443) * Version upgrade to 2.4.15: * Fixed potential crash in 'cups-driverd' when there are duplicate PPDs (Issue #1355) * Fixed error recovery when scanning for PPDs in 'cups-driverd' (Issue #1416) * Fix packages for Immutable Mode - cups (jsc#PED-14775,jsc#PED-14688) * Version upgrade to 2.4.14. * Version upgrade to 2.4.13: * Added 'print-as-raster' printer and job attributes for forcing rasterization (Issue #1282) * Updated documentation (Issue #1086) * Updated IPP backend to try a sanitized user name if the printer/server does not like the value (Issue #1145) * Updated the scheduler to send the "printer-added" or "printer-modified" events whenever an IPP Everywhere PPD is installed (Issue #1244) * Updated the scheduler to send the "printer-modified" event whenever the system default printer is changed (Issue #1246) * Fixed a memory leak in 'httpClose' (Issue #1223) * Fixed missing commas in 'ippCreateRequestedArray' (Issue #1234) * Fixed subscription issues in the scheduler and D-Bus notifier (Issue #1235) * Fixed media-default reporting for custom sizes (Issue #1238) * Fixed support for IPP/PPD options with periods or underscores (Issue #1249) * Fixed parsing of real numbers in PPD compiler source files (Issue #1263) * Fixed scheduler freezing with zombie clients (Issue #1264) * Fixed support for the server name in the ErrorLog filename (Issue #1277) * Fixed job cleanup after daemon restart (Issue #1315) * Fixed handling of buggy DYMO USB printer serial numbers (Issue #1338) * Fixed unreachable block in IPP backend (Issue #1351) * Fixed memory leak in _cupsConvertOptions (Issue #1354) * Version upgrade to 2.4.12: * GnuTLS follows system crypto policies now (Issue #1105) * Added `NoSystem` SSLOptions value (Issue #1130) * Now we raise alert for certificate issues (Issue #1194) * Added Kyocera USB quirk (Issue #1198) * The scheduler now logs a job's debugging history if the backend fails (Issue #1205) * Fixed a potential timing issue with `cupsEnumDests` (Issue #1084) * Fixed a potential "lost PPD" condition in the scheduler (Issue #1109) * Fixed a compressed file error handling bug (Issue #1070) * Fixed a bug in the make-and-model whitespace trimming code (Issue #1096) * Fixed a removal of IPP Everywhere permanent queue if installation failed (Issue #1102) * Fixed `ServerToken None` in scheduler (Issue #1111) * Fixed invalid IPP keyword values created from PPD option names (Issue #1118) * Fixed handling of "media" and "PageSize" in the same print request (Issue #1125) * Fixed client raster printing from macOS (Issue #1143) * Fixed the default User-Agent string. * Fixed a recursion issue in `ippReadIO`. * Fixed handling incorrect radix in `scan_ps()` (Issue #1188) * Fixed validation of dateTime values with time zones more than UTC+11 (Issue #1201) * Fixed attributes returned by the Create-Xxx-Subscriptions requests (Issue #1204) * Fixed `ippDateToTime` when using a non GMT/UTC timezone (Issue #1208) * Fixed `job-completed` event notifications for jobs that are cancelled before started (Issue #1209) * Fixed DNS-SD discovery with `ippfind` (Issue #1211) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-419=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libcups2-debuginfo-2.4.16-slfo.1.1_1.1 * cups-config-2.4.16-slfo.1.1_1.1 * cups-debugsource-2.4.16-slfo.1.1_1.1 * libcups2-2.4.16-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58060.html * https://www.suse.com/security/cve/CVE-2025-58364.html * https://www.suse.com/security/cve/CVE-2025-58436.html * https://www.suse.com/security/cve/CVE-2025-61915.html * https://bugzilla.suse.com/show_bug.cgi?id=1244057 * https://bugzilla.suse.com/show_bug.cgi?id=1249049 * https://bugzilla.suse.com/show_bug.cgi?id=1249128 * https://bugzilla.suse.com/show_bug.cgi?id=1253783 * https://bugzilla.suse.com/show_bug.cgi?id=1254353 * https://jira.suse.com/browse/PED-14688 * https://jira.suse.com/browse/PED-14775 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:30:36 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:30:36 -0000 Subject: SUSE-SU-2026:20534-1: important: Security update for rust-keylime Message-ID: <177262743622.1032.3350698132848965200@488de5d2170e> # Security update for rust-keylime Announcement ID: SUSE-SU-2026:20534-1 Release Date: 2026-03-02T14:18:10Z Rating: important References: * bsc#1257908 Cross-References: * CVE-2026-25727 CVSS scores: * CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25727 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for rust-keylime fixes the following issues: Update to version 0.2.8+116. Security issues fixed: * CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257908). Other updates and bugfixes: * Update vendored crates `time` to version 0.3.47. * Update to version 0.2.8+116: * build(deps): bump bytes from 1.7.2 to 1.11.1 * api: Modify /version endpoint output in version 2.5 * Add API v2.5 with backward-compatible /v2.5/quotes/integrity * tests: add unit test for resolve_agent_id (#1182) * (pull-model): enable retry logic for registration * rpm: Update specfiles to apply on master * workflows: Add test to detect unused crates * lib: Drop unused crates * push-model: Drop unused crates * keylime-agent: Drop unused crates * build(deps): bump uuid from 1.18.1 to 1.19.0 * Update reqwest-retry to 0.8, retry-policies to 0.5 * rpm: Fix cargo_build macro usage on CentOS Stream * fix(push-model): resolve hash_ek uuid to actual EK hash * build(deps): bump thiserror from 2.0.16 to 2.0.17 * workflows: Separate upstream test suite from e2e coverage * Send UEFI measured boot logs as raw bytes (#1173) * auth: Add unit tests for SecretToken implementation * packit: Enable push-attestation tests * resilient_client: Prevent authentication token leakage in logs * Use tmpfiles.d for /var directories (PED-14736) * Update to version 0.2.8+96: * build(deps): bump wiremock from 0.6.4 to 0.6.5 * build(deps): bump actions/checkout from 5 to 6 * build(deps): bump chrono from 0.4.41 to 0.4.42 * packit: Get coverage from Fedora 43 runs * Fix issues pointed out by clippy * Replace mutex unwraps with proper error handling in TPM library * Remove unused session request methods from StructureFiller * Fix config panic on missing ek_handle in push model agent * build(deps): bump tempfile from 3.21.0 to 3.23.0 * build(deps): bump actions/upload-artifact from 4 to 6 (#1163) * Fix clippy warnings project-wide * Add KEYLIME_DIR support for verifier TLS certificates in push model agent * Thread privileged resources and use MeasurementList for IMA reading * Add privileged resource initialization and privilege dropping to push model agent * Fix privilege dropping order in run_as() * add documentation on FQDN hostnames * Remove confusing logs for push mode agent * Set correct default Verifier port (8891->8881) (#1159) * Add verifier_url to reference configuration file (#1158) * Add TLS support for Registrar communication (#1139) * Fix agent handling of 403 registration responses (#1154) * Add minor README.md rephrasing (#1151) * build(deps): bump actions/checkout from 5 to 6 (#1153) * ci: update spec files for packit COPR build * docs: improve challenge encoding and async TPM documentation * refactor: improve middleware and error handling * feat: add authentication client with middleware integration * docker: Include keylime_push_model_agent binary * Include attestation_interval configuration (#1146) * Persist payload keys to avoid attestation failure on restart * crypto: Implement the load or generate pattern for keys * Use simple algorithm specifiers in certification_keys object (#1140) * tests: Enable more tests in CI * Fix RSA2048 algorithm reporting in keylime agent * Remove disabled_signing_algorithms configuration * rpm: Fix metadata patches to apply to current code * workflows/rpm.yml: Use more strict patching * build(deps): bump uuid from 1.17.0 to 1.18.1 * Fix ECC algorithm selection and reporting for keylime agent * Improve logging consistency and coherency * Implement minimal RFC compliance for Location header and URI parsing (#1125) * Use separate keys for payload mechanism and mTLS * docker: update rust to 1.81 for distroless Dockerfile * Ensure UEFI log capabilities are set to false * build(deps): bump http from 1.1.0 to 1.3.1 * build(deps): bump log from 0.4.27 to 0.4.28 * build(deps): bump cfg-if from 1.0.1 to 1.0.3 * build(deps): bump actix-rt from 2.10.0 to 2.11.0 * build(deps): bump async-trait from 0.1.88 to 0.1.89 * build(deps): bump trybuild from 1.0.105 to 1.0.110 * Accept evidence handling structures null entries * workflows: Add test to check if RPM patches still apply * CI: Enable test add-agent-with-malformed-ek-cert * config: Fix singleton tests * FSM: Remove needless lifetime annotations (#1105) * rpm: Do not remove wiremock which is now available in Fedora * Use latest Fedora httpdate version (1.0.3) * Enhance coverage with parse_retry_after test * Fix issues reported by CI regarding unwrap() calls * Reuse max retries indicated to the ResilientClient * Include limit of retries to 5 for Retry-After * Add policy to handle Retry-After response headers * build(deps): bump wiremock from 0.6.3 to 0.6.4 * build(deps): bump serde_json from 1.0.140 to 1.0.143 * build(deps): bump pest_derive from 2.8.0 to 2.8.1 * build(deps): bump syn from 2.0.90 to 2.0.106 * build(deps): bump tempfile from 3.20.0 to 3.21.0 * build(deps): bump thiserror from 2.0.12 to 2.0.16 * rpm: Fix patches to apply to current master code * build(deps): bump anyhow from 1.0.98 to 1.0.99 * state_machine: Automatically clean config override during tests * config: Implement singleton and factory pattern * testing: Support overriding configuration during tests * feat: implement standalone challenge-response authentication module * structures: rename session structs for clarity and fix typos * tpm: refactor certify_credential_with_iak() into a more generic function * Add Push Model Agent Mermaid FSM chart (#1095) * Add state to avoid exiting on wrong attestation (#1093) * Add 6 alphanumeric lowercase X-Request-ID header * Enhance Evidence Handling response parsing * build(deps): bump quote from 1.0.35 to 1.0.40 * build(deps): bump libc from 0.2.172 to 0.2.175 * build(deps): bump glob from 0.3.2 to 0.3.3 * build(deps): bump actix-web from 4.10.2 to 4.11.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-418=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * rust-keylime-0.2.8+116-slfo.1.1_1.1 * rust-keylime-debuginfo-0.2.8+116-slfo.1.1_1.1 * rust-keylime-debugsource-0.2.8+116-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-25727.html * https://bugzilla.suse.com/show_bug.cgi?id=1257908 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:30:40 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:30:40 -0000 Subject: SUSE-RU-2026:20533-1: moderate: Recommended update for python-kiwi Message-ID: <177262744068.1032.2582341256384786639@488de5d2170e> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2026:20533-1 Release Date: 2026-03-02T08:44:01Z Rating: moderate References: * bsc#1253637 * bsc#1254116 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Fix spec file for SLFO 1.1 target glibc-gconv-modules-extra does not exist in SLFO 1.1 * Fix upstream merge README * Fixed ramdisk sysroot generator Do not use a custom _dev name and stick with the UUID representation of the disk image in RAM after deployment. Former versions of udev did not create a by-uuid device representation which now seems to have changed. This then leads to the device name RamDisk_rootfs not being created the and respective .device unit times out. In addition the timer unit for the standard device representation changed to infinity. This fixes bsc#1254116 * Delete workflows conflicting with upstream * Fixed spec file requires The package requirement for binutils was set to TW (>=1650) only but is also required for SLES16/Leap16 which is 1600 This commit fixes the condition to match with all required distributions and fixes bsc#1253637 * Bump version: 10.2.32 ? 10.2.33 * Run grub mkconfig with os-prober disabled Set GRUB_DISABLE_OS_PROBER=true to the caller environment such that it gets consumed via /etc/grub.d/30_os-prober This Fixes #2883 * Fixed typo in documentation Invalid XML syntax, missing end tag. This Fixes #2882 * References #2474 and #2475 poweroff instead of halt on oem shutdown * Fix rawhide integration test The package shim-ia32 got dropped * Add test for profiled overlays kiwi supports overlay files per profile, but we didn't had a proper integration test for it. This commit adds one * Mount proc when needed Using cp -a might lookup in proc/self/.. under certain conditions. Make sure to mount proc for config/function that might trigger this condition. This Fixes #2876 * Update test-image-custom-partitions test build Fix patch files to match with new dracut module dirs * Update dracut version compat runtime check Update check_dracut_module_versions_compatible_to_kiwi to match with new dracut module dirs which have changed due to recommended dracut module ordering for out-of-tree modules. * Fix dracut Makefile install target module dir names have changed due to recommended dracut module ordering for out- of-tree modules. * Update pacman spec to dract changed module dirs Follow up change for the fix of the recommended dracut module ordering for out- of-tree modules. * Update spec file due to dract changed module dirs Follow up change for the fix of the recommended dracut module ordering for out- of-tree modules. * Follow the recommended dracut module ordering for out-of-tree modules In dracut release v108 or later the recommended ordering for out out of tree modules is 50-59 range. The following is a section from dracut documentation: > Not using the 50-59 range for out of tree dracut modules will likely > lead to > unintended errors in the initramfs generation process as your > dracut module > will either run too early or too late in the generation process. > You have > been warned. * Fix agama integration test Disable no longer existing agama-auto.service * Fixed agama integration test nothing provides agama-auto anymore * Update SLFO integration test Make sure ps tool is installed * Fix exclude list for live image builds When specifying a filesystem attribute for a live image build, the rootfs gets build directly into this filesystem instead of being a squashfs wraped ext4 which is the default layout for compatibility reasons. In this direct filesystem mode the exclude list was not passed along to the filesystem creation and causes unwanted metadata to be part of the final image. This Fixes #2873 * Fix test-image-custom-partitions integration test Same fix as for the Tumbleweed test now also applied to the Leap test. Patching of the new root device did no longer apply * Fix test-image-custom-partitions integration test Patching of the new root device did no longer apply * Bump version: 10.2.31 ? 10.2.32 * fix: resize for raid device, ensure vars like kiwi_RaidDev are loaded before setting disk variable * Do not clobber initialize method There was a method named initialize defined and implemented differently in the dracut modules kiwi-lib and kiwi-repart. kiwi-lib is expected to be shared code across all kiwi dracut modules. However if one module redefines a method of the same name which is used in another module and expected to work differently there, this is evil. This commit cleans up the name conflict and names the kiwi library init function as lib_initialize. All dracut code that is expected to make use of this method has been adopted too. * Skip kiwi-repart module in install ISOs In case the kiwi-repart module is explicitly requested in a dracut.conf file and the image is also configured to build an install ISO image this leads the install ISO to contain the kiwi-repart module as well which is unwanted. This commit explicitly omits the kiwi-repart when creating the initrd for the install image * Skip repart when booting install/live iso * Update leap test-image-disk integration test Add test for alternative volume ID in install ISO * Bump version: 10.2.30 ? 10.2.31 * Consolidate device lock into its own method Add set_device_lock method which uses udevadm lock preferable but also supports an flock fallback in case there is no lock command provided via systemd/udev * Fix bug in shell condition The shell code test ... || warn A; warn B will always print the warning for B despite the test result. This lead to the warning message "Settings from the kiwi description will be ignored" to be printed always. This commit fixes it with a clean if/then condition * Fix documentation rendering There was an indentation bug which caused the docs to render wrong. This commit fixes it * solver/repository: Handle zstd-compressed metadata files `_create_solvables` assumes metadata files are gzip-compressed, but modern Fedora ones are not, they are zstd-compressed. Signed-off-by: Adam Williamson * uri: If we fail to resolve the metalink URI, log it It's rather useful to know _what_ the URI is when something goes wrong, after all. Signed-off-by: Adam Williamson * Bump version: 10.2.29 ? 10.2.30 * Fix repartitioning with parted parted does locking itself already. Wrapping it in udevadm lock results in a deadlock, breaking boot. * Update test-image-disk-simple integration test Update slfo/test-image-disk-simple. Add more space for flake testing and add a user to test flakes for non root * Catch potential exceptions from pathlib.Path.mkdir Creating a directory can fail, we should catch this error instead of ending up in a stack trace ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-416=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * dracut-kiwi-oem-dump-10.2.33-slfo.1.1_1.1 * dracut-kiwi-lib-10.2.33-slfo.1.1_1.1 * dracut-kiwi-oem-repart-10.2.33-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253637 * https://bugzilla.suse.com/show_bug.cgi?id=1254116 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:30:52 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:30:52 -0000 Subject: SUSE-RU-2026:20532-1: important: Recommended update for regionServiceClientConfigGCE, python-gcemetadata Message-ID: <177262745210.1032.17872358691516980242@488de5d2170e> # Recommended update for regionServiceClientConfigGCE, python-gcemetadata Announcement ID: SUSE-RU-2026:20532-1 Release Date: 2026-02-26T13:05:47Z Rating: important References: * bsc#1045148 * bsc#1053687 * bsc#1053695 * bsc#1097505 * bsc#1134510 * bsc#1173136 * bsc#1246995 * jsc#PED-8944 * jsc#PM-1900 Affected Products: * SUSE Linux Micro 6.1 An update that contains two features and has seven fixes can now be installed. ## Description: This update for regionServiceClientConfigGCE, python-gcemetadata fixes the following issues: Changes for python-gcemetadata: * Update to version 1.1.0 (jsc#PCT-590, jsc#PED-8944): * Add licenses option in identity command. * Switch the SLE 15 build setup to also use a macro instead of referencing the Python 3.11 interpreter directly. * Switch to a defined Python interpreter. Use the primary interpreter in SLE 16 and later distributions and Python 3.11 for SLE 15 SP4 and later. * Obsolete the Python 3.6 build * Replace python3-gcemetadata with universal packaging * Rename to python-gcemetadata. * Update to version 1.0.4 (bsc#1173136): * Fix typo, missing "=" for "identity" option in processed command line options causes mis-identification of instance as missing identity data access * Include in SLE 12 (jsc#PM-1900) * Update to version 1.0.3 (bsc#1134510): * Handle the condition where the identity data of the instance may not be accessible from the metadata server and provide proper error messaging * From 1.0.2: * Avoid traceback when not running in GCE, by testing access to the metdata server first before performing othre operations * Use noun phrase in summary. * Update to version 1.0.1 (bsc#1097505): * Support instances with multiple Nics * Update to version 1.0.0: * Port to Python 3 * Update to version 0.3.2 (bsc#1053695, bsc#1053695): * Implement new feature to generate license verification token * Add man page * From 0.3.1 (bsc#1053687): * The --identity argument must accept a value and the value is required * From 0.3.0: * Properly handle overlapping enpoint names * From 0.2.2: * Support writing data to a file and as XML snippets * Update to version 0.2.1 (bsc#1045148): * Set proper value for dict lookup to avoid traceback * Update to version 0.2.0: * Implement query functionality for all options * Initial build, include in SLE 12 * Version 0.0.5 Changes for regionServiceClientConfigGCE: * Update to version 5.2.0: * Drop the if condition for gcemetdata requirement * Update to version 5.1.0 (jsc#PCT-590): * Add licenses info in the metdata * Accomodate build setup * SLE 16 python-requests requires SSL v3 certificates. Update 2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-414=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * regionServiceClientConfigGCE-5.2.0-slfo.1.1_1.1 * python-gcemetadata-1.1.0-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1045148 * https://bugzilla.suse.com/show_bug.cgi?id=1053687 * https://bugzilla.suse.com/show_bug.cgi?id=1053695 * https://bugzilla.suse.com/show_bug.cgi?id=1097505 * https://bugzilla.suse.com/show_bug.cgi?id=1134510 * https://bugzilla.suse.com/show_bug.cgi?id=1173136 * https://bugzilla.suse.com/show_bug.cgi?id=1246995 * https://jira.suse.com/browse/PED-8944 * https://jira.suse.com/browse/PM-1900 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:31:00 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:31:00 -0000 Subject: SUSE-SU-2026:20531-1: moderate: Security update for libssh Message-ID: <177262746054.1032.1204770516020341454@488de5d2170e> # Security update for libssh Announcement ID: SUSE-SU-2026:20531-1 Release Date: 2026-02-26T11:33:24Z Rating: moderate References: * bsc#1258045 * bsc#1258049 * bsc#1258054 * bsc#1258080 * bsc#1258081 Cross-References: * CVE-2026-0964 * CVE-2026-0965 * CVE-2026-0966 * CVE-2026-0967 * CVE-2026-0968 CVSS scores: * CVE-2026-0964 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-0965 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2026-0966 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2026-0967 ( SUSE ): 1.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0967 ( SUSE ): 2.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2026-0968 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0968 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves five vulnerabilities can now be installed. ## Description: This update for libssh fixes the following issues: * CVE-2026-0964: improper sanitation of paths received from SCP servers can cause path traversal (bsc#1258049). * CVE-2026-0965: possible denial of service when parsing unexpected configuration files (bsc#1258045). * CVE-2026-0966: buffer underflow in ssh_get_hexa() on invalid input (bsc#1258054). * CVE-2026-0967: specially crafted patterns could cause denial of service (bsc#1258081). * CVE-2026-0968: malformed SFTP message can lead to out of bound read (bsc#1258080). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-412=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libssh4-debuginfo-0.10.6-slfo.1.1_4.1 * libssh4-0.10.6-slfo.1.1_4.1 * libssh-config-0.10.6-slfo.1.1_4.1 * libssh-debugsource-0.10.6-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0964.html * https://www.suse.com/security/cve/CVE-2026-0965.html * https://www.suse.com/security/cve/CVE-2026-0966.html * https://www.suse.com/security/cve/CVE-2026-0967.html * https://www.suse.com/security/cve/CVE-2026-0968.html * https://bugzilla.suse.com/show_bug.cgi?id=1258045 * https://bugzilla.suse.com/show_bug.cgi?id=1258049 * https://bugzilla.suse.com/show_bug.cgi?id=1258054 * https://bugzilla.suse.com/show_bug.cgi?id=1258080 * https://bugzilla.suse.com/show_bug.cgi?id=1258081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:31:09 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:31:09 -0000 Subject: SUSE-SU-2026:20530-1: important: Security update for libpng16 Message-ID: <177262746973.1032.18188181232587646375@488de5d2170e> # Security update for libpng16 Announcement ID: SUSE-SU-2026:20530-1 Release Date: 2026-02-26T11:25:49Z Rating: important References: * bsc#1256525 * bsc#1256526 * bsc#1257364 * bsc#1257365 * bsc#1258020 Cross-References: * CVE-2025-28162 * CVE-2025-28164 * CVE-2026-22695 * CVE-2026-22801 * CVE-2026-25646 CVSS scores: * CVE-2025-28162 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-28162 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-28162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-28164 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-28164 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-28164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22695 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22695 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2026-22695 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2026-22695 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2026-22801 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22801 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-22801 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2026-25646 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-25646 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2026-25646 ( NVD ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25646 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves five vulnerabilities can now be installed. ## Description: This update for libpng16 fixes the following issues: * CVE-2026-25646: Fixed a heap buffer overflow vulnerability in png_set_dither/png_set_quantize (bsc#1258020). * CVE-2025-28162: memory leaks when running `pngimage` (bsc#1257364). * CVE-2025-28164: memory leaks when running `pngimage` (bsc#1257365). * CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525). * CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-411=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libpng16-16-debuginfo-1.6.43-slfo.1.1_3.1 * libpng16-16-1.6.43-slfo.1.1_3.1 * libpng16-debugsource-1.6.43-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-28162.html * https://www.suse.com/security/cve/CVE-2025-28164.html * https://www.suse.com/security/cve/CVE-2026-22695.html * https://www.suse.com/security/cve/CVE-2026-22801.html * https://www.suse.com/security/cve/CVE-2026-25646.html * https://bugzilla.suse.com/show_bug.cgi?id=1256525 * https://bugzilla.suse.com/show_bug.cgi?id=1256526 * https://bugzilla.suse.com/show_bug.cgi?id=1257364 * https://bugzilla.suse.com/show_bug.cgi?id=1257365 * https://bugzilla.suse.com/show_bug.cgi?id=1258020 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:31:13 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:31:13 -0000 Subject: SUSE-RU-2026:0795-1: moderate: Recommended update for release-notes-ha Message-ID: <177262747394.1032.15169621106866938344@488de5d2170e> # Recommended update for release-notes-ha Announcement ID: SUSE-RU-2026:0795-1 Release Date: 2026-03-04T06:02:01Z Rating: moderate References: * bsc#933411 * jsc#PED-13089 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that contains one feature and has one fix can now be installed. ## Description: This update for release-notes-ha fixes the following issues: * Update to version 15.5.20260227 (bsc#933411) * Added note about Nutanix AVH (jsc#PED-13089) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-795=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2026-795=1 ## Package List: * openSUSE Leap 15.5 (noarch) * release-notes-ha-15.5.20260227-150500.3.9.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (noarch) * release-notes-ha-15.5.20260227-150500.3.9.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-13089 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:31:16 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:31:16 -0000 Subject: SUSE-RU-2026:0794-1: important: Recommended update for libpcap Message-ID: <177262747677.1032.16822386617113560166@488de5d2170e> # Recommended update for libpcap Announcement ID: SUSE-RU-2026:0794-1 Release Date: 2026-03-04T05:59:38Z Rating: important References: * bsc#1258668 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for libpcap fixes the following issues: * Enable RMDA: Fix missing dependency in spec so libcap is built with RMDA support (bsc#1258668). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-794=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-794=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.5-150700.3.10.1 * libpcap1-1.10.5-150700.3.10.1 * libpcap1-debuginfo-1.10.5-150700.3.10.1 * libpcap-devel-1.10.5-150700.3.10.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libpcap1-32bit-1.10.5-150700.3.10.1 * libpcap1-32bit-debuginfo-1.10.5-150700.3.10.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1258668 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:31:19 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:31:19 -0000 Subject: SUSE-RU-2026:0793-1: moderate: Recommended update for libnvme Message-ID: <177262747950.1032.5425486093372924982@488de5d2170e> # Recommended update for libnvme Announcement ID: SUSE-RU-2026:0793-1 Release Date: 2026-03-04T05:57:46Z Rating: moderate References: * bsc#1256043 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for libnvme fixes the following issues: * Update to version 1.11+22.gc0b8e5f8 (bsc#1256043): * fabrics: * add additional debug messages for --tls and --concat * add error if dhchap-ctrl-secret is specified with --concat * add error if no dhchap-secret is specified with --concat * add error if --tls and --concat are invoked together * fix concat during nvme connect-all ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-793=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python3-libnvme-debuginfo-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme1-debuginfo-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme1-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme-debugsource-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme-devel-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme-debuginfo-1.11+22.gc0b8e5f8-150700.4.17.1 * python3-libnvme-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme-mi1-1.11+22.gc0b8e5f8-150700.4.17.1 * libnvme-mi1-debuginfo-1.11+22.gc0b8e5f8-150700.4.17.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1256043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 12:31:25 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 12:31:25 -0000 Subject: SUSE-SU-2026:0792-1: important: Security update for libsoup Message-ID: <177262748528.1032.7540908096803580171@488de5d2170e> # Security update for libsoup Announcement ID: SUSE-SU-2026:0792-1 Release Date: 2026-03-04T01:04:14Z Rating: important References: * bsc#1257398 * bsc#1257441 * bsc#1257597 Cross-References: * CVE-2026-1467 * CVE-2026-1539 * CVE-2026-1760 CVSS scores: * CVE-2026-1467 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N * CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2026-1539 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1760 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L * CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398). * CVE-2026-1539: proxy authentication credentials leaked via the Proxy- Authorization header when handling HTTP redirects (bsc#1257441). * CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request smuggling and potential DoS (bsc#1257597). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-792=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-792=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.33.1 * libsoup-debugsource-2.68.4-150200.4.33.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.33.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.33.1 * libsoup-debugsource-2.68.4-150200.4.33.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.33.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1467.html * https://www.suse.com/security/cve/CVE-2026-1539.html * https://www.suse.com/security/cve/CVE-2026-1760.html * https://bugzilla.suse.com/show_bug.cgi?id=1257398 * https://bugzilla.suse.com/show_bug.cgi?id=1257441 * https://bugzilla.suse.com/show_bug.cgi?id=1257597 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 16:30:02 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 16:30:02 -0000 Subject: SUSE-OU-2026:0799-1: low: Recommended update for python-passlib Message-ID: <177264180286.1212.2016077121096573149@488de5d2170e> # Recommended update for python-passlib Announcement ID: SUSE-OU-2026:0799-1 Release Date: 2026-03-04T11:34:25Z Rating: low References: * jsc#PED-13380 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for python-passlib fixes the following issues: * Ship python311-passlib to the s390x architecture, no source changes. (PED-13380) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-799=1 openSUSE-SLE-15.6-2026-799=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-799=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-799=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-799=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-799=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-799=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-passlib-1.7.4-150600.12.2.1 * Public Cloud Module 15-SP6 (noarch) * python311-passlib-1.7.4-150600.12.2.1 * Public Cloud Module 15-SP7 (noarch) * python311-passlib-1.7.4-150600.12.2.1 * Python 3 Module 15-SP7 (noarch) * python311-passlib-1.7.4-150600.12.2.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * python311-passlib-1.7.4-150600.12.2.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * python311-passlib-1.7.4-150600.12.2.1 ## References: * https://jira.suse.com/browse/PED-13380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 16:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 16:30:09 -0000 Subject: SUSE-RU-2026:0798-1: moderate: Recommended update for cvs Message-ID: <177264180919.1212.3934205594398973496@488de5d2170e> # Recommended update for cvs Announcement ID: SUSE-RU-2026:0798-1 Release Date: 2026-03-04T11:33:51Z Rating: moderate References: * bsc#1257000 Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for cvs fixes the following issues: * The CVS server hangs because it assumes the compressed input length requested will be available from the underlying stream, which is almost always necessarily shorter due to compression. Fixed by requesting one byte at a time. (bsc#1257000) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-798=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-798=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-798=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-798=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-798=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-798=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-798=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-798=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-798=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-798=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-798=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-798=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-798=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * openSUSE Leap 15.4 (noarch) * cvs-doc-1.12.13-150400.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * openSUSE Leap 15.6 (noarch) * cvs-doc-1.12.13-150400.3.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * cvs-1.12.13-150400.3.3.1 * cvs-debuginfo-1.12.13-150400.3.3.1 * cvs-debugsource-1.12.13-150400.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257000 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 16:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 16:30:14 -0000 Subject: SUSE-RU-2026:0797-1: moderate: Recommended update for docbook-dsssl-stylesheets Message-ID: <177264181431.1212.10386865185209419256@488de5d2170e> # Recommended update for docbook-dsssl-stylesheets Announcement ID: SUSE-RU-2026:0797-1 Release Date: 2026-03-04T11:32:42Z Rating: moderate References: * bsc#1252143 Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for docbook-dsssl-stylesheets fixes the following issues: * package LEGALNOTICE.htm as %license [bsc#1252143] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-797=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-797=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-797=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-797=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-797=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-797=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-797=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-797=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-797=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-797=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-797=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-797=1 ## Package List: * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * openSUSE Leap 15.6 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * Development Tools Module 15-SP7 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * docbook-dsssl-stylesheets-1.79-150000.4.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252143 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 16:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 16:30:25 -0000 Subject: SUSE-SU-2026:0796-1: important: Security update for libsoup Message-ID: <177264182571.1212.16620291272044057107@488de5d2170e> # Security update for libsoup Announcement ID: SUSE-SU-2026:0796-1 Release Date: 2026-03-04T09:33:44Z Rating: important References: * bsc#1257398 * bsc#1257441 * bsc#1257597 Cross-References: * CVE-2026-1467 * CVE-2026-1539 * CVE-2026-1760 CVSS scores: * CVE-2026-1467 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N * CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2026-1539 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1760 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L * CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398). * CVE-2026-1539: proxy authentication credentials leaked via the Proxy- Authorization header when handling HTTP redirects (bsc#1257441). * CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request smuggling and potential DoS (bsc#1257597). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-796=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-796=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-devel-2.62.2-5.37.1 * libsoup-2_4-1-debuginfo-2.62.2-5.37.1 * typelib-1_0-Soup-2_4-2.62.2-5.37.1 * libsoup-2_4-1-2.62.2-5.37.1 * libsoup-debugsource-2.62.2-5.37.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libsoup-lang-2.62.2-5.37.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libsoup-2_4-1-32bit-2.62.2-5.37.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.37.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.37.1 * libsoup-2_4-1-debuginfo-2.62.2-5.37.1 * libsoup-devel-2.62.2-5.37.1 * typelib-1_0-Soup-2_4-2.62.2-5.37.1 * libsoup-2_4-1-2.62.2-5.37.1 * libsoup-2_4-1-32bit-2.62.2-5.37.1 * libsoup-debugsource-2.62.2-5.37.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libsoup-lang-2.62.2-5.37.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1467.html * https://www.suse.com/security/cve/CVE-2026-1539.html * https://www.suse.com/security/cve/CVE-2026-1760.html * https://bugzilla.suse.com/show_bug.cgi?id=1257398 * https://bugzilla.suse.com/show_bug.cgi?id=1257441 * https://bugzilla.suse.com/show_bug.cgi?id=1257597 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:13 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:13 -0000 Subject: SUSE-RU-2026:0807-1: important: Recommended update for rmt-server Message-ID: <177265621312.1313.12957977156314131383@488de5d2170e> # Recommended update for rmt-server Announcement ID: SUSE-RU-2026:0807-1 Release Date: 2026-03-04T15:54:02Z Rating: important References: * bsc#1253146 * bsc#1253147 * bsc#1256826 * bsc#1256883 * bsc#1257133 Affected Products: * Public Cloud Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has five fixes can now be installed. ## Description: This update for rmt-server fixes the following issues: * Upgrade to version 2.25: * Fix rmt-cli list and purge commands for large data (bsc#1253146 and bsc#1253147) * Fix mirroring of SLE16 NVIDIA-GPU-Compute-Toolkit-CUDA repo (bsc#1256826) * Support for new redirect_repo_hosts config, to exclude some repo hosts from mirroring, and send clients directly there (jsc#SCC-452) * rmt-server-pubcloud: * Clearer error message (bsc#1256883) * Add Valkey + Sidekiq for async processing * Handle zypper response when data exporter raises an error (bsc#1257133) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-807=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-807=1 ## Package List: * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150700.3.12.2 * rmt-server-debugsource-2.25-150700.3.12.2 * rmt-server-pubcloud-2.25-150700.3.12.2 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * rmt-server-debuginfo-2.25-150700.3.12.2 * rmt-server-2.25-150700.3.12.2 * rmt-server-config-2.25-150700.3.12.2 * rmt-server-debugsource-2.25-150700.3.12.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253146 * https://bugzilla.suse.com/show_bug.cgi?id=1253147 * https://bugzilla.suse.com/show_bug.cgi?id=1256826 * https://bugzilla.suse.com/show_bug.cgi?id=1256883 * https://bugzilla.suse.com/show_bug.cgi?id=1257133 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:17 -0000 Subject: SUSE-SU-2026:0806-1: important: Security update for wicked2nm, suse-migration-services, suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration Message-ID: <177265621767.1313.1307857402330756912@488de5d2170e> # Security update for wicked2nm,suse-migration-services,suse-migration- sle16-activation,SLES16-Migration,SLES16-SAP_Migration Announcement ID: SUSE-SU-2026:0806-1 Release Date: 2026-03-04T15:46:30Z Rating: important References: * bsc#1257911 Cross-References: * CVE-2026-25727 CVSS scores: * CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25727 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SAP Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for wicked2nm,suse-migration-services,suse-migration- sle16-activation,SLES16-Migration,SLES16-SAP_Migration fixes the following issues: Changes for SLES16-SAP_Migration: * Bump version: 2.1.30 Changes for SLES16-Migration: * Bump version: 2.1.30 Changes for suse-migration-sle16-activation: * Move script package to the main migration provider * Create lib file for common network-prereq tasks * Refactor mount_system service Changes for suse-migration-services: * Bump to version: 2.1.30: * Update docinfo * Update doc/adoc/user_guide.adoc * Update documentation for 12-to-15 in pubclouds Fix information about default service pack target. * Apply make black * Added black for code formatting * refactor: add `Zypper.install` wrapper Add `Zypper.install` wrapper method for package installation * Fixed get_migration_target return behavior * fix: ensure NetworkManager is installed on the target system Changes for wicked2nm: * Update to version v1.4.1. Security issues fixed: \- CVE-2026-25727: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257911). Other updates and bugfixes: \- update bytes from 1.10.1 to 1.11.1 \- update time to 0.3.47 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-806=1 * SAP Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP7-2026-806=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * SLES16-Migration-2.1.30-15.26.4 * wicked2nm-debuginfo-1.4.1-150700.15.16.1 * wicked2nm-debugsource-1.4.1-150700.15.16.1 * wicked2nm-1.4.1-150700.15.16.1 * Basesystem Module 15-SP7 (noarch) * suse-migration-pre-checks-2.1.30-150700.15.21.1 * suse-migration-scripts-2.1.30-150700.15.21.1 * python3-migration-2.1.30-150700.15.21.1 * Basesystem Module 15-SP7 (aarch64 x86_64) * suse-migration-sle16-activation-2.1.30-150700.15.13.1 * SAP Applications Module 15-SP7 (ppc64le x86_64) * SLES16-SAP_Migration-2.1.30-15.18.4 ## References: * https://www.suse.com/security/cve/CVE-2026-25727.html * https://bugzilla.suse.com/show_bug.cgi?id=1257911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:22 -0000 Subject: SUSE-SU-2026:0805-1: low: Security update for python-pip Message-ID: <177265622228.1313.4790130065072456724@488de5d2170e> # Security update for python-pip Announcement ID: SUSE-SU-2026:0805-1 Release Date: 2026-03-04T12:58:47Z Rating: low References: * bsc#1257599 Cross-References: * CVE-2026-1703 CVSS scores: * CVE-2026-1703 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2026-1703 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2026-1703 ( NVD ): 2.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-pip fixes the following issues: * CVE-2026-1703: Fixed a potential path traversal in python-pip. (bsc#1257599) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-805=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-805=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-805=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-805=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-pip-22.3.1-150400.17.19.1 * openSUSE Leap 15.6 (noarch) * python311-pip-22.3.1-150400.17.19.1 * Public Cloud Module 15-SP4 (noarch) * python311-pip-22.3.1-150400.17.19.1 * Python 3 Module 15-SP7 (noarch) * python311-pip-22.3.1-150400.17.19.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1703.html * https://bugzilla.suse.com/show_bug.cgi?id=1257599 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:25 -0000 Subject: SUSE-SU-2026:0803-1: moderate: Security update for util-linux Message-ID: <177265622583.1313.16066046084591984042@488de5d2170e> # Security update for util-linux Announcement ID: SUSE-SU-2026:0803-1 Release Date: 2026-03-04T12:58:08Z Rating: moderate References: * bsc#1258859 Cross-References: * CVE-2026-3184 CVSS scores: * CVE-2026-3184 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-3184 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for util-linux fixes the following issues: * CVE-2026-3184: Fix full hostname usage for PAM to ensure correct access control for "login -h" (bsc#1258859). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-803=1 openSUSE-SLE-15.6-2026-803=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * uuidd-debuginfo-2.39.3-150600.4.18.1 * libmount1-2.39.3-150600.4.18.1 * python3-libmount-2.39.3-150600.4.18.1 * libblkid1-2.39.3-150600.4.18.1 * libblkid-devel-2.39.3-150600.4.18.1 * libuuid-devel-2.39.3-150600.4.18.1 * libuuid1-debuginfo-2.39.3-150600.4.18.1 * python-libmount-debugsource-2.39.3-150600.4.18.1 * libsmartcols1-2.39.3-150600.4.18.1 * libblkid-devel-static-2.39.3-150600.4.18.1 * libfdisk1-2.39.3-150600.4.18.1 * libsmartcols-devel-2.39.3-150600.4.18.1 * util-linux-debugsource-2.39.3-150600.4.18.1 * util-linux-systemd-2.39.3-150600.4.18.1 * libfdisk-devel-static-2.39.3-150600.4.18.1 * util-linux-systemd-debuginfo-2.39.3-150600.4.18.1 * util-linux-debuginfo-2.39.3-150600.4.18.1 * uuidd-2.39.3-150600.4.18.1 * python3-libmount-debuginfo-2.39.3-150600.4.18.1 * util-linux-2.39.3-150600.4.18.1 * util-linux-tty-tools-debuginfo-2.39.3-150600.4.18.1 * libfdisk-devel-2.39.3-150600.4.18.1 * libmount1-debuginfo-2.39.3-150600.4.18.1 * libmount-devel-2.39.3-150600.4.18.1 * libuuid-devel-static-2.39.3-150600.4.18.1 * libfdisk1-debuginfo-2.39.3-150600.4.18.1 * libuuid1-2.39.3-150600.4.18.1 * libsmartcols1-debuginfo-2.39.3-150600.4.18.1 * util-linux-systemd-debugsource-2.39.3-150600.4.18.1 * util-linux-tty-tools-2.39.3-150600.4.18.1 * libmount-devel-static-2.39.3-150600.4.18.1 * libsmartcols-devel-static-2.39.3-150600.4.18.1 * libblkid1-debuginfo-2.39.3-150600.4.18.1 * openSUSE Leap 15.6 (x86_64) * libsmartcols1-32bit-debuginfo-2.39.3-150600.4.18.1 * libfdisk-devel-32bit-2.39.3-150600.4.18.1 * libmount1-32bit-2.39.3-150600.4.18.1 * libblkid1-32bit-2.39.3-150600.4.18.1 * libuuid-devel-32bit-2.39.3-150600.4.18.1 * libsmartcols1-32bit-2.39.3-150600.4.18.1 * libfdisk1-32bit-debuginfo-2.39.3-150600.4.18.1 * libuuid1-32bit-debuginfo-2.39.3-150600.4.18.1 * libblkid-devel-32bit-2.39.3-150600.4.18.1 * libmount-devel-32bit-2.39.3-150600.4.18.1 * libblkid1-32bit-debuginfo-2.39.3-150600.4.18.1 * libmount1-32bit-debuginfo-2.39.3-150600.4.18.1 * libfdisk1-32bit-2.39.3-150600.4.18.1 * libuuid1-32bit-2.39.3-150600.4.18.1 * libsmartcols-devel-32bit-2.39.3-150600.4.18.1 * openSUSE Leap 15.6 (noarch) * util-linux-lang-2.39.3-150600.4.18.1 * openSUSE Leap 15.6 (s390x) * util-linux-extra-2.39.3-150600.4.18.1 * util-linux-extra-debuginfo-2.39.3-150600.4.18.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libfdisk1-64bit-debuginfo-2.39.3-150600.4.18.1 * libfdisk-devel-64bit-2.39.3-150600.4.18.1 * libblkid-devel-64bit-2.39.3-150600.4.18.1 * libblkid1-64bit-debuginfo-2.39.3-150600.4.18.1 * libsmartcols1-64bit-2.39.3-150600.4.18.1 * libfdisk1-64bit-2.39.3-150600.4.18.1 * libsmartcols-devel-64bit-2.39.3-150600.4.18.1 * libmount-devel-64bit-2.39.3-150600.4.18.1 * libuuid1-64bit-debuginfo-2.39.3-150600.4.18.1 * libmount1-64bit-debuginfo-2.39.3-150600.4.18.1 * libuuid-devel-64bit-2.39.3-150600.4.18.1 * libsmartcols1-64bit-debuginfo-2.39.3-150600.4.18.1 * libblkid1-64bit-2.39.3-150600.4.18.1 * libmount1-64bit-2.39.3-150600.4.18.1 * libuuid1-64bit-2.39.3-150600.4.18.1 ## References: * https://www.suse.com/security/cve/CVE-2026-3184.html * https://bugzilla.suse.com/show_bug.cgi?id=1258859 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:29 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:29 -0000 Subject: SUSE-SU-2026:0802-1: moderate: Security update for python Message-ID: <177265622972.1313.16765830715195936878@488de5d2170e> # Security update for python Announcement ID: SUSE-SU-2026:0802-1 Release Date: 2026-03-04T12:34:53Z Rating: moderate References: * bsc#1229596 Cross-References: * CVE-2024-7592 CVSS scores: * CVE-2024-7592 ( SUSE ): 2.6 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-7592 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for python fixes the following issues: * CVE-2024-7592: excess CPU resource consumption in http.cookies module (bsc#1229596) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-802=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * python-32bit-2.7.18-33.66.1 * python-2.7.18-33.66.1 * python-gdbm-debuginfo-2.7.18-33.66.1 * python-curses-debuginfo-2.7.18-33.66.1 * python-base-32bit-2.7.18-33.66.1 * python-tk-2.7.18-33.66.1 * python-base-2.7.18-33.66.1 * python-devel-2.7.18-33.66.1 * python-demo-2.7.18-33.66.1 * python-tk-debuginfo-2.7.18-33.66.1 * libpython2_7-1_0-32bit-2.7.18-33.66.1 * libpython2_7-1_0-2.7.18-33.66.1 * python-base-debugsource-2.7.18-33.66.1 * python-xml-2.7.18-33.66.1 * python-curses-2.7.18-33.66.1 * python-xml-debuginfo-2.7.18-33.66.1 * libpython2_7-1_0-debuginfo-32bit-2.7.18-33.66.1 * python-base-debuginfo-2.7.18-33.66.1 * python-base-debuginfo-32bit-2.7.18-33.66.1 * python-debuginfo-32bit-2.7.18-33.66.1 * python-idle-2.7.18-33.66.1 * python-gdbm-2.7.18-33.66.1 * python-debuginfo-2.7.18-33.66.1 * libpython2_7-1_0-debuginfo-2.7.18-33.66.1 * python-debugsource-2.7.18-33.66.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * python-doc-2.7.18-33.66.1 * python-doc-pdf-2.7.18-33.66.1 ## References: * https://www.suse.com/security/cve/CVE-2024-7592.html * https://bugzilla.suse.com/show_bug.cgi?id=1229596 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:33 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:33 -0000 Subject: SUSE-SU-2026:0801-1: moderate: Security update for libxslt Message-ID: <177265623382.1313.4841387625385947511@488de5d2170e> # Security update for libxslt Announcement ID: SUSE-SU-2026:0801-1 Release Date: 2026-03-04T12:33:42Z Rating: moderate References: * bsc#1250553 Cross-References: * CVE-2025-10911 CVSS scores: * CVE-2025-10911 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-10911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-10911 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2025-10911: use-after-free will be fixed on libxml2 side instead (bsc#1250553). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-801=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-801=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-801=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-801=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-801=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-801=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-801=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-801=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-801=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libxslt-tools-1.1.34-150400.3.16.1 * libxslt-devel-1.1.34-150400.3.16.1 * libxslt1-1.1.34-150400.3.16.1 * libxslt-tools-debuginfo-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * openSUSE Leap 15.4 (x86_64) * libxslt-devel-32bit-1.1.34-150400.3.16.1 * libxslt1-32bit-1.1.34-150400.3.16.1 * libxslt1-32bit-debuginfo-1.1.34-150400.3.16.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libxslt1-64bit-1.1.34-150400.3.16.1 * libxslt1-64bit-debuginfo-1.1.34-150400.3.16.1 * libxslt-devel-64bit-1.1.34-150400.3.16.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libxslt-tools-1.1.34-150400.3.16.1 * libxslt-devel-1.1.34-150400.3.16.1 * libxslt1-1.1.34-150400.3.16.1 * libxslt-tools-debuginfo-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * openSUSE Leap 15.6 (x86_64) * libxslt-devel-32bit-1.1.34-150400.3.16.1 * libxslt1-32bit-1.1.34-150400.3.16.1 * libxslt1-32bit-debuginfo-1.1.34-150400.3.16.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libxslt1-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libxslt1-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libxslt1-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libxslt1-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libxslt1-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libxslt-tools-1.1.34-150400.3.16.1 * libxslt-devel-1.1.34-150400.3.16.1 * libxslt1-1.1.34-150400.3.16.1 * libxslt-tools-debuginfo-1.1.34-150400.3.16.1 * libxslt-debugsource-1.1.34-150400.3.16.1 * libxslt1-debuginfo-1.1.34-150400.3.16.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.16.1 * libxslt1-32bit-1.1.34-150400.3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10911.html * https://bugzilla.suse.com/show_bug.cgi?id=1250553 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Mar 4 20:30:37 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 04 Mar 2026 20:30:37 -0000 Subject: SUSE-SU-2026:0800-1: important: Security update for ocaml Message-ID: <177265623768.1313.8551609709052004879@488de5d2170e> # Security update for ocaml Announcement ID: SUSE-SU-2026:0800-1 Release Date: 2026-03-04T12:33:11Z Rating: important References: * bsc#1258992 Cross-References: * CVE-2026-28364 CVSS scores: * CVE-2026-28364 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-28364 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-28364 ( NVD ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ocaml fixes the following issues: * CVE-2026-28364: missing bounds validation in readblock() can lead to arbitrary code execution (bsc#1258992). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-800=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-800=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-800=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-800=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-800=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-800=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-800=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-800=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ocaml-ocamldoc-4.05.0-150200.15.3.1 * ocaml-compiler-libs-devel-4.05.0-150200.15.3.1 * ocaml-ocamldoc-debuginfo-4.05.0-150200.15.3.1 * ocaml-runtime-4.05.0-150200.15.3.1 * ocaml-debugsource-4.05.0-150200.15.3.1 * ocaml-compiler-libs-4.05.0-150200.15.3.1 * ocaml-runtime-debuginfo-4.05.0-150200.15.3.1 * ocaml-4.05.0-150200.15.3.1 * ocaml-debuginfo-4.05.0-150200.15.3.1 ## References: * https://www.suse.com/security/cve/CVE-2026-28364.html * https://bugzilla.suse.com/show_bug.cgi?id=1258992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 08:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 08:30:05 -0000 Subject: SUSE-SU-2026:0810-1: low: Security update for wireshark Message-ID: <177269940545.1638.2239305873627096673@488de5d2170e> # Security update for wireshark Announcement ID: SUSE-SU-2026:0810-1 Release Date: 2026-03-04T19:33:44Z Rating: low References: * bsc#1258907 Cross-References: * CVE-2026-3201 CVSS scores: * CVE-2026-3201 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-3201 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2026-3201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-3201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for wireshark fixes the following issue: * CVE-2026-3201: USB HID protocol dissector memory exhaustion (bsc#1258907). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-810=1 openSUSE-SLE-15.6-2026-810=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libwireshark17-4.2.14-150600.18.38.1 * wireshark-debuginfo-4.2.14-150600.18.38.1 * libwiretap14-4.2.14-150600.18.38.1 * wireshark-ui-qt-debuginfo-4.2.14-150600.18.38.1 * libwsutil15-debuginfo-4.2.14-150600.18.38.1 * libwireshark17-debuginfo-4.2.14-150600.18.38.1 * libwiretap14-debuginfo-4.2.14-150600.18.38.1 * wireshark-devel-4.2.14-150600.18.38.1 * wireshark-ui-qt-4.2.14-150600.18.38.1 * wireshark-4.2.14-150600.18.38.1 * wireshark-debugsource-4.2.14-150600.18.38.1 * libwsutil15-4.2.14-150600.18.38.1 ## References: * https://www.suse.com/security/cve/CVE-2026-3201.html * https://bugzilla.suse.com/show_bug.cgi?id=1258907 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 08:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 08:30:07 -0000 Subject: SUSE-RU-2026:0808-1: moderate: Recommended update for eglexternalplatform Message-ID: <177269940798.1638.1967779280152513364@488de5d2170e> # Recommended update for eglexternalplatform Announcement ID: SUSE-RU-2026:0808-1 Release Date: 2026-03-04T16:00:42Z Rating: moderate References: Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 An update that can now be installed. ## Description: This update for eglexternalplatform fixes the following issues: * update to release 1.2.1 * Override the installation directory of the pkg-config file to put it in the correct architecture-independent directory. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-808=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-808=1 ## Package List: * openSUSE Leap 15.4 (noarch) * eglexternalplatform-devel-1.2.1-150400.3.6.1 * openSUSE Leap 15.6 (noarch) * eglexternalplatform-devel-1.2.1-150400.3.6.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 08:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 08:30:06 -0000 Subject: SUSE-RU-2026:0809-1: moderate: Recommended update for openvswitch Message-ID: <177269940692.1638.12109609840872909919@488de5d2170e> # Recommended update for openvswitch Announcement ID: SUSE-RU-2026:0809-1 Release Date: 2026-03-04T19:13:26Z Rating: moderate References: Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that can now be installed. ## Description: This update for openvswitch fixes the following issues: * Update openvswitch to 3.5.3: * DPDK: OVS validated with DPDK 24.11.3. * Bug fixes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-809=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-809=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * python3-openvswitch-3.5.3-150700.41.12.1 * openvswitch-debugsource-3.5.3-150700.41.12.1 * openvswitch-debuginfo-3.5.3-150700.41.12.1 * python3-openvswitch-debuginfo-3.5.3-150700.41.12.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ovn-central-debuginfo-25.03.2-150700.41.12.1 * openvswitch-vtep-debuginfo-3.5.3-150700.41.12.1 * libopenvswitch-3_5-0-debuginfo-3.5.3-150700.41.12.1 * ovn-devel-25.03.2-150700.41.12.1 * ovn-docker-25.03.2-150700.41.12.1 * ovn-debuginfo-25.03.2-150700.41.12.1 * libovn-25_03-0-debuginfo-25.03.2-150700.41.12.1 * ovn-central-25.03.2-150700.41.12.1 * python3-openvswitch-3.5.3-150700.41.12.1 * openvswitch-vtep-3.5.3-150700.41.12.1 * openvswitch-devel-3.5.3-150700.41.12.1 * python3-openvswitch-debuginfo-3.5.3-150700.41.12.1 * openvswitch-test-3.5.3-150700.41.12.1 * openvswitch-debugsource-3.5.3-150700.41.12.1 * ovn-25.03.2-150700.41.12.1 * openvswitch-pki-3.5.3-150700.41.12.1 * libovn-25_03-0-25.03.2-150700.41.12.1 * ovn-host-debuginfo-25.03.2-150700.41.12.1 * ovn-vtep-25.03.2-150700.41.12.1 * libopenvswitch-3_5-0-3.5.3-150700.41.12.1 * openvswitch-debuginfo-3.5.3-150700.41.12.1 * openvswitch-ipsec-3.5.3-150700.41.12.1 * openvswitch-test-debuginfo-3.5.3-150700.41.12.1 * ovn-vtep-debuginfo-25.03.2-150700.41.12.1 * openvswitch-3.5.3-150700.41.12.1 * ovn-host-25.03.2-150700.41.12.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:30:21 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:30:21 -0000 Subject: SUSE-SU-2026:20571-1: important: Security update for kubevirt Message-ID: <177271382114.1872.13546570148071542851@13ea24840d99> # Security update for kubevirt Announcement ID: SUSE-SU-2026:20571-1 Release Date: 2026-02-27T08:49:48Z Rating: important References: * bsc#1241772 * bsc#1253181 * bsc#1253185 * bsc#1253186 * bsc#1253189 * bsc#1253194 * bsc#1253748 * bsc#1257128 * bsc#1257422 Cross-References: * CVE-2024-45310 * CVE-2025-22872 * CVE-2025-64324 * CVE-2025-64432 * CVE-2025-64433 * CVE-2025-64434 * CVE-2025-64435 * CVE-2025-64437 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-64324 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64324 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64433 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-64433 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64433 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64434 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-64434 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64435 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64435 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-64435 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64437 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-64437 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2025-64437 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves eight vulnerabilities and has one fix can now be installed. ## Description: This update for kubevirt fixes the following issues: Update to version 1.7.0 (bsc#1257128). Security issues fixed: * CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS (bsc#1253189). * CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into creating empty files/directories on host (bsc#1257422). * CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241772). * CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls (bsc#1253181). * CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185). * CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations (bsc#1253186). * CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194). * CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users (bsc#1253748). Other updates and bugfixes: * Upstream now uses stateless firmware for CoCo VMs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-319=1 ## Package List: * SUSE Linux Micro Extras 6.2 (x86_64) * kubevirt-tests-debuginfo-1.7.0-160000.1.1 * kubevirt-tests-1.7.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-64324.html * https://www.suse.com/security/cve/CVE-2025-64432.html * https://www.suse.com/security/cve/CVE-2025-64433.html * https://www.suse.com/security/cve/CVE-2025-64434.html * https://www.suse.com/security/cve/CVE-2025-64435.html * https://www.suse.com/security/cve/CVE-2025-64437.html * https://bugzilla.suse.com/show_bug.cgi?id=1241772 * https://bugzilla.suse.com/show_bug.cgi?id=1253181 * https://bugzilla.suse.com/show_bug.cgi?id=1253185 * https://bugzilla.suse.com/show_bug.cgi?id=1253186 * https://bugzilla.suse.com/show_bug.cgi?id=1253189 * https://bugzilla.suse.com/show_bug.cgi?id=1253194 * https://bugzilla.suse.com/show_bug.cgi?id=1253748 * https://bugzilla.suse.com/show_bug.cgi?id=1257128 * https://bugzilla.suse.com/show_bug.cgi?id=1257422 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:36:33 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:36:33 -0000 Subject: SUSE-SU-2026:20570-1: important: Security update for the Linux Kernel Message-ID: <177271419358.1872.17336340699294237372@13ea24840d99> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20570-1 Release Date: 2026-02-27T11:32:45Z Rating: important References: * bsc#1205462 * bsc#1214285 * bsc#1215199 * bsc#1235905 * bsc#1242505 * bsc#1242974 * bsc#1242986 * bsc#1243452 * bsc#1243507 * bsc#1243662 * bsc#1246184 * bsc#1246282 * bsc#1247030 * bsc#1247292 * bsc#1247712 * bsc#1248166 * bsc#1248175 * bsc#1248178 * bsc#1248179 * bsc#1248185 * bsc#1248188 * bsc#1248196 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248211 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248222 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248232 * bsc#1248234 * bsc#1248240 * bsc#1248360 * bsc#1248366 * bsc#1248384 * bsc#1248626 * bsc#1249307 * bsc#1249609 * bsc#1249895 * bsc#1249998 * bsc#1250032 * bsc#1250082 * bsc#1250388 * bsc#1250705 * bsc#1250738 * bsc#1250748 * bsc#1252712 * bsc#1252773 * bsc#1252784 * bsc#1252891 * bsc#1252900 * bsc#1253049 * bsc#1253078 * bsc#1253079 * bsc#1253087 * bsc#1253344 * bsc#1253500 * bsc#1253739 * bsc#1254244 * bsc#1254308 * bsc#1254447 * bsc#1254839 * bsc#1254842 * bsc#1254845 * bsc#1254977 * bsc#1255102 * bsc#1255128 * bsc#1255157 * bsc#1255164 * bsc#1255172 * bsc#1255216 * bsc#1255232 * bsc#1255241 * bsc#1255245 * bsc#1255266 * bsc#1255268 * bsc#1255269 * bsc#1255319 * bsc#1255327 * bsc#1255346 * bsc#1255403 * bsc#1255417 * bsc#1255459 * bsc#1255482 * bsc#1255506 * bsc#1255526 * bsc#1255527 * bsc#1255529 * bsc#1255530 * bsc#1255536 * bsc#1255537 * bsc#1255542 * bsc#1255544 * bsc#1255547 * bsc#1255569 * bsc#1255593 * bsc#1255622 * bsc#1255694 * bsc#1255695 * bsc#1255703 * bsc#1255708 * bsc#1255811 * bsc#1255930 * bsc#1256579 * bsc#1256582 * bsc#1256584 * bsc#1256586 * bsc#1256591 * bsc#1256592 * bsc#1256593 * bsc#1256594 * bsc#1256597 * bsc#1256605 * bsc#1256607 * bsc#1256608 * bsc#1256609 * bsc#1256610 * bsc#1256611 * bsc#1256612 * bsc#1256613 * bsc#1256616 * bsc#1256617 * bsc#1256619 * bsc#1256622 * bsc#1256623 * bsc#1256625 * bsc#1256627 * bsc#1256628 * bsc#1256630 * bsc#1256632 * bsc#1256638 * bsc#1256641 * bsc#1256643 * bsc#1256645 * bsc#1256646 * bsc#1256650 * bsc#1256651 * bsc#1256653 * bsc#1256654 * bsc#1256655 * bsc#1256656 * bsc#1256659 * bsc#1256660 * bsc#1256661 * bsc#1256664 * bsc#1256665 * bsc#1256667 * bsc#1256668 * bsc#1256674 * bsc#1256677 * bsc#1256680 * bsc#1256682 * bsc#1256683 * bsc#1256688 * bsc#1256689 * bsc#1256716 * bsc#1256726 * bsc#1256728 * bsc#1256730 * bsc#1256733 * bsc#1256737 * bsc#1256741 * bsc#1256742 * bsc#1256744 * bsc#1256748 * bsc#1256749 * bsc#1256752 * bsc#1256754 * bsc#1256755 * bsc#1256756 * bsc#1256757 * bsc#1256759 * bsc#1256760 * bsc#1256761 * bsc#1256763 * bsc#1256770 * bsc#1256773 * bsc#1256774 * bsc#1256777 * bsc#1256779 * bsc#1256781 * bsc#1256785 * bsc#1256792 * bsc#1256793 * bsc#1256794 * bsc#1256864 * bsc#1256865 * bsc#1256867 * bsc#1256975 * bsc#1257015 * bsc#1257035 * bsc#1257053 * bsc#1257154 * bsc#1257155 * bsc#1257158 * bsc#1257159 * bsc#1257163 * bsc#1257164 * bsc#1257167 * bsc#1257168 * bsc#1257179 * bsc#1257180 * bsc#1257202 * bsc#1257204 * bsc#1257207 * bsc#1257208 * bsc#1257215 * bsc#1257217 * bsc#1257218 * bsc#1257220 * bsc#1257221 * bsc#1257225 * bsc#1257227 * bsc#1257232 * bsc#1257234 * bsc#1257236 * bsc#1257243 * bsc#1257245 * bsc#1257276 * bsc#1257277 * bsc#1257279 * bsc#1257282 * bsc#1257296 * bsc#1257309 * bsc#1257473 * bsc#1257504 * bsc#1257603 * jsc#PED-10906 * jsc#PED-13728 * jsc#PED-14156 Cross-References: * CVE-2024-54031 * CVE-2025-37744 * CVE-2025-37751 * CVE-2025-37841 * CVE-2025-37845 * CVE-2025-37904 * CVE-2025-37955 * CVE-2025-38243 * CVE-2025-38262 * CVE-2025-38297 * CVE-2025-38298 * CVE-2025-38379 * CVE-2025-38423 * CVE-2025-38505 * CVE-2025-38507 * CVE-2025-38510 * CVE-2025-38511 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38521 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38539 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38547 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38551 * CVE-2025-38569 * CVE-2025-38589 * CVE-2025-38590 * CVE-2025-38645 * CVE-2025-39689 * CVE-2025-39795 * CVE-2025-39813 * CVE-2025-39814 * CVE-2025-39817 * CVE-2025-39829 * CVE-2025-39880 * CVE-2025-39913 * CVE-2025-39927 * CVE-2025-40030 * CVE-2025-40045 * CVE-2025-40097 * CVE-2025-40106 * CVE-2025-40147 * CVE-2025-40195 * CVE-2025-40257 * CVE-2025-40259 * CVE-2025-40261 * CVE-2025-40363 * CVE-2025-68174 * CVE-2025-68178 * CVE-2025-68188 * CVE-2025-68200 * CVE-2025-68211 * CVE-2025-68218 * CVE-2025-68227 * CVE-2025-68241 * CVE-2025-68245 * CVE-2025-68261 * CVE-2025-68296 * CVE-2025-68297 * CVE-2025-68320 * CVE-2025-68325 * CVE-2025-68337 * CVE-2025-68341 * CVE-2025-68348 * CVE-2025-68349 * CVE-2025-68356 * CVE-2025-68359 * CVE-2025-68360 * CVE-2025-68361 * CVE-2025-68366 * CVE-2025-68367 * CVE-2025-68368 * CVE-2025-68372 * CVE-2025-68374 * CVE-2025-68376 * CVE-2025-68379 * CVE-2025-68725 * CVE-2025-68735 * CVE-2025-68741 * CVE-2025-68743 * CVE-2025-68764 * CVE-2025-68768 * CVE-2025-68770 * CVE-2025-68771 * CVE-2025-68773 * CVE-2025-68775 * CVE-2025-68776 * CVE-2025-68777 * CVE-2025-68778 * CVE-2025-68783 * CVE-2025-68784 * CVE-2025-68788 * CVE-2025-68789 * CVE-2025-68792 * CVE-2025-68795 * CVE-2025-68797 * CVE-2025-68798 * CVE-2025-68799 * CVE-2025-68800 * CVE-2025-68801 * CVE-2025-68802 * CVE-2025-68803 * CVE-2025-68804 * CVE-2025-68808 * CVE-2025-68811 * CVE-2025-68813 * CVE-2025-68814 * CVE-2025-68815 * CVE-2025-68816 * CVE-2025-68819 * CVE-2025-68820 * CVE-2025-68821 * CVE-2025-68822 * CVE-2025-71064 * CVE-2025-71066 * CVE-2025-71073 * CVE-2025-71076 * CVE-2025-71077 * CVE-2025-71078 * CVE-2025-71079 * CVE-2025-71080 * CVE-2025-71081 * CVE-2025-71082 * CVE-2025-71083 * CVE-2025-71084 * CVE-2025-71085 * CVE-2025-71086 * CVE-2025-71087 * CVE-2025-71088 * CVE-2025-71089 * CVE-2025-71091 * CVE-2025-71093 * CVE-2025-71094 * CVE-2025-71095 * CVE-2025-71097 * CVE-2025-71098 * CVE-2025-71099 * CVE-2025-71100 * CVE-2025-71101 * CVE-2025-71108 * CVE-2025-71111 * CVE-2025-71112 * CVE-2025-71113 * CVE-2025-71114 * CVE-2025-71116 * CVE-2025-71118 * CVE-2025-71119 * CVE-2025-71120 * CVE-2025-71123 * CVE-2025-71126 * CVE-2025-71130 * CVE-2025-71131 * CVE-2025-71132 * CVE-2025-71133 * CVE-2025-71135 * CVE-2025-71136 * CVE-2025-71137 * CVE-2025-71138 * CVE-2025-71141 * CVE-2025-71142 * CVE-2025-71143 * CVE-2025-71145 * CVE-2025-71147 * CVE-2025-71148 * CVE-2025-71149 * CVE-2025-71154 * CVE-2025-71156 * CVE-2025-71157 * CVE-2025-71162 * CVE-2025-71163 * CVE-2026-22976 * CVE-2026-22977 * CVE-2026-22978 * CVE-2026-22981 * CVE-2026-22982 * CVE-2026-22984 * CVE-2026-22985 * CVE-2026-22986 * CVE-2026-22988 * CVE-2026-22989 * CVE-2026-22990 * CVE-2026-22991 * CVE-2026-22992 * CVE-2026-22993 * CVE-2026-22996 * CVE-2026-22997 * CVE-2026-22999 * CVE-2026-23000 * CVE-2026-23001 * CVE-2026-23002 * CVE-2026-23005 * CVE-2026-23006 * CVE-2026-23011 CVSS scores: * CVE-2024-54031 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37744 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37744 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38243 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38297 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38298 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38379 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38505 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38512 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38529 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38547 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38547 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39927 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39927 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40045 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40045 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40195 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40363 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40363 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68188 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68188 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68366 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68735 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68735 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68741 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68741 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68743 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68743 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68764 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-68764 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-68768 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68768 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68770 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68770 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68775 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68776 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68777 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68777 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68778 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68778 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68783 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-68788 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-68789 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68792 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68792 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68795 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68795 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68798 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68798 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68799 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68799 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-68800 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68801 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68802 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68802 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68803 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-68803 ( SUSE ): 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N * CVE-2025-68804 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68804 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68813 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68820 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71073 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71080 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-71080 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-71081 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71084 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71084 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71085 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71086 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71086 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71087 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71087 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71088 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71088 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71089 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71091 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71091 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71093 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-71093 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71094 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71094 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71097 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71099 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71099 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71100 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71100 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71101 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71101 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71108 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71112 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71113 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71114 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71114 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-71116 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-71118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71119 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71119 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71120 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71123 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71123 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-71126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71145 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71147 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71148 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-71149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71157 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71157 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71162 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22977 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22978 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-22981 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-22985 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22985 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22986 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22988 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-22988 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2026-22988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22990 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22999 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23001 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23002 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23005 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-23005 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2026-23006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves 205 vulnerabilities, contains three features and has 28 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344). * CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842). * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845). * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839). * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102). * CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327). * CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266). * CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269). * CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241). * CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319). * CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245). * CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216). * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157). * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268). * CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164). * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128). * CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403). * CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172). * CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417). * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482). * CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506). * CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694). * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544). * CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593). * CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542). * CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536). * CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526). * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622). * CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547). * CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527). * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537). * CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530). * CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529). * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure (bsc#1255695). * CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811). * CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703). * CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708). * CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930). * CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579). * CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584). * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582). * CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665). * CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659). * CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793). * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638). * CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656). * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688). * CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689). * CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643). * CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646). * CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653). * CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770). * CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677). * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641). * CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651). * CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680). * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674). * CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754). * CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667). * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654). * CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645). * CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613). * CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608). * CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622). * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623). * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628). * CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630). * CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612). * CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773). * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777). * CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597). * CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605). * CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607). * CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591). * CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726). * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744). * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779). * CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757). * CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755). * CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737). * CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733). * CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761). * CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760). * CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159). * CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164). * CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167). * CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168). * CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035). * CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053). * CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225). * CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179). * CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217). * CVE-2026-22986: gpiolib: fix race condition for gdev->srcu (bsc#1257276). * CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221). * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220). * CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218). * CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180). * CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv. * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236). * CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234). * CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232). * CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245). * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207). The following non security issues were fixed: * ALSA: usb-audio: Update for native DSD support quirks (stable-fixes). * Add bugnumber to an existing hv_netvsc change (bsc#1257473). * Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977). * Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792) * arm64: Update config files. Disable DEVPORT (bsc#1256792) * bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603). * bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569). * btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes). * btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes). * bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes). * drm/imagination: Wait for FW trace update command completion (git-fixes). * drm/msm/a6xx: fix bogus hwcg register updates (git-fixes). * ice: use netif_get_num_default_rss_queues() (bsc#1247712). * libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309). * mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087). * net: mana: Fix incorrect speed reported by debugfs (bsc#1255232). * net: mana: Support HW link state events (bsc#1253049). * nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015). * nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes). * powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199). * sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459). * scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864). * scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864). * scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296). * selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346). * slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes). * smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154). * smb: client: update cfid->last_access_time in open_cached_dir_by_dentry() (git-fixes). * smb: improve directory cache reuse for readdir operations (bsc#1252712). * tsm-mr: Add TVM Measurement Register support (bsc#1257504). * tsm-mr: Add tsm-mr sample code (bsc#1257504). * virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504). * virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504). * virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504). * wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes). * x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504). * x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-325=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.12.0-160000.26.1 * kernel-obs-build-debugsource-6.12.0-160000.26.1 * kernel-syms-6.12.0-160000.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54031.html * https://www.suse.com/security/cve/CVE-2025-37744.html * https://www.suse.com/security/cve/CVE-2025-37751.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37845.html * https://www.suse.com/security/cve/CVE-2025-37904.html * https://www.suse.com/security/cve/CVE-2025-37955.html * https://www.suse.com/security/cve/CVE-2025-38243.html * https://www.suse.com/security/cve/CVE-2025-38262.html * https://www.suse.com/security/cve/CVE-2025-38297.html * https://www.suse.com/security/cve/CVE-2025-38298.html * https://www.suse.com/security/cve/CVE-2025-38379.html * https://www.suse.com/security/cve/CVE-2025-38423.html * https://www.suse.com/security/cve/CVE-2025-38505.html * https://www.suse.com/security/cve/CVE-2025-38507.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38521.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38547.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38551.html * https://www.suse.com/security/cve/CVE-2025-38569.html * https://www.suse.com/security/cve/CVE-2025-38589.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-39689.html * https://www.suse.com/security/cve/CVE-2025-39795.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39814.html * https://www.suse.com/security/cve/CVE-2025-39817.html * https://www.suse.com/security/cve/CVE-2025-39829.html * https://www.suse.com/security/cve/CVE-2025-39880.html * https://www.suse.com/security/cve/CVE-2025-39913.html * https://www.suse.com/security/cve/CVE-2025-39927.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40045.html * https://www.suse.com/security/cve/CVE-2025-40097.html * https://www.suse.com/security/cve/CVE-2025-40106.html * https://www.suse.com/security/cve/CVE-2025-40147.html * https://www.suse.com/security/cve/CVE-2025-40195.html * https://www.suse.com/security/cve/CVE-2025-40257.html * https://www.suse.com/security/cve/CVE-2025-40259.html * https://www.suse.com/security/cve/CVE-2025-40261.html * https://www.suse.com/security/cve/CVE-2025-40363.html * https://www.suse.com/security/cve/CVE-2025-68174.html * https://www.suse.com/security/cve/CVE-2025-68178.html * https://www.suse.com/security/cve/CVE-2025-68188.html * https://www.suse.com/security/cve/CVE-2025-68200.html * https://www.suse.com/security/cve/CVE-2025-68211.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68227.html * https://www.suse.com/security/cve/CVE-2025-68241.html * https://www.suse.com/security/cve/CVE-2025-68245.html * https://www.suse.com/security/cve/CVE-2025-68261.html * https://www.suse.com/security/cve/CVE-2025-68296.html * https://www.suse.com/security/cve/CVE-2025-68297.html * https://www.suse.com/security/cve/CVE-2025-68320.html * https://www.suse.com/security/cve/CVE-2025-68325.html * https://www.suse.com/security/cve/CVE-2025-68337.html * https://www.suse.com/security/cve/CVE-2025-68341.html * https://www.suse.com/security/cve/CVE-2025-68348.html * https://www.suse.com/security/cve/CVE-2025-68349.html * https://www.suse.com/security/cve/CVE-2025-68356.html * https://www.suse.com/security/cve/CVE-2025-68359.html * https://www.suse.com/security/cve/CVE-2025-68360.html * https://www.suse.com/security/cve/CVE-2025-68361.html * https://www.suse.com/security/cve/CVE-2025-68366.html * https://www.suse.com/security/cve/CVE-2025-68367.html * https://www.suse.com/security/cve/CVE-2025-68368.html * https://www.suse.com/security/cve/CVE-2025-68372.html * https://www.suse.com/security/cve/CVE-2025-68374.html * https://www.suse.com/security/cve/CVE-2025-68376.html * https://www.suse.com/security/cve/CVE-2025-68379.html * https://www.suse.com/security/cve/CVE-2025-68725.html * https://www.suse.com/security/cve/CVE-2025-68735.html * https://www.suse.com/security/cve/CVE-2025-68741.html * https://www.suse.com/security/cve/CVE-2025-68743.html * https://www.suse.com/security/cve/CVE-2025-68764.html * https://www.suse.com/security/cve/CVE-2025-68768.html * https://www.suse.com/security/cve/CVE-2025-68770.html * https://www.suse.com/security/cve/CVE-2025-68771.html * https://www.suse.com/security/cve/CVE-2025-68773.html * https://www.suse.com/security/cve/CVE-2025-68775.html * https://www.suse.com/security/cve/CVE-2025-68776.html * https://www.suse.com/security/cve/CVE-2025-68777.html * https://www.suse.com/security/cve/CVE-2025-68778.html * https://www.suse.com/security/cve/CVE-2025-68783.html * https://www.suse.com/security/cve/CVE-2025-68784.html * https://www.suse.com/security/cve/CVE-2025-68788.html * https://www.suse.com/security/cve/CVE-2025-68789.html * https://www.suse.com/security/cve/CVE-2025-68792.html * https://www.suse.com/security/cve/CVE-2025-68795.html * https://www.suse.com/security/cve/CVE-2025-68797.html * https://www.suse.com/security/cve/CVE-2025-68798.html * https://www.suse.com/security/cve/CVE-2025-68799.html * https://www.suse.com/security/cve/CVE-2025-68800.html * https://www.suse.com/security/cve/CVE-2025-68801.html * https://www.suse.com/security/cve/CVE-2025-68802.html * https://www.suse.com/security/cve/CVE-2025-68803.html * https://www.suse.com/security/cve/CVE-2025-68804.html * https://www.suse.com/security/cve/CVE-2025-68808.html * https://www.suse.com/security/cve/CVE-2025-68811.html * https://www.suse.com/security/cve/CVE-2025-68813.html * https://www.suse.com/security/cve/CVE-2025-68814.html * https://www.suse.com/security/cve/CVE-2025-68815.html * https://www.suse.com/security/cve/CVE-2025-68816.html * https://www.suse.com/security/cve/CVE-2025-68819.html * https://www.suse.com/security/cve/CVE-2025-68820.html * https://www.suse.com/security/cve/CVE-2025-68821.html * https://www.suse.com/security/cve/CVE-2025-68822.html * https://www.suse.com/security/cve/CVE-2025-71064.html * https://www.suse.com/security/cve/CVE-2025-71066.html * https://www.suse.com/security/cve/CVE-2025-71073.html * https://www.suse.com/security/cve/CVE-2025-71076.html * https://www.suse.com/security/cve/CVE-2025-71077.html * https://www.suse.com/security/cve/CVE-2025-71078.html * https://www.suse.com/security/cve/CVE-2025-71079.html * https://www.suse.com/security/cve/CVE-2025-71080.html * https://www.suse.com/security/cve/CVE-2025-71081.html * https://www.suse.com/security/cve/CVE-2025-71082.html * https://www.suse.com/security/cve/CVE-2025-71083.html * https://www.suse.com/security/cve/CVE-2025-71084.html * https://www.suse.com/security/cve/CVE-2025-71085.html * https://www.suse.com/security/cve/CVE-2025-71086.html * https://www.suse.com/security/cve/CVE-2025-71087.html * https://www.suse.com/security/cve/CVE-2025-71088.html * https://www.suse.com/security/cve/CVE-2025-71089.html * https://www.suse.com/security/cve/CVE-2025-71091.html * https://www.suse.com/security/cve/CVE-2025-71093.html * https://www.suse.com/security/cve/CVE-2025-71094.html * https://www.suse.com/security/cve/CVE-2025-71095.html * https://www.suse.com/security/cve/CVE-2025-71097.html * https://www.suse.com/security/cve/CVE-2025-71098.html * https://www.suse.com/security/cve/CVE-2025-71099.html * https://www.suse.com/security/cve/CVE-2025-71100.html * https://www.suse.com/security/cve/CVE-2025-71101.html * https://www.suse.com/security/cve/CVE-2025-71108.html * https://www.suse.com/security/cve/CVE-2025-71111.html * https://www.suse.com/security/cve/CVE-2025-71112.html * https://www.suse.com/security/cve/CVE-2025-71113.html * https://www.suse.com/security/cve/CVE-2025-71114.html * https://www.suse.com/security/cve/CVE-2025-71116.html * https://www.suse.com/security/cve/CVE-2025-71118.html * https://www.suse.com/security/cve/CVE-2025-71119.html * https://www.suse.com/security/cve/CVE-2025-71120.html * https://www.suse.com/security/cve/CVE-2025-71123.html * https://www.suse.com/security/cve/CVE-2025-71126.html * https://www.suse.com/security/cve/CVE-2025-71130.html * https://www.suse.com/security/cve/CVE-2025-71131.html * https://www.suse.com/security/cve/CVE-2025-71132.html * https://www.suse.com/security/cve/CVE-2025-71133.html * https://www.suse.com/security/cve/CVE-2025-71135.html * https://www.suse.com/security/cve/CVE-2025-71136.html * https://www.suse.com/security/cve/CVE-2025-71137.html * https://www.suse.com/security/cve/CVE-2025-71138.html * https://www.suse.com/security/cve/CVE-2025-71141.html * https://www.suse.com/security/cve/CVE-2025-71142.html * https://www.suse.com/security/cve/CVE-2025-71143.html * https://www.suse.com/security/cve/CVE-2025-71145.html * https://www.suse.com/security/cve/CVE-2025-71147.html * https://www.suse.com/security/cve/CVE-2025-71148.html * https://www.suse.com/security/cve/CVE-2025-71149.html * https://www.suse.com/security/cve/CVE-2025-71154.html * https://www.suse.com/security/cve/CVE-2025-71156.html * https://www.suse.com/security/cve/CVE-2025-71157.html * https://www.suse.com/security/cve/CVE-2025-71162.html * https://www.suse.com/security/cve/CVE-2025-71163.html * https://www.suse.com/security/cve/CVE-2026-22976.html * https://www.suse.com/security/cve/CVE-2026-22977.html * https://www.suse.com/security/cve/CVE-2026-22978.html * https://www.suse.com/security/cve/CVE-2026-22981.html * https://www.suse.com/security/cve/CVE-2026-22982.html * https://www.suse.com/security/cve/CVE-2026-22984.html * https://www.suse.com/security/cve/CVE-2026-22985.html * https://www.suse.com/security/cve/CVE-2026-22986.html * https://www.suse.com/security/cve/CVE-2026-22988.html * https://www.suse.com/security/cve/CVE-2026-22989.html * https://www.suse.com/security/cve/CVE-2026-22990.html * https://www.suse.com/security/cve/CVE-2026-22991.html * https://www.suse.com/security/cve/CVE-2026-22992.html * https://www.suse.com/security/cve/CVE-2026-22993.html * https://www.suse.com/security/cve/CVE-2026-22996.html * https://www.suse.com/security/cve/CVE-2026-22997.html * https://www.suse.com/security/cve/CVE-2026-22999.html * https://www.suse.com/security/cve/CVE-2026-23000.html * https://www.suse.com/security/cve/CVE-2026-23001.html * https://www.suse.com/security/cve/CVE-2026-23002.html * https://www.suse.com/security/cve/CVE-2026-23005.html * https://www.suse.com/security/cve/CVE-2026-23006.html * https://www.suse.com/security/cve/CVE-2026-23011.html * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1235905 * https://bugzilla.suse.com/show_bug.cgi?id=1242505 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242986 * https://bugzilla.suse.com/show_bug.cgi?id=1243452 * https://bugzilla.suse.com/show_bug.cgi?id=1243507 * https://bugzilla.suse.com/show_bug.cgi?id=1243662 * https://bugzilla.suse.com/show_bug.cgi?id=1246184 * https://bugzilla.suse.com/show_bug.cgi?id=1246282 * https://bugzilla.suse.com/show_bug.cgi?id=1247030 * https://bugzilla.suse.com/show_bug.cgi?id=1247292 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248175 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248185 * https://bugzilla.suse.com/show_bug.cgi?id=1248188 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248222 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248232 * https://bugzilla.suse.com/show_bug.cgi?id=1248234 * https://bugzilla.suse.com/show_bug.cgi?id=1248240 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248366 * https://bugzilla.suse.com/show_bug.cgi?id=1248384 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1249307 * https://bugzilla.suse.com/show_bug.cgi?id=1249609 * https://bugzilla.suse.com/show_bug.cgi?id=1249895 * https://bugzilla.suse.com/show_bug.cgi?id=1249998 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250082 * https://bugzilla.suse.com/show_bug.cgi?id=1250388 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250738 * https://bugzilla.suse.com/show_bug.cgi?id=1250748 * https://bugzilla.suse.com/show_bug.cgi?id=1252712 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252784 * https://bugzilla.suse.com/show_bug.cgi?id=1252891 * https://bugzilla.suse.com/show_bug.cgi?id=1252900 * https://bugzilla.suse.com/show_bug.cgi?id=1253049 * https://bugzilla.suse.com/show_bug.cgi?id=1253078 * https://bugzilla.suse.com/show_bug.cgi?id=1253079 * https://bugzilla.suse.com/show_bug.cgi?id=1253087 * https://bugzilla.suse.com/show_bug.cgi?id=1253344 * https://bugzilla.suse.com/show_bug.cgi?id=1253500 * https://bugzilla.suse.com/show_bug.cgi?id=1253739 * https://bugzilla.suse.com/show_bug.cgi?id=1254244 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254447 * https://bugzilla.suse.com/show_bug.cgi?id=1254839 * https://bugzilla.suse.com/show_bug.cgi?id=1254842 * https://bugzilla.suse.com/show_bug.cgi?id=1254845 * https://bugzilla.suse.com/show_bug.cgi?id=1254977 * https://bugzilla.suse.com/show_bug.cgi?id=1255102 * https://bugzilla.suse.com/show_bug.cgi?id=1255128 * https://bugzilla.suse.com/show_bug.cgi?id=1255157 * https://bugzilla.suse.com/show_bug.cgi?id=1255164 * https://bugzilla.suse.com/show_bug.cgi?id=1255172 * https://bugzilla.suse.com/show_bug.cgi?id=1255216 * https://bugzilla.suse.com/show_bug.cgi?id=1255232 * https://bugzilla.suse.com/show_bug.cgi?id=1255241 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255266 * https://bugzilla.suse.com/show_bug.cgi?id=1255268 * https://bugzilla.suse.com/show_bug.cgi?id=1255269 * https://bugzilla.suse.com/show_bug.cgi?id=1255319 * https://bugzilla.suse.com/show_bug.cgi?id=1255327 * https://bugzilla.suse.com/show_bug.cgi?id=1255346 * https://bugzilla.suse.com/show_bug.cgi?id=1255403 * https://bugzilla.suse.com/show_bug.cgi?id=1255417 * https://bugzilla.suse.com/show_bug.cgi?id=1255459 * https://bugzilla.suse.com/show_bug.cgi?id=1255482 * https://bugzilla.suse.com/show_bug.cgi?id=1255506 * https://bugzilla.suse.com/show_bug.cgi?id=1255526 * https://bugzilla.suse.com/show_bug.cgi?id=1255527 * https://bugzilla.suse.com/show_bug.cgi?id=1255529 * https://bugzilla.suse.com/show_bug.cgi?id=1255530 * https://bugzilla.suse.com/show_bug.cgi?id=1255536 * https://bugzilla.suse.com/show_bug.cgi?id=1255537 * https://bugzilla.suse.com/show_bug.cgi?id=1255542 * https://bugzilla.suse.com/show_bug.cgi?id=1255544 * https://bugzilla.suse.com/show_bug.cgi?id=1255547 * https://bugzilla.suse.com/show_bug.cgi?id=1255569 * https://bugzilla.suse.com/show_bug.cgi?id=1255593 * https://bugzilla.suse.com/show_bug.cgi?id=1255622 * https://bugzilla.suse.com/show_bug.cgi?id=1255694 * https://bugzilla.suse.com/show_bug.cgi?id=1255695 * https://bugzilla.suse.com/show_bug.cgi?id=1255703 * https://bugzilla.suse.com/show_bug.cgi?id=1255708 * https://bugzilla.suse.com/show_bug.cgi?id=1255811 * https://bugzilla.suse.com/show_bug.cgi?id=1255930 * https://bugzilla.suse.com/show_bug.cgi?id=1256579 * https://bugzilla.suse.com/show_bug.cgi?id=1256582 * https://bugzilla.suse.com/show_bug.cgi?id=1256584 * https://bugzilla.suse.com/show_bug.cgi?id=1256586 * https://bugzilla.suse.com/show_bug.cgi?id=1256591 * https://bugzilla.suse.com/show_bug.cgi?id=1256592 * https://bugzilla.suse.com/show_bug.cgi?id=1256593 * https://bugzilla.suse.com/show_bug.cgi?id=1256594 * https://bugzilla.suse.com/show_bug.cgi?id=1256597 * https://bugzilla.suse.com/show_bug.cgi?id=1256605 * https://bugzilla.suse.com/show_bug.cgi?id=1256607 * https://bugzilla.suse.com/show_bug.cgi?id=1256608 * https://bugzilla.suse.com/show_bug.cgi?id=1256609 * https://bugzilla.suse.com/show_bug.cgi?id=1256610 * https://bugzilla.suse.com/show_bug.cgi?id=1256611 * https://bugzilla.suse.com/show_bug.cgi?id=1256612 * https://bugzilla.suse.com/show_bug.cgi?id=1256613 * https://bugzilla.suse.com/show_bug.cgi?id=1256616 * https://bugzilla.suse.com/show_bug.cgi?id=1256617 * https://bugzilla.suse.com/show_bug.cgi?id=1256619 * https://bugzilla.suse.com/show_bug.cgi?id=1256622 * https://bugzilla.suse.com/show_bug.cgi?id=1256623 * https://bugzilla.suse.com/show_bug.cgi?id=1256625 * https://bugzilla.suse.com/show_bug.cgi?id=1256627 * https://bugzilla.suse.com/show_bug.cgi?id=1256628 * https://bugzilla.suse.com/show_bug.cgi?id=1256630 * https://bugzilla.suse.com/show_bug.cgi?id=1256632 * https://bugzilla.suse.com/show_bug.cgi?id=1256638 * https://bugzilla.suse.com/show_bug.cgi?id=1256641 * https://bugzilla.suse.com/show_bug.cgi?id=1256643 * https://bugzilla.suse.com/show_bug.cgi?id=1256645 * https://bugzilla.suse.com/show_bug.cgi?id=1256646 * https://bugzilla.suse.com/show_bug.cgi?id=1256650 * https://bugzilla.suse.com/show_bug.cgi?id=1256651 * https://bugzilla.suse.com/show_bug.cgi?id=1256653 * https://bugzilla.suse.com/show_bug.cgi?id=1256654 * https://bugzilla.suse.com/show_bug.cgi?id=1256655 * https://bugzilla.suse.com/show_bug.cgi?id=1256656 * https://bugzilla.suse.com/show_bug.cgi?id=1256659 * https://bugzilla.suse.com/show_bug.cgi?id=1256660 * https://bugzilla.suse.com/show_bug.cgi?id=1256661 * https://bugzilla.suse.com/show_bug.cgi?id=1256664 * https://bugzilla.suse.com/show_bug.cgi?id=1256665 * https://bugzilla.suse.com/show_bug.cgi?id=1256667 * https://bugzilla.suse.com/show_bug.cgi?id=1256668 * https://bugzilla.suse.com/show_bug.cgi?id=1256674 * https://bugzilla.suse.com/show_bug.cgi?id=1256677 * https://bugzilla.suse.com/show_bug.cgi?id=1256680 * https://bugzilla.suse.com/show_bug.cgi?id=1256682 * https://bugzilla.suse.com/show_bug.cgi?id=1256683 * https://bugzilla.suse.com/show_bug.cgi?id=1256688 * https://bugzilla.suse.com/show_bug.cgi?id=1256689 * https://bugzilla.suse.com/show_bug.cgi?id=1256716 * https://bugzilla.suse.com/show_bug.cgi?id=1256726 * https://bugzilla.suse.com/show_bug.cgi?id=1256728 * https://bugzilla.suse.com/show_bug.cgi?id=1256730 * https://bugzilla.suse.com/show_bug.cgi?id=1256733 * https://bugzilla.suse.com/show_bug.cgi?id=1256737 * https://bugzilla.suse.com/show_bug.cgi?id=1256741 * https://bugzilla.suse.com/show_bug.cgi?id=1256742 * https://bugzilla.suse.com/show_bug.cgi?id=1256744 * https://bugzilla.suse.com/show_bug.cgi?id=1256748 * https://bugzilla.suse.com/show_bug.cgi?id=1256749 * https://bugzilla.suse.com/show_bug.cgi?id=1256752 * https://bugzilla.suse.com/show_bug.cgi?id=1256754 * https://bugzilla.suse.com/show_bug.cgi?id=1256755 * https://bugzilla.suse.com/show_bug.cgi?id=1256756 * https://bugzilla.suse.com/show_bug.cgi?id=1256757 * https://bugzilla.suse.com/show_bug.cgi?id=1256759 * https://bugzilla.suse.com/show_bug.cgi?id=1256760 * https://bugzilla.suse.com/show_bug.cgi?id=1256761 * https://bugzilla.suse.com/show_bug.cgi?id=1256763 * https://bugzilla.suse.com/show_bug.cgi?id=1256770 * https://bugzilla.suse.com/show_bug.cgi?id=1256773 * https://bugzilla.suse.com/show_bug.cgi?id=1256774 * https://bugzilla.suse.com/show_bug.cgi?id=1256777 * https://bugzilla.suse.com/show_bug.cgi?id=1256779 * https://bugzilla.suse.com/show_bug.cgi?id=1256781 * https://bugzilla.suse.com/show_bug.cgi?id=1256785 * https://bugzilla.suse.com/show_bug.cgi?id=1256792 * https://bugzilla.suse.com/show_bug.cgi?id=1256793 * https://bugzilla.suse.com/show_bug.cgi?id=1256794 * https://bugzilla.suse.com/show_bug.cgi?id=1256864 * https://bugzilla.suse.com/show_bug.cgi?id=1256865 * https://bugzilla.suse.com/show_bug.cgi?id=1256867 * https://bugzilla.suse.com/show_bug.cgi?id=1256975 * https://bugzilla.suse.com/show_bug.cgi?id=1257015 * https://bugzilla.suse.com/show_bug.cgi?id=1257035 * https://bugzilla.suse.com/show_bug.cgi?id=1257053 * https://bugzilla.suse.com/show_bug.cgi?id=1257154 * https://bugzilla.suse.com/show_bug.cgi?id=1257155 * https://bugzilla.suse.com/show_bug.cgi?id=1257158 * https://bugzilla.suse.com/show_bug.cgi?id=1257159 * https://bugzilla.suse.com/show_bug.cgi?id=1257163 * https://bugzilla.suse.com/show_bug.cgi?id=1257164 * https://bugzilla.suse.com/show_bug.cgi?id=1257167 * https://bugzilla.suse.com/show_bug.cgi?id=1257168 * https://bugzilla.suse.com/show_bug.cgi?id=1257179 * https://bugzilla.suse.com/show_bug.cgi?id=1257180 * https://bugzilla.suse.com/show_bug.cgi?id=1257202 * https://bugzilla.suse.com/show_bug.cgi?id=1257204 * https://bugzilla.suse.com/show_bug.cgi?id=1257207 * https://bugzilla.suse.com/show_bug.cgi?id=1257208 * https://bugzilla.suse.com/show_bug.cgi?id=1257215 * https://bugzilla.suse.com/show_bug.cgi?id=1257217 * https://bugzilla.suse.com/show_bug.cgi?id=1257218 * https://bugzilla.suse.com/show_bug.cgi?id=1257220 * https://bugzilla.suse.com/show_bug.cgi?id=1257221 * https://bugzilla.suse.com/show_bug.cgi?id=1257225 * https://bugzilla.suse.com/show_bug.cgi?id=1257227 * https://bugzilla.suse.com/show_bug.cgi?id=1257232 * https://bugzilla.suse.com/show_bug.cgi?id=1257234 * https://bugzilla.suse.com/show_bug.cgi?id=1257236 * https://bugzilla.suse.com/show_bug.cgi?id=1257243 * https://bugzilla.suse.com/show_bug.cgi?id=1257245 * https://bugzilla.suse.com/show_bug.cgi?id=1257276 * https://bugzilla.suse.com/show_bug.cgi?id=1257277 * https://bugzilla.suse.com/show_bug.cgi?id=1257279 * https://bugzilla.suse.com/show_bug.cgi?id=1257282 * https://bugzilla.suse.com/show_bug.cgi?id=1257296 * https://bugzilla.suse.com/show_bug.cgi?id=1257309 * https://bugzilla.suse.com/show_bug.cgi?id=1257473 * https://bugzilla.suse.com/show_bug.cgi?id=1257504 * https://bugzilla.suse.com/show_bug.cgi?id=1257603 * https://jira.suse.com/browse/PED-10906 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-14156 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:36:46 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:36:46 -0000 Subject: SUSE-RU-2026:20569-1: important: Recommended update for aaa_base Message-ID: <177271420636.1872.5627245329279181806@13ea24840d99> # Recommended update for aaa_base Announcement ID: SUSE-RU-2026:20569-1 Release Date: 2026-02-27T10:40:08Z Rating: important References: * bsc#1247286 * bsc#1247495 * bsc#1248158 * bsc#1249686 * bsc#1250513 * bsc#1257875 * jsc#PED-13807 * jsc#PED-14803 Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that contains two features and has six fixes can now be installed. ## Description: This update for aaa_base fixes the following issues: * Update to version 84.87+git20260210.ecce285: * For boo#1257875 get intrinsic DEFAULT_WM back * DIR_COLORS: add vt220 and .jxl * Update to version 84.87+git20260112.8f614f3: * add ghost entries for the removed dirs * Revert list directories above all normal files. * Update to version 84.87+git20251217.34fd7bc: * add tmpfiles template adm-backup.conf (jsc#PED-14803) * Fix old script to support copy mode as well * Support for XDG environment variables for the su, * adapted sugggestions * Patching nsswitch.conf only if it has not been generated by nsswitch-config (jsc#PED-13807). * Avoid nasty exceptions running tput * Update to version 84.87+git20251111.509a363: * Avoid escape sequences on dump terminal of s390 * Update to version 84.87+git20251111.16d9d43: * Set XDG environment variables consistently without trailing slash * Update to version 84.87+git20251110.af063e6: * Avoid escape sequences on dump terminal of s390 * Set erase character from kbs entry of terminfo * Update to version 84.87+git20251030.441f926: * Add systemd to /etc/nsswitch.conf (bsc#1250513) * Add group-directories-first option * prevent normal users from accessing dmesg (bsc#1249686) * Use explicit defaults for XDG environment variables * Update to version 84.87+git20250903.33e5ba4: * Correct fix for (bsc#1247495, bsc#1248158) * Update to version 84.87+git20250805.3069494: * Remove initviocons for tcsh as well and * Update csh.login * Add missing quoting and remove unneeded uses of eval * Update to version 84.87+git20250801.f305627: * Remove sysconfig.language (bsc#1247286) * Update to version 84.87+git20250801.b2fa3fe: * Allow /etc/locale.conf to have no newline ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-327=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20260210.ecce285-160000.1.1 * aaa_base-debugsource-84.87+git20260210.ecce285-160000.1.1 * aaa_base-malloccheck-84.87+git20260210.ecce285-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1247286 * https://bugzilla.suse.com/show_bug.cgi?id=1247495 * https://bugzilla.suse.com/show_bug.cgi?id=1248158 * https://bugzilla.suse.com/show_bug.cgi?id=1249686 * https://bugzilla.suse.com/show_bug.cgi?id=1250513 * https://bugzilla.suse.com/show_bug.cgi?id=1257875 * https://jira.suse.com/browse/PED-13807 * https://jira.suse.com/browse/PED-14803 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:36:50 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:36:50 -0000 Subject: SUSE-RU-2026:20568-1: important: Recommended update for build Message-ID: <177271421071.1872.345015182478137994@13ea24840d99> # Recommended update for build Announcement ID: SUSE-RU-2026:20568-1 Release Date: 2026-02-27T09:21:53Z Rating: important References: * bsc#1248776 * bsc#1251920 Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that has two fixes can now be installed. ## Description: This update for build fixes the following issues: * pbuild: support for _manifest files * VM builds: fix export of mtime out of the build env * config: * tumbleweed syncing * slfo 1.2 updates * Re-create SLE 15 SP7 config (bsc#1251920) * oci-archive: * Support package list introspection * Support sbom generation * Docker.pm: Also handle 'zypper update' * obs-docker-support: Pass --no-refresh to zypper * fail if PKGID can not be queried * Add a workaround to fix builds on debian aarch64 with old systemd versions * Add gzip retry for the sidestore downloads * Revert VCS indenting change to fix reproducible builds * Helm: Use bool type for 'deprecated' * Distribution config updates * rpm: take package name from filename if no name is defined * ARM: qemu emulation uses -cpu max now * Add BuildFlags for changelogfulltimestamps * Fixes for lookaside store download * Create a symlink in /etc/localtime before calling zic * createarchive: implement fallback for old tar versions * Be more strict about the weird [qualifier] dependency extension * Implement bcond_override_default * Make substitutedeps work on the expanded dependencies * Docker: support COPY --from=image * Support an experimental "BuildFlags: cgroup2" * Support an experimental #!BuildTargetStage directive * Support "BuildFlags: rpm-nodebugmagic" * mkosi: Don't include preinstall packages * mkosi: Don't attempt to publish directory artifacts * Fix excluding /dev, /sys, etc. from preinstallimages * Set the source mtime to the commit timestamp for git (boo#1248776) * calculate goname for fedora assets * Make spec2changelog more resiliant to 3rd party spefiles * pbuild: * Fix url construction in remoteurl handling * Fix xz decompression * rpm: * Allow to set extra macros when parsing a specfile * genbuildrequs: set HOME before querying the specfile ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-324=1 ## Package List: * SUSE Linux Micro Extras 6.2 (noarch) * build-mkbaselibs-20260202-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1248776 * https://bugzilla.suse.com/show_bug.cgi?id=1251920 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:36:51 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:36:51 -0000 Subject: SUSE-RU-2026:20567-1: moderate: Recommended update for gcc15 Message-ID: <177271421172.1872.10928831441790247146@13ea24840d99> # Recommended update for gcc15 Announcement ID: SUSE-RU-2026:20567-1 Release Date: 2026-02-26T19:53:38Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that can now be installed. ## Description: This update for gcc15 fixes the following issues: Update to GCC 15.2 release * the GCC 15.2 release contains regression fixes accumulated since the GCC 15.1 release * Fixes PR120714, RISC-V: incorrect frame pointer CFA address for stack-clash protection loops ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-314=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * gcc15-debugsource-15.2.0+git10201-160000.1.1 * gcc15-15.2.0+git10201-160000.1.1 * cpp15-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-debuginfo-15.2.0+git10201-160000.1.1 * cpp15-15.2.0+git10201-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:36:56 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:36:56 -0000 Subject: SUSE-RU-2026:20566-1: important: Recommended update for python-kiwi Message-ID: <177271421649.1872.16949049714332764727@13ea24840d99> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2026:20566-1 Release Date: 2026-02-13T14:05:47Z Rating: important References: * bsc#1253637 * bsc#1254116 Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that has two fixes can now be installed. ## Description: This update for python-kiwi fixes the following issues: * Fixed ramdisk sysroot generator (bsc#1254116) Do not use a custom _dev name and stick with the UUID representation of the disk image in RAM after deployment. Former versions of udev did not create a by-uuid device representation which now seems to have changed. This then leads to the device name RamDisk_rootfs not being created the and respective .device unit times out. In addition the timer unit for the standard device representation changed to infinity. * Delete workflows conflicting with upstream * Fixed spec file requires (bsc#1253637) The package requirement for binutils was set to TW (equal or greater than 1650) only but is also required for SLES16/Leap16 which is 1600 This commit fixes the condition to match with all required distributions ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-271=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kiwi-systemdeps-core-10.2.33-160000.2.1 * python3-kiwi-10.2.33-160000.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253637 * https://bugzilla.suse.com/show_bug.cgi?id=1254116 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:37:16 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:37:16 -0000 Subject: SUSE-RU-2026:20565-1: important: Recommended update for systemd Message-ID: <177271423698.1872.11862175101365221385@13ea24840d99> # Recommended update for systemd Announcement ID: SUSE-RU-2026:20565-1 Release Date: 2026-02-11T11:10:22Z Rating: important References: * bsc#1228081 * bsc#1228659 * bsc#1228728 * bsc#1231986 * bsc#1234765 * bsc#1244449 * bsc#1248356 * bsc#1248501 * bsc#1251981 * bsc#1254563 * bsc#1255326 * bsc#1256427 Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that has 12 fixes can now be installed. ## Description: This update for systemd fixes the following issues: * terminal-util: stop doing 0/upper bound check in tty_is_vc() (bsc#1255326) * core/dbus-manager: propagate meaningful dbus errors from EnqueueMarkedJobs * Name libsystemd-{shared,core} based on the major version of systemd and the package release number (bsc#1228081, bsc#1256427) * systemd-update-helper: clean up the flags immediately after they have been consumed. * systemd.spec: don't reexecute PID1 on transactional updates. * Drop most of the workarounds contained in the fixlets. * Drop %filetriggers build flag. It was introduced to ease backport of Base:System to SLE distros where file-triggers were unreliable but that is no longer the case on the latest SLE distros. * Fix: systemd Tainted: unmerged-bin (bsc#1228728, bsc#1251981) * timer: rebase last_trigger timestamp if needed * timer: rebase the next elapse timestamp only if timer didn't already run * main: switch explicitly to tty1 on soft-reboot (bsc#1231986) * terminal-util: modernize vtnr_from_tty() a bit * units: don't force the loading of the loop and dm_mod modules in systemd- repart.service (bsc#1248356) * systemd.spec: use %sysusers_generate_pre so that some systemd users are already available in %pre (bsc#1248501) * core/cgroup: Properly handle aborting a pending freeze operation * detect-virt: add bare-metal support for GCE (bsc#1244449) * uki.conf is used by the ukify tool to create an Unified Kernel Image[...] * Make sure that the ordering trick used to update the udev package as close as as possible to the update of the systemd package also works with zypper. * Fix: Snapshot 20240730 - unbootable after transactional-update dup (bsc#1228659) * We also need to add "Suggests: udev", which serves the same purpose as "OrderWithRequires: udev" but is part of the repository metadata. It should therefore hint zypper to install systemd and udev as close together as possible * Fix systemd-network recommending libidn2-devel (bsc#1234765) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-252=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * systemd-debugsource-257.10-160000.1.1 * systemd-devel-257.10-160000.1.1 * systemd-debuginfo-257.10-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228081 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1228728 * https://bugzilla.suse.com/show_bug.cgi?id=1231986 * https://bugzilla.suse.com/show_bug.cgi?id=1234765 * https://bugzilla.suse.com/show_bug.cgi?id=1244449 * https://bugzilla.suse.com/show_bug.cgi?id=1248356 * https://bugzilla.suse.com/show_bug.cgi?id=1248501 * https://bugzilla.suse.com/show_bug.cgi?id=1251981 * https://bugzilla.suse.com/show_bug.cgi?id=1254563 * https://bugzilla.suse.com/show_bug.cgi?id=1255326 * https://bugzilla.suse.com/show_bug.cgi?id=1256427 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:43:30 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:43:30 -0000 Subject: SUSE-SU-2026:20564-1: important: Security update for the Linux Kernel Message-ID: <177271461063.1872.7681985491206174491@13ea24840d99> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20564-1 Release Date: 2026-02-02T09:27:27Z Rating: important References: * bsc#1205462 * bsc#1214285 * bsc#1243112 * bsc#1245193 * bsc#1247500 * bsc#1250388 * bsc#1252046 * bsc#1252861 * bsc#1253155 * bsc#1253238 * bsc#1253262 * bsc#1253365 * bsc#1253400 * bsc#1253413 * bsc#1253414 * bsc#1253442 * bsc#1253458 * bsc#1253623 * bsc#1253674 * bsc#1253739 * bsc#1254126 * bsc#1254128 * bsc#1254195 * bsc#1254244 * bsc#1254363 * bsc#1254378 * bsc#1254408 * bsc#1254477 * bsc#1254510 * bsc#1254518 * bsc#1254519 * bsc#1254520 * bsc#1254615 * bsc#1254616 * bsc#1254618 * bsc#1254621 * bsc#1254624 * bsc#1254791 * bsc#1254793 * bsc#1254794 * bsc#1254795 * bsc#1254796 * bsc#1254797 * bsc#1254798 * bsc#1254808 * bsc#1254809 * bsc#1254813 * bsc#1254815 * bsc#1254821 * bsc#1254824 * bsc#1254825 * bsc#1254827 * bsc#1254828 * bsc#1254829 * bsc#1254830 * bsc#1254832 * bsc#1254835 * bsc#1254840 * bsc#1254843 * bsc#1254846 * bsc#1254847 * bsc#1254849 * bsc#1254850 * bsc#1254851 * bsc#1254852 * bsc#1254854 * bsc#1254856 * bsc#1254858 * bsc#1254860 * bsc#1254861 * bsc#1254864 * bsc#1254868 * bsc#1254869 * bsc#1254871 * bsc#1254894 * bsc#1254957 * bsc#1254959 * bsc#1254961 * bsc#1254964 * bsc#1254996 * bsc#1255026 * bsc#1255030 * bsc#1255034 * bsc#1255035 * bsc#1255039 * bsc#1255040 * bsc#1255041 * bsc#1255042 * bsc#1255057 * bsc#1255058 * bsc#1255064 * bsc#1255065 * bsc#1255068 * bsc#1255071 * bsc#1255072 * bsc#1255075 * bsc#1255077 * bsc#1255081 * bsc#1255082 * bsc#1255083 * bsc#1255087 * bsc#1255092 * bsc#1255094 * bsc#1255095 * bsc#1255097 * bsc#1255099 * bsc#1255103 * bsc#1255116 * bsc#1255120 * bsc#1255121 * bsc#1255122 * bsc#1255124 * bsc#1255131 * bsc#1255134 * bsc#1255135 * bsc#1255136 * bsc#1255138 * bsc#1255140 * bsc#1255142 * bsc#1255145 * bsc#1255146 * bsc#1255149 * bsc#1255150 * bsc#1255152 * bsc#1255154 * bsc#1255155 * bsc#1255156 * bsc#1255161 * bsc#1255167 * bsc#1255169 * bsc#1255171 * bsc#1255175 * bsc#1255179 * bsc#1255181 * bsc#1255182 * bsc#1255186 * bsc#1255187 * bsc#1255190 * bsc#1255193 * bsc#1255196 * bsc#1255197 * bsc#1255199 * bsc#1255202 * bsc#1255203 * bsc#1255206 * bsc#1255209 * bsc#1255218 * bsc#1255220 * bsc#1255221 * bsc#1255223 * bsc#1255226 * bsc#1255227 * bsc#1255228 * bsc#1255230 * bsc#1255231 * bsc#1255233 * bsc#1255234 * bsc#1255242 * bsc#1255243 * bsc#1255246 * bsc#1255247 * bsc#1255251 * bsc#1255252 * bsc#1255253 * bsc#1255255 * bsc#1255256 * bsc#1255259 * bsc#1255260 * bsc#1255261 * bsc#1255262 * bsc#1255272 * bsc#1255273 * bsc#1255274 * bsc#1255276 * bsc#1255279 * bsc#1255297 * bsc#1255312 * bsc#1255316 * bsc#1255318 * bsc#1255325 * bsc#1255329 * bsc#1255346 * bsc#1255349 * bsc#1255351 * bsc#1255354 * bsc#1255357 * bsc#1255377 * bsc#1255379 * bsc#1255380 * bsc#1255395 * bsc#1255401 * bsc#1255415 * bsc#1255428 * bsc#1255433 * bsc#1255434 * bsc#1255480 * bsc#1255483 * bsc#1255488 * bsc#1255489 * bsc#1255493 * bsc#1255495 * bsc#1255505 * bsc#1255507 * bsc#1255508 * bsc#1255509 * bsc#1255533 * bsc#1255541 * bsc#1255550 * bsc#1255552 * bsc#1255553 * bsc#1255567 * bsc#1255580 * bsc#1255601 * bsc#1255603 * bsc#1255611 * bsc#1255614 * bsc#1255672 * bsc#1255688 * bsc#1255698 * bsc#1255706 * bsc#1255707 * bsc#1255709 * bsc#1255722 * bsc#1255723 * bsc#1255724 * bsc#1255812 * bsc#1255813 * bsc#1255814 * bsc#1255816 * bsc#1255931 * bsc#1255932 * bsc#1255934 * bsc#1255943 * bsc#1255944 * bsc#1256238 * bsc#1256495 * bsc#1256606 * bsc#1256794 * jsc#PED-12745 * jsc#PED-14344 * jsc#PED-14571 Cross-References: * CVE-2025-38704 * CVE-2025-39880 * CVE-2025-39977 * CVE-2025-40042 * CVE-2025-40123 * CVE-2025-40130 * CVE-2025-40160 * CVE-2025-40167 * CVE-2025-40170 * CVE-2025-40179 * CVE-2025-40190 * CVE-2025-40209 * CVE-2025-40211 * CVE-2025-40212 * CVE-2025-40213 * CVE-2025-40214 * CVE-2025-40215 * CVE-2025-40218 * CVE-2025-40219 * CVE-2025-40220 * CVE-2025-40221 * CVE-2025-40223 * CVE-2025-40225 * CVE-2025-40226 * CVE-2025-40231 * CVE-2025-40233 * CVE-2025-40235 * CVE-2025-40237 * CVE-2025-40238 * CVE-2025-40239 * CVE-2025-40240 * CVE-2025-40242 * CVE-2025-40246 * CVE-2025-40248 * CVE-2025-40250 * CVE-2025-40251 * CVE-2025-40252 * CVE-2025-40254 * CVE-2025-40255 * CVE-2025-40256 * CVE-2025-40258 * CVE-2025-40262 * CVE-2025-40263 * CVE-2025-40264 * CVE-2025-40266 * CVE-2025-40268 * CVE-2025-40269 * CVE-2025-40271 * CVE-2025-40272 * CVE-2025-40273 * CVE-2025-40274 * CVE-2025-40275 * CVE-2025-40276 * CVE-2025-40277 * CVE-2025-40278 * CVE-2025-40279 * CVE-2025-40280 * CVE-2025-40282 * CVE-2025-40283 * CVE-2025-40284 * CVE-2025-40287 * CVE-2025-40288 * CVE-2025-40289 * CVE-2025-40292 * CVE-2025-40293 * CVE-2025-40294 * CVE-2025-40297 * CVE-2025-40301 * CVE-2025-40302 * CVE-2025-40303 * CVE-2025-40304 * CVE-2025-40307 * CVE-2025-40308 * CVE-2025-40309 * CVE-2025-40310 * CVE-2025-40311 * CVE-2025-40314 * CVE-2025-40315 * CVE-2025-40316 * CVE-2025-40317 * CVE-2025-40318 * CVE-2025-40319 * CVE-2025-40320 * CVE-2025-40321 * CVE-2025-40322 * CVE-2025-40323 * CVE-2025-40324 * CVE-2025-40328 * CVE-2025-40329 * CVE-2025-40330 * CVE-2025-40331 * CVE-2025-40332 * CVE-2025-40337 * CVE-2025-40338 * CVE-2025-40339 * CVE-2025-40340 * CVE-2025-40342 * CVE-2025-40343 * CVE-2025-40344 * CVE-2025-40345 * CVE-2025-40346 * CVE-2025-40347 * CVE-2025-40350 * CVE-2025-40353 * CVE-2025-40354 * CVE-2025-40355 * CVE-2025-40357 * CVE-2025-40359 * CVE-2025-40360 * CVE-2025-40362 * CVE-2025-68167 * CVE-2025-68170 * CVE-2025-68171 * CVE-2025-68172 * CVE-2025-68176 * CVE-2025-68180 * CVE-2025-68181 * CVE-2025-68183 * CVE-2025-68184 * CVE-2025-68185 * CVE-2025-68190 * CVE-2025-68192 * CVE-2025-68194 * CVE-2025-68195 * CVE-2025-68197 * CVE-2025-68198 * CVE-2025-68201 * CVE-2025-68202 * CVE-2025-68206 * CVE-2025-68207 * CVE-2025-68208 * CVE-2025-68209 * CVE-2025-68210 * CVE-2025-68213 * CVE-2025-68215 * CVE-2025-68217 * CVE-2025-68222 * CVE-2025-68223 * CVE-2025-68230 * CVE-2025-68233 * CVE-2025-68235 * CVE-2025-68237 * CVE-2025-68238 * CVE-2025-68239 * CVE-2025-68242 * CVE-2025-68244 * CVE-2025-68249 * CVE-2025-68252 * CVE-2025-68254 * CVE-2025-68255 * CVE-2025-68256 * CVE-2025-68257 * CVE-2025-68258 * CVE-2025-68259 * CVE-2025-68264 * CVE-2025-68283 * CVE-2025-68284 * CVE-2025-68285 * CVE-2025-68286 * CVE-2025-68287 * CVE-2025-68289 * CVE-2025-68290 * CVE-2025-68293 * CVE-2025-68298 * CVE-2025-68301 * CVE-2025-68302 * CVE-2025-68303 * CVE-2025-68305 * CVE-2025-68306 * CVE-2025-68307 * CVE-2025-68308 * CVE-2025-68311 * CVE-2025-68312 * CVE-2025-68313 * CVE-2025-68317 * CVE-2025-68327 * CVE-2025-68328 * CVE-2025-68330 * CVE-2025-68331 * CVE-2025-68332 * CVE-2025-68335 * CVE-2025-68339 * CVE-2025-68340 * CVE-2025-68342 * CVE-2025-68343 * CVE-2025-68344 * CVE-2025-68345 * CVE-2025-68346 * CVE-2025-68347 * CVE-2025-68351 * CVE-2025-68352 * CVE-2025-68353 * CVE-2025-68354 * CVE-2025-68362 * CVE-2025-68363 * CVE-2025-68378 * CVE-2025-68380 * CVE-2025-68724 * CVE-2025-68732 * CVE-2025-68736 * CVE-2025-68740 * CVE-2025-68742 * CVE-2025-68744 * CVE-2025-68746 * CVE-2025-68747 * CVE-2025-68748 * CVE-2025-68749 * CVE-2025-68750 * CVE-2025-68753 * CVE-2025-68757 * CVE-2025-68758 * CVE-2025-68759 * CVE-2025-68765 * CVE-2025-68766 * CVE-2025-71096 CVSS scores: * CVE-2025-38704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39977 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40130 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40130 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40160 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40160 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40167 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40170 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40170 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40179 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40179 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40190 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40190 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40209 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40209 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40211 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40211 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40212 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40212 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40214 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40214 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40215 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40219 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40221 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40221 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40242 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40251 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40255 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40266 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-40266 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L * CVE-2025-40268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40269 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40271 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40279 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40279 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40280 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40282 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40282 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40283 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40283 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40284 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40284 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40289 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40292 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40292 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-40293 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40293 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40294 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-40294 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-40297 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40301 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40301 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-40302 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40302 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40303 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40303 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40309 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40310 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40311 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40314 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40314 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40322 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40322 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40323 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40323 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40338 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40338 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40339 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40340 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40342 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40342 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40343 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40343 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40345 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40345 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40346 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40353 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40353 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40354 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40355 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40357 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40357 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40359 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40362 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40362 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68167 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68183 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68194 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68208 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68223 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68223 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68254 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68255 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68255 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68256 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68264 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68264 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68283 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68283 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68284 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68284 ( SUSE ): 7.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68285 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68306 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68307 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68307 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68311 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68313 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68313 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68317 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-68317 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-68327 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68327 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68328 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68328 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68330 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68331 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68331 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68339 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68339 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68340 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68340 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68340 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68342 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68342 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-68343 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68343 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-68344 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68344 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68347 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68347 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68351 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68732 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68736 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68736 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N * CVE-2025-68740 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68742 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68742 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68744 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68746 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68747 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68747 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68748 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68748 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68749 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68749 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68750 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68750 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-68757 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68758 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68758 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68766 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68766 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71096 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71096 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves 215 vulnerabilities, contains three features and has 23 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-38704: rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer (bsc#1254408). * CVE-2025-39880: ceph: fix race condition validating r_parent before applying state (bsc#1250388). * CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046). * CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861). * CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365). * CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling * CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400). * CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458). * CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413). * CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442). * CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr update (bsc#1253623). * CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1254961). * CVE-2025-40215: xfrm: delete x->tunnel as we delete x (bsc#1254959). * CVE-2025-40218: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success (bsc#1254964). * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). * CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport() (bsc#1254815). * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). * CVE-2025-40237: fs/notify: call exportfs_encode_fid with s_umount (bsc#1254809). * CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871). * CVE-2025-40239: net: phy: micrel: always set shared->phydev for LAN8814 (bsc#1254868). * CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075). * CVE-2025-40246: xfs: fix out of bounds memory read error in symlink repair (bsc#1254861). * CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864). * CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq() failure (bsc#1254854). * CVE-2025-40251: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (bsc#1254856). * CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849). * CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852). * CVE-2025-40255: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() (bsc#1255156). * CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843). * CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835). * CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param (bsc#1255082). * CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297). * CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying (bsc#1254830). * CVE-2025-40276: drm/panthor: Flush shmem writes before mapping buffers CPU- uncached (bsc#1254824). * CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825). * CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846). * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). * CVE-2025-40292: virtio-net: fix received length check in big packets (bsc#1255175). * CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking (bsc#1255179). * CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187). * CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer (bsc#1254794). * CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624). * CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616). * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). * CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between components (bsc#1255273). * CVE-2025-40346: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (bsc#1255318). * CVE-2025-40347: net: enetc: fix the deadlock of enetc_mdio_lock (bsc#1255262). * CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260). * CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261). * CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump (bsc#1255097). * CVE-2025-40359: perf/x86/intel: Fix KASAN global-out-of-bounds warning (bsc#1255087). * CVE-2025-40362: ceph: fix multifs mds auth caps issue (bsc#1255103). * CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255). * CVE-2025-68197: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() (bsc#1255242). * CVE-2025-68198: crash: fix crashkernel resource shrink (bsc#1255243). * CVE-2025-68202: sched_ext: Fix unsafe locking in the scx_dump_state() (bsc#1255223). * CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142). * CVE-2025-68208: bpf: account for current allocated stack depth in widen_imprecise_scalars() (bsc#1255227). * CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230). * CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226). * CVE-2025-68239: binfmt_misc: restore write access before closing files opened by open_exec() (bsc#1255272). * CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199). * CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380). * CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379). * CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377). * CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401). * CVE-2025-68293: mm/huge_memory: fix NULL pointer deference when splitting folio (bsc#1255150). * CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120). * CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx() (bsc#1255121). * CVE-2025-68317: io_uring/zctx: check chained notif contexts (bsc#1255354). * CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507). * CVE-2025-68353: net: vxlan: prevent NULL deref in vxlan_xmit_one (bsc#1255533). * CVE-2025-68363: bpf: Check skb->transport_header is set in bpf_skb_check_mtu (bsc#1255552). * CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper function (bsc#1255614). * CVE-2025-68736: landlock: Optimize file path walks and prepare for audit support (bsc#1255698). * CVE-2025-68742: bpf: Fix invalid prog->stats access when update_effective_progs fails (bsc#1255707). * CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps (bsc#1255709). * CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606). The following non security issues were fixed: * KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255672). * Set HZ=1000 for ppc64 default configuration (jsc#PED-14344) * bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433). * btrfs: handle aligned EOF truncation correctly for subpage cases (bsc#1253238). * cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434). * cifs: update dstaddr whenever channel iface is updated (git-fixes). * cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026). * cpuset: fix warning when disabling remote partition (bsc#1256794). * ext4: use optimized mballoc scanning regardless of inode format (bsc#1254378). * net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes). * netdevsim: print human readable IP address (bsc#1255071). * powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029). * powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493 bsc#1254244 ltc#216496). * sched: Increase sched_tick_remote timeout (bsc#1254510). * selftests: net: fib-onlink-tests: Set high metric for default IPv6 route (bsc#1255346). * selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349). * selftests: net: use slowwait to stabilize vrf_route_leaking test (bsc#1255349). * serial: xilinx_uartps: Use helper function hrtimer_update_function() (stable-fixes). * supported.conf: Mark lan 743x supported (jsc#PED-14571) * tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477). * wifi: ath10k: Avoid vdev delete timeout when firmware is already down (stable-fixes). * x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256495). * x86/microcode/AMD: Make __verify_patch_size() return bool (bsc#1256495). * x86/microcode/AMD: Remove bogus comment from parse_container() (bsc#1256495). * x86/microcode/AMD: Select which microcode patch to load (bsc#1256495). * x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256495). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-230=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-6.12.0-160000.9.1 * kernel-obs-build-6.12.0-160000.9.1 * kernel-syms-6.12.0-160000.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-38704.html * https://www.suse.com/security/cve/CVE-2025-39880.html * https://www.suse.com/security/cve/CVE-2025-39977.html * https://www.suse.com/security/cve/CVE-2025-40042.html * https://www.suse.com/security/cve/CVE-2025-40123.html * https://www.suse.com/security/cve/CVE-2025-40130.html * https://www.suse.com/security/cve/CVE-2025-40160.html * https://www.suse.com/security/cve/CVE-2025-40167.html * https://www.suse.com/security/cve/CVE-2025-40170.html * https://www.suse.com/security/cve/CVE-2025-40179.html * https://www.suse.com/security/cve/CVE-2025-40190.html * https://www.suse.com/security/cve/CVE-2025-40209.html * https://www.suse.com/security/cve/CVE-2025-40211.html * https://www.suse.com/security/cve/CVE-2025-40212.html * https://www.suse.com/security/cve/CVE-2025-40213.html * https://www.suse.com/security/cve/CVE-2025-40214.html * https://www.suse.com/security/cve/CVE-2025-40215.html * https://www.suse.com/security/cve/CVE-2025-40218.html * https://www.suse.com/security/cve/CVE-2025-40219.html * https://www.suse.com/security/cve/CVE-2025-40220.html * https://www.suse.com/security/cve/CVE-2025-40221.html * https://www.suse.com/security/cve/CVE-2025-40223.html * https://www.suse.com/security/cve/CVE-2025-40225.html * https://www.suse.com/security/cve/CVE-2025-40226.html * https://www.suse.com/security/cve/CVE-2025-40231.html * https://www.suse.com/security/cve/CVE-2025-40233.html * https://www.suse.com/security/cve/CVE-2025-40235.html * https://www.suse.com/security/cve/CVE-2025-40237.html * https://www.suse.com/security/cve/CVE-2025-40238.html * https://www.suse.com/security/cve/CVE-2025-40239.html * https://www.suse.com/security/cve/CVE-2025-40240.html * https://www.suse.com/security/cve/CVE-2025-40242.html * https://www.suse.com/security/cve/CVE-2025-40246.html * https://www.suse.com/security/cve/CVE-2025-40248.html * https://www.suse.com/security/cve/CVE-2025-40250.html * https://www.suse.com/security/cve/CVE-2025-40251.html * https://www.suse.com/security/cve/CVE-2025-40252.html * https://www.suse.com/security/cve/CVE-2025-40254.html * https://www.suse.com/security/cve/CVE-2025-40255.html * https://www.suse.com/security/cve/CVE-2025-40256.html * https://www.suse.com/security/cve/CVE-2025-40258.html * https://www.suse.com/security/cve/CVE-2025-40262.html * https://www.suse.com/security/cve/CVE-2025-40263.html * https://www.suse.com/security/cve/CVE-2025-40264.html * https://www.suse.com/security/cve/CVE-2025-40266.html * https://www.suse.com/security/cve/CVE-2025-40268.html * https://www.suse.com/security/cve/CVE-2025-40269.html * https://www.suse.com/security/cve/CVE-2025-40271.html * https://www.suse.com/security/cve/CVE-2025-40272.html * https://www.suse.com/security/cve/CVE-2025-40273.html * https://www.suse.com/security/cve/CVE-2025-40274.html * https://www.suse.com/security/cve/CVE-2025-40275.html * https://www.suse.com/security/cve/CVE-2025-40276.html * https://www.suse.com/security/cve/CVE-2025-40277.html * https://www.suse.com/security/cve/CVE-2025-40278.html * https://www.suse.com/security/cve/CVE-2025-40279.html * https://www.suse.com/security/cve/CVE-2025-40280.html * https://www.suse.com/security/cve/CVE-2025-40282.html * https://www.suse.com/security/cve/CVE-2025-40283.html * https://www.suse.com/security/cve/CVE-2025-40284.html * https://www.suse.com/security/cve/CVE-2025-40287.html * https://www.suse.com/security/cve/CVE-2025-40288.html * https://www.suse.com/security/cve/CVE-2025-40289.html * https://www.suse.com/security/cve/CVE-2025-40292.html * https://www.suse.com/security/cve/CVE-2025-40293.html * https://www.suse.com/security/cve/CVE-2025-40294.html * https://www.suse.com/security/cve/CVE-2025-40297.html * https://www.suse.com/security/cve/CVE-2025-40301.html * https://www.suse.com/security/cve/CVE-2025-40302.html * https://www.suse.com/security/cve/CVE-2025-40303.html * https://www.suse.com/security/cve/CVE-2025-40304.html * https://www.suse.com/security/cve/CVE-2025-40307.html * https://www.suse.com/security/cve/CVE-2025-40308.html * https://www.suse.com/security/cve/CVE-2025-40309.html * https://www.suse.com/security/cve/CVE-2025-40310.html * https://www.suse.com/security/cve/CVE-2025-40311.html * https://www.suse.com/security/cve/CVE-2025-40314.html * https://www.suse.com/security/cve/CVE-2025-40315.html * https://www.suse.com/security/cve/CVE-2025-40316.html * https://www.suse.com/security/cve/CVE-2025-40317.html * https://www.suse.com/security/cve/CVE-2025-40318.html * https://www.suse.com/security/cve/CVE-2025-40319.html * https://www.suse.com/security/cve/CVE-2025-40320.html * https://www.suse.com/security/cve/CVE-2025-40321.html * https://www.suse.com/security/cve/CVE-2025-40322.html * https://www.suse.com/security/cve/CVE-2025-40323.html * https://www.suse.com/security/cve/CVE-2025-40324.html * https://www.suse.com/security/cve/CVE-2025-40328.html * https://www.suse.com/security/cve/CVE-2025-40329.html * https://www.suse.com/security/cve/CVE-2025-40330.html * https://www.suse.com/security/cve/CVE-2025-40331.html * https://www.suse.com/security/cve/CVE-2025-40332.html * https://www.suse.com/security/cve/CVE-2025-40337.html * https://www.suse.com/security/cve/CVE-2025-40338.html * https://www.suse.com/security/cve/CVE-2025-40339.html * https://www.suse.com/security/cve/CVE-2025-40340.html * https://www.suse.com/security/cve/CVE-2025-40342.html * https://www.suse.com/security/cve/CVE-2025-40343.html * https://www.suse.com/security/cve/CVE-2025-40344.html * https://www.suse.com/security/cve/CVE-2025-40345.html * https://www.suse.com/security/cve/CVE-2025-40346.html * https://www.suse.com/security/cve/CVE-2025-40347.html * https://www.suse.com/security/cve/CVE-2025-40350.html * https://www.suse.com/security/cve/CVE-2025-40353.html * https://www.suse.com/security/cve/CVE-2025-40354.html * https://www.suse.com/security/cve/CVE-2025-40355.html * https://www.suse.com/security/cve/CVE-2025-40357.html * https://www.suse.com/security/cve/CVE-2025-40359.html * https://www.suse.com/security/cve/CVE-2025-40360.html * https://www.suse.com/security/cve/CVE-2025-40362.html * https://www.suse.com/security/cve/CVE-2025-68167.html * https://www.suse.com/security/cve/CVE-2025-68170.html * https://www.suse.com/security/cve/CVE-2025-68171.html * https://www.suse.com/security/cve/CVE-2025-68172.html * https://www.suse.com/security/cve/CVE-2025-68176.html * https://www.suse.com/security/cve/CVE-2025-68180.html * https://www.suse.com/security/cve/CVE-2025-68181.html * https://www.suse.com/security/cve/CVE-2025-68183.html * https://www.suse.com/security/cve/CVE-2025-68184.html * https://www.suse.com/security/cve/CVE-2025-68185.html * https://www.suse.com/security/cve/CVE-2025-68190.html * https://www.suse.com/security/cve/CVE-2025-68192.html * https://www.suse.com/security/cve/CVE-2025-68194.html * https://www.suse.com/security/cve/CVE-2025-68195.html * https://www.suse.com/security/cve/CVE-2025-68197.html * https://www.suse.com/security/cve/CVE-2025-68198.html * https://www.suse.com/security/cve/CVE-2025-68201.html * https://www.suse.com/security/cve/CVE-2025-68202.html * https://www.suse.com/security/cve/CVE-2025-68206.html * https://www.suse.com/security/cve/CVE-2025-68207.html * https://www.suse.com/security/cve/CVE-2025-68208.html * https://www.suse.com/security/cve/CVE-2025-68209.html * https://www.suse.com/security/cve/CVE-2025-68210.html * https://www.suse.com/security/cve/CVE-2025-68213.html * https://www.suse.com/security/cve/CVE-2025-68215.html * https://www.suse.com/security/cve/CVE-2025-68217.html * https://www.suse.com/security/cve/CVE-2025-68222.html * https://www.suse.com/security/cve/CVE-2025-68223.html * https://www.suse.com/security/cve/CVE-2025-68230.html * https://www.suse.com/security/cve/CVE-2025-68233.html * https://www.suse.com/security/cve/CVE-2025-68235.html * https://www.suse.com/security/cve/CVE-2025-68237.html * https://www.suse.com/security/cve/CVE-2025-68238.html * https://www.suse.com/security/cve/CVE-2025-68239.html * https://www.suse.com/security/cve/CVE-2025-68242.html * https://www.suse.com/security/cve/CVE-2025-68244.html * https://www.suse.com/security/cve/CVE-2025-68249.html * https://www.suse.com/security/cve/CVE-2025-68252.html * https://www.suse.com/security/cve/CVE-2025-68254.html * https://www.suse.com/security/cve/CVE-2025-68255.html * https://www.suse.com/security/cve/CVE-2025-68256.html * https://www.suse.com/security/cve/CVE-2025-68257.html * https://www.suse.com/security/cve/CVE-2025-68258.html * https://www.suse.com/security/cve/CVE-2025-68259.html * https://www.suse.com/security/cve/CVE-2025-68264.html * https://www.suse.com/security/cve/CVE-2025-68283.html * https://www.suse.com/security/cve/CVE-2025-68284.html * https://www.suse.com/security/cve/CVE-2025-68285.html * https://www.suse.com/security/cve/CVE-2025-68286.html * https://www.suse.com/security/cve/CVE-2025-68287.html * https://www.suse.com/security/cve/CVE-2025-68289.html * https://www.suse.com/security/cve/CVE-2025-68290.html * https://www.suse.com/security/cve/CVE-2025-68293.html * https://www.suse.com/security/cve/CVE-2025-68298.html * https://www.suse.com/security/cve/CVE-2025-68301.html * https://www.suse.com/security/cve/CVE-2025-68302.html * https://www.suse.com/security/cve/CVE-2025-68303.html * https://www.suse.com/security/cve/CVE-2025-68305.html * https://www.suse.com/security/cve/CVE-2025-68306.html * https://www.suse.com/security/cve/CVE-2025-68307.html * https://www.suse.com/security/cve/CVE-2025-68308.html * https://www.suse.com/security/cve/CVE-2025-68311.html * https://www.suse.com/security/cve/CVE-2025-68312.html * https://www.suse.com/security/cve/CVE-2025-68313.html * https://www.suse.com/security/cve/CVE-2025-68317.html * https://www.suse.com/security/cve/CVE-2025-68327.html * https://www.suse.com/security/cve/CVE-2025-68328.html * https://www.suse.com/security/cve/CVE-2025-68330.html * https://www.suse.com/security/cve/CVE-2025-68331.html * https://www.suse.com/security/cve/CVE-2025-68332.html * https://www.suse.com/security/cve/CVE-2025-68335.html * https://www.suse.com/security/cve/CVE-2025-68339.html * https://www.suse.com/security/cve/CVE-2025-68340.html * https://www.suse.com/security/cve/CVE-2025-68342.html * https://www.suse.com/security/cve/CVE-2025-68343.html * https://www.suse.com/security/cve/CVE-2025-68344.html * https://www.suse.com/security/cve/CVE-2025-68345.html * https://www.suse.com/security/cve/CVE-2025-68346.html * https://www.suse.com/security/cve/CVE-2025-68347.html * https://www.suse.com/security/cve/CVE-2025-68351.html * https://www.suse.com/security/cve/CVE-2025-68352.html * https://www.suse.com/security/cve/CVE-2025-68353.html * https://www.suse.com/security/cve/CVE-2025-68354.html * https://www.suse.com/security/cve/CVE-2025-68362.html * https://www.suse.com/security/cve/CVE-2025-68363.html * https://www.suse.com/security/cve/CVE-2025-68378.html * https://www.suse.com/security/cve/CVE-2025-68380.html * https://www.suse.com/security/cve/CVE-2025-68724.html * https://www.suse.com/security/cve/CVE-2025-68732.html * https://www.suse.com/security/cve/CVE-2025-68736.html * https://www.suse.com/security/cve/CVE-2025-68740.html * https://www.suse.com/security/cve/CVE-2025-68742.html * https://www.suse.com/security/cve/CVE-2025-68744.html * https://www.suse.com/security/cve/CVE-2025-68746.html * https://www.suse.com/security/cve/CVE-2025-68747.html * https://www.suse.com/security/cve/CVE-2025-68748.html * https://www.suse.com/security/cve/CVE-2025-68749.html * https://www.suse.com/security/cve/CVE-2025-68750.html * https://www.suse.com/security/cve/CVE-2025-68753.html * https://www.suse.com/security/cve/CVE-2025-68757.html * https://www.suse.com/security/cve/CVE-2025-68758.html * https://www.suse.com/security/cve/CVE-2025-68759.html * https://www.suse.com/security/cve/CVE-2025-68765.html * https://www.suse.com/security/cve/CVE-2025-68766.html * https://www.suse.com/security/cve/CVE-2025-71096.html * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1250388 * https://bugzilla.suse.com/show_bug.cgi?id=1252046 * https://bugzilla.suse.com/show_bug.cgi?id=1252861 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253238 * https://bugzilla.suse.com/show_bug.cgi?id=1253262 * https://bugzilla.suse.com/show_bug.cgi?id=1253365 * https://bugzilla.suse.com/show_bug.cgi?id=1253400 * https://bugzilla.suse.com/show_bug.cgi?id=1253413 * https://bugzilla.suse.com/show_bug.cgi?id=1253414 * https://bugzilla.suse.com/show_bug.cgi?id=1253442 * https://bugzilla.suse.com/show_bug.cgi?id=1253458 * https://bugzilla.suse.com/show_bug.cgi?id=1253623 * https://bugzilla.suse.com/show_bug.cgi?id=1253674 * https://bugzilla.suse.com/show_bug.cgi?id=1253739 * https://bugzilla.suse.com/show_bug.cgi?id=1254126 * https://bugzilla.suse.com/show_bug.cgi?id=1254128 * https://bugzilla.suse.com/show_bug.cgi?id=1254195 * https://bugzilla.suse.com/show_bug.cgi?id=1254244 * https://bugzilla.suse.com/show_bug.cgi?id=1254363 * https://bugzilla.suse.com/show_bug.cgi?id=1254378 * https://bugzilla.suse.com/show_bug.cgi?id=1254408 * https://bugzilla.suse.com/show_bug.cgi?id=1254477 * https://bugzilla.suse.com/show_bug.cgi?id=1254510 * https://bugzilla.suse.com/show_bug.cgi?id=1254518 * https://bugzilla.suse.com/show_bug.cgi?id=1254519 * https://bugzilla.suse.com/show_bug.cgi?id=1254520 * https://bugzilla.suse.com/show_bug.cgi?id=1254615 * https://bugzilla.suse.com/show_bug.cgi?id=1254616 * https://bugzilla.suse.com/show_bug.cgi?id=1254618 * https://bugzilla.suse.com/show_bug.cgi?id=1254621 * https://bugzilla.suse.com/show_bug.cgi?id=1254624 * https://bugzilla.suse.com/show_bug.cgi?id=1254791 * https://bugzilla.suse.com/show_bug.cgi?id=1254793 * https://bugzilla.suse.com/show_bug.cgi?id=1254794 * https://bugzilla.suse.com/show_bug.cgi?id=1254795 * https://bugzilla.suse.com/show_bug.cgi?id=1254796 * https://bugzilla.suse.com/show_bug.cgi?id=1254797 * https://bugzilla.suse.com/show_bug.cgi?id=1254798 * https://bugzilla.suse.com/show_bug.cgi?id=1254808 * https://bugzilla.suse.com/show_bug.cgi?id=1254809 * https://bugzilla.suse.com/show_bug.cgi?id=1254813 * https://bugzilla.suse.com/show_bug.cgi?id=1254815 * https://bugzilla.suse.com/show_bug.cgi?id=1254821 * https://bugzilla.suse.com/show_bug.cgi?id=1254824 * https://bugzilla.suse.com/show_bug.cgi?id=1254825 * https://bugzilla.suse.com/show_bug.cgi?id=1254827 * https://bugzilla.suse.com/show_bug.cgi?id=1254828 * https://bugzilla.suse.com/show_bug.cgi?id=1254829 * https://bugzilla.suse.com/show_bug.cgi?id=1254830 * https://bugzilla.suse.com/show_bug.cgi?id=1254832 * https://bugzilla.suse.com/show_bug.cgi?id=1254835 * https://bugzilla.suse.com/show_bug.cgi?id=1254840 * https://bugzilla.suse.com/show_bug.cgi?id=1254843 * https://bugzilla.suse.com/show_bug.cgi?id=1254846 * https://bugzilla.suse.com/show_bug.cgi?id=1254847 * https://bugzilla.suse.com/show_bug.cgi?id=1254849 * https://bugzilla.suse.com/show_bug.cgi?id=1254850 * https://bugzilla.suse.com/show_bug.cgi?id=1254851 * https://bugzilla.suse.com/show_bug.cgi?id=1254852 * https://bugzilla.suse.com/show_bug.cgi?id=1254854 * https://bugzilla.suse.com/show_bug.cgi?id=1254856 * https://bugzilla.suse.com/show_bug.cgi?id=1254858 * https://bugzilla.suse.com/show_bug.cgi?id=1254860 * https://bugzilla.suse.com/show_bug.cgi?id=1254861 * https://bugzilla.suse.com/show_bug.cgi?id=1254864 * https://bugzilla.suse.com/show_bug.cgi?id=1254868 * https://bugzilla.suse.com/show_bug.cgi?id=1254869 * https://bugzilla.suse.com/show_bug.cgi?id=1254871 * https://bugzilla.suse.com/show_bug.cgi?id=1254894 * https://bugzilla.suse.com/show_bug.cgi?id=1254957 * https://bugzilla.suse.com/show_bug.cgi?id=1254959 * https://bugzilla.suse.com/show_bug.cgi?id=1254961 * https://bugzilla.suse.com/show_bug.cgi?id=1254964 * https://bugzilla.suse.com/show_bug.cgi?id=1254996 * https://bugzilla.suse.com/show_bug.cgi?id=1255026 * https://bugzilla.suse.com/show_bug.cgi?id=1255030 * https://bugzilla.suse.com/show_bug.cgi?id=1255034 * https://bugzilla.suse.com/show_bug.cgi?id=1255035 * https://bugzilla.suse.com/show_bug.cgi?id=1255039 * https://bugzilla.suse.com/show_bug.cgi?id=1255040 * https://bugzilla.suse.com/show_bug.cgi?id=1255041 * https://bugzilla.suse.com/show_bug.cgi?id=1255042 * https://bugzilla.suse.com/show_bug.cgi?id=1255057 * https://bugzilla.suse.com/show_bug.cgi?id=1255058 * https://bugzilla.suse.com/show_bug.cgi?id=1255064 * https://bugzilla.suse.com/show_bug.cgi?id=1255065 * https://bugzilla.suse.com/show_bug.cgi?id=1255068 * https://bugzilla.suse.com/show_bug.cgi?id=1255071 * https://bugzilla.suse.com/show_bug.cgi?id=1255072 * https://bugzilla.suse.com/show_bug.cgi?id=1255075 * https://bugzilla.suse.com/show_bug.cgi?id=1255077 * https://bugzilla.suse.com/show_bug.cgi?id=1255081 * https://bugzilla.suse.com/show_bug.cgi?id=1255082 * https://bugzilla.suse.com/show_bug.cgi?id=1255083 * https://bugzilla.suse.com/show_bug.cgi?id=1255087 * https://bugzilla.suse.com/show_bug.cgi?id=1255092 * https://bugzilla.suse.com/show_bug.cgi?id=1255094 * https://bugzilla.suse.com/show_bug.cgi?id=1255095 * https://bugzilla.suse.com/show_bug.cgi?id=1255097 * https://bugzilla.suse.com/show_bug.cgi?id=1255099 * https://bugzilla.suse.com/show_bug.cgi?id=1255103 * https://bugzilla.suse.com/show_bug.cgi?id=1255116 * https://bugzilla.suse.com/show_bug.cgi?id=1255120 * https://bugzilla.suse.com/show_bug.cgi?id=1255121 * https://bugzilla.suse.com/show_bug.cgi?id=1255122 * https://bugzilla.suse.com/show_bug.cgi?id=1255124 * https://bugzilla.suse.com/show_bug.cgi?id=1255131 * https://bugzilla.suse.com/show_bug.cgi?id=1255134 * https://bugzilla.suse.com/show_bug.cgi?id=1255135 * https://bugzilla.suse.com/show_bug.cgi?id=1255136 * https://bugzilla.suse.com/show_bug.cgi?id=1255138 * https://bugzilla.suse.com/show_bug.cgi?id=1255140 * https://bugzilla.suse.com/show_bug.cgi?id=1255142 * https://bugzilla.suse.com/show_bug.cgi?id=1255145 * https://bugzilla.suse.com/show_bug.cgi?id=1255146 * https://bugzilla.suse.com/show_bug.cgi?id=1255149 * https://bugzilla.suse.com/show_bug.cgi?id=1255150 * https://bugzilla.suse.com/show_bug.cgi?id=1255152 * https://bugzilla.suse.com/show_bug.cgi?id=1255154 * https://bugzilla.suse.com/show_bug.cgi?id=1255155 * https://bugzilla.suse.com/show_bug.cgi?id=1255156 * https://bugzilla.suse.com/show_bug.cgi?id=1255161 * https://bugzilla.suse.com/show_bug.cgi?id=1255167 * https://bugzilla.suse.com/show_bug.cgi?id=1255169 * https://bugzilla.suse.com/show_bug.cgi?id=1255171 * https://bugzilla.suse.com/show_bug.cgi?id=1255175 * https://bugzilla.suse.com/show_bug.cgi?id=1255179 * https://bugzilla.suse.com/show_bug.cgi?id=1255181 * https://bugzilla.suse.com/show_bug.cgi?id=1255182 * https://bugzilla.suse.com/show_bug.cgi?id=1255186 * https://bugzilla.suse.com/show_bug.cgi?id=1255187 * https://bugzilla.suse.com/show_bug.cgi?id=1255190 * https://bugzilla.suse.com/show_bug.cgi?id=1255193 * https://bugzilla.suse.com/show_bug.cgi?id=1255196 * https://bugzilla.suse.com/show_bug.cgi?id=1255197 * https://bugzilla.suse.com/show_bug.cgi?id=1255199 * https://bugzilla.suse.com/show_bug.cgi?id=1255202 * https://bugzilla.suse.com/show_bug.cgi?id=1255203 * https://bugzilla.suse.com/show_bug.cgi?id=1255206 * https://bugzilla.suse.com/show_bug.cgi?id=1255209 * https://bugzilla.suse.com/show_bug.cgi?id=1255218 * https://bugzilla.suse.com/show_bug.cgi?id=1255220 * https://bugzilla.suse.com/show_bug.cgi?id=1255221 * https://bugzilla.suse.com/show_bug.cgi?id=1255223 * https://bugzilla.suse.com/show_bug.cgi?id=1255226 * https://bugzilla.suse.com/show_bug.cgi?id=1255227 * https://bugzilla.suse.com/show_bug.cgi?id=1255228 * https://bugzilla.suse.com/show_bug.cgi?id=1255230 * https://bugzilla.suse.com/show_bug.cgi?id=1255231 * https://bugzilla.suse.com/show_bug.cgi?id=1255233 * https://bugzilla.suse.com/show_bug.cgi?id=1255234 * https://bugzilla.suse.com/show_bug.cgi?id=1255242 * https://bugzilla.suse.com/show_bug.cgi?id=1255243 * https://bugzilla.suse.com/show_bug.cgi?id=1255246 * https://bugzilla.suse.com/show_bug.cgi?id=1255247 * https://bugzilla.suse.com/show_bug.cgi?id=1255251 * https://bugzilla.suse.com/show_bug.cgi?id=1255252 * https://bugzilla.suse.com/show_bug.cgi?id=1255253 * https://bugzilla.suse.com/show_bug.cgi?id=1255255 * https://bugzilla.suse.com/show_bug.cgi?id=1255256 * https://bugzilla.suse.com/show_bug.cgi?id=1255259 * https://bugzilla.suse.com/show_bug.cgi?id=1255260 * https://bugzilla.suse.com/show_bug.cgi?id=1255261 * https://bugzilla.suse.com/show_bug.cgi?id=1255262 * https://bugzilla.suse.com/show_bug.cgi?id=1255272 * https://bugzilla.suse.com/show_bug.cgi?id=1255273 * https://bugzilla.suse.com/show_bug.cgi?id=1255274 * https://bugzilla.suse.com/show_bug.cgi?id=1255276 * https://bugzilla.suse.com/show_bug.cgi?id=1255279 * https://bugzilla.suse.com/show_bug.cgi?id=1255297 * https://bugzilla.suse.com/show_bug.cgi?id=1255312 * https://bugzilla.suse.com/show_bug.cgi?id=1255316 * https://bugzilla.suse.com/show_bug.cgi?id=1255318 * https://bugzilla.suse.com/show_bug.cgi?id=1255325 * https://bugzilla.suse.com/show_bug.cgi?id=1255329 * https://bugzilla.suse.com/show_bug.cgi?id=1255346 * https://bugzilla.suse.com/show_bug.cgi?id=1255349 * https://bugzilla.suse.com/show_bug.cgi?id=1255351 * https://bugzilla.suse.com/show_bug.cgi?id=1255354 * https://bugzilla.suse.com/show_bug.cgi?id=1255357 * https://bugzilla.suse.com/show_bug.cgi?id=1255377 * https://bugzilla.suse.com/show_bug.cgi?id=1255379 * https://bugzilla.suse.com/show_bug.cgi?id=1255380 * https://bugzilla.suse.com/show_bug.cgi?id=1255395 * https://bugzilla.suse.com/show_bug.cgi?id=1255401 * https://bugzilla.suse.com/show_bug.cgi?id=1255415 * https://bugzilla.suse.com/show_bug.cgi?id=1255428 * https://bugzilla.suse.com/show_bug.cgi?id=1255433 * https://bugzilla.suse.com/show_bug.cgi?id=1255434 * https://bugzilla.suse.com/show_bug.cgi?id=1255480 * https://bugzilla.suse.com/show_bug.cgi?id=1255483 * https://bugzilla.suse.com/show_bug.cgi?id=1255488 * https://bugzilla.suse.com/show_bug.cgi?id=1255489 * https://bugzilla.suse.com/show_bug.cgi?id=1255493 * https://bugzilla.suse.com/show_bug.cgi?id=1255495 * https://bugzilla.suse.com/show_bug.cgi?id=1255505 * https://bugzilla.suse.com/show_bug.cgi?id=1255507 * https://bugzilla.suse.com/show_bug.cgi?id=1255508 * https://bugzilla.suse.com/show_bug.cgi?id=1255509 * https://bugzilla.suse.com/show_bug.cgi?id=1255533 * https://bugzilla.suse.com/show_bug.cgi?id=1255541 * https://bugzilla.suse.com/show_bug.cgi?id=1255550 * https://bugzilla.suse.com/show_bug.cgi?id=1255552 * https://bugzilla.suse.com/show_bug.cgi?id=1255553 * https://bugzilla.suse.com/show_bug.cgi?id=1255567 * https://bugzilla.suse.com/show_bug.cgi?id=1255580 * https://bugzilla.suse.com/show_bug.cgi?id=1255601 * https://bugzilla.suse.com/show_bug.cgi?id=1255603 * https://bugzilla.suse.com/show_bug.cgi?id=1255611 * https://bugzilla.suse.com/show_bug.cgi?id=1255614 * https://bugzilla.suse.com/show_bug.cgi?id=1255672 * https://bugzilla.suse.com/show_bug.cgi?id=1255688 * https://bugzilla.suse.com/show_bug.cgi?id=1255698 * https://bugzilla.suse.com/show_bug.cgi?id=1255706 * https://bugzilla.suse.com/show_bug.cgi?id=1255707 * https://bugzilla.suse.com/show_bug.cgi?id=1255709 * https://bugzilla.suse.com/show_bug.cgi?id=1255722 * https://bugzilla.suse.com/show_bug.cgi?id=1255723 * https://bugzilla.suse.com/show_bug.cgi?id=1255724 * https://bugzilla.suse.com/show_bug.cgi?id=1255812 * https://bugzilla.suse.com/show_bug.cgi?id=1255813 * https://bugzilla.suse.com/show_bug.cgi?id=1255814 * https://bugzilla.suse.com/show_bug.cgi?id=1255816 * https://bugzilla.suse.com/show_bug.cgi?id=1255931 * https://bugzilla.suse.com/show_bug.cgi?id=1255932 * https://bugzilla.suse.com/show_bug.cgi?id=1255934 * https://bugzilla.suse.com/show_bug.cgi?id=1255943 * https://bugzilla.suse.com/show_bug.cgi?id=1255944 * https://bugzilla.suse.com/show_bug.cgi?id=1256238 * https://bugzilla.suse.com/show_bug.cgi?id=1256495 * https://bugzilla.suse.com/show_bug.cgi?id=1256606 * https://bugzilla.suse.com/show_bug.cgi?id=1256794 * https://jira.suse.com/browse/PED-12745 * https://jira.suse.com/browse/PED-14344 * https://jira.suse.com/browse/PED-14571 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:43:41 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:43:41 -0000 Subject: SUSE-SU-2026:20563-1: important: Security update for glibc Message-ID: <177271462174.1872.4613088363332520011@13ea24840d99> # Security update for glibc Announcement ID: SUSE-SU-2026:20563-1 Release Date: 2026-01-29T16:38:43Z Rating: important References: * bsc#1236282 * bsc#1256436 * bsc#1256766 * bsc#1256822 * bsc#1257005 Cross-References: * CVE-2025-0395 * CVE-2025-15281 * CVE-2026-0861 * CVE-2026-0915 CVSS scores: * CVE-2025-0395 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-0395 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0395 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-15281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-15281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-15281 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-0861 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0861 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0915 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2026-0915 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0915 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves four vulnerabilities and has one fix can now be installed. ## Description: This update for glibc fixes the following issues: Security fixes: * CVE-2025-0395: Fixed buffer overflow in the assert() function (bsc#1236282). * CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256766). * CVE-2026-0915: Fixed uninitialized stack buffer used as DNS query name when net==0 in _nss_dns_getnetbyaddr_r (bsc#1256822). * CVE-2025-15281: Fixed uninitialized memory may cause the process abort (bsc#1257005). Other fixes: * NPTL: Optimize trylock for high cache contention workloads (bsc#1256436) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-218=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * glibc-gconv-modules-extra-debuginfo-2.40-160000.3.1 * glibc-debugsource-2.40-160000.3.1 * glibc-debuginfo-2.40-160000.3.1 * glibc-gconv-modules-extra-2.40-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0395.html * https://www.suse.com/security/cve/CVE-2025-15281.html * https://www.suse.com/security/cve/CVE-2026-0861.html * https://www.suse.com/security/cve/CVE-2026-0915.html * https://bugzilla.suse.com/show_bug.cgi?id=1236282 * https://bugzilla.suse.com/show_bug.cgi?id=1256436 * https://bugzilla.suse.com/show_bug.cgi?id=1256766 * https://bugzilla.suse.com/show_bug.cgi?id=1256822 * https://bugzilla.suse.com/show_bug.cgi?id=1257005 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:46:57 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:46:57 -0000 Subject: SUSE-SU-2026:20562-1: important: Security update for the Linux Kernel Message-ID: <177271481792.1872.17425024146483433967@13ea24840d99> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20562-1 Release Date: 2025-12-19T16:19:41Z Rating: important References: * bsc#1235463 * bsc#1243474 * bsc#1245193 * bsc#1245431 * bsc#1245498 * bsc#1245499 * bsc#1246328 * bsc#1246843 * bsc#1247500 * bsc#1248792 * bsc#1249256 * bsc#1249397 * bsc#1249912 * bsc#1249977 * bsc#1249982 * bsc#1250034 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1250723 * bsc#1250746 * bsc#1251120 * bsc#1251817 * bsc#1252054 * bsc#1252063 * bsc#1252301 * bsc#1252303 * bsc#1252342 * bsc#1252352 * bsc#1252357 * bsc#1252681 * bsc#1252686 * bsc#1252763 * bsc#1252776 * bsc#1252779 * bsc#1252790 * bsc#1252794 * bsc#1252795 * bsc#1252808 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252824 * bsc#1252836 * bsc#1252845 * bsc#1252901 * bsc#1252912 * bsc#1252917 * bsc#1252919 * bsc#1252923 * bsc#1252928 * bsc#1253018 * bsc#1253155 * bsc#1253176 * bsc#1253238 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253328 * bsc#1253330 * bsc#1253342 * bsc#1253348 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253386 * bsc#1253394 * bsc#1253395 * bsc#1253402 * bsc#1253403 * bsc#1253405 * bsc#1253407 * bsc#1253408 * bsc#1253409 * bsc#1253410 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253422 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253426 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253433 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253443 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253450 * bsc#1253451 * bsc#1253453 * bsc#1253455 * bsc#1253456 * bsc#1253457 * bsc#1253463 * bsc#1253472 * bsc#1253622 * bsc#1253624 * bsc#1253635 * bsc#1253643 * bsc#1253647 * bsc#1254119 * bsc#1254181 * bsc#1254221 * bsc#1254308 * bsc#1254315 * jsc#PED-13611 * jsc#PED-13949 * jsc#PED-14062 * jsc#PED-14115 * jsc#PED-14353 Cross-References: * CVE-2022-50253 * CVE-2025-37916 * CVE-2025-38084 * CVE-2025-38085 * CVE-2025-38321 * CVE-2025-38728 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39822 * CVE-2025-39831 * CVE-2025-39859 * CVE-2025-39897 * CVE-2025-39917 * CVE-2025-39944 * CVE-2025-39961 * CVE-2025-39980 * CVE-2025-39990 * CVE-2025-40001 * CVE-2025-40003 * CVE-2025-40006 * CVE-2025-40021 * CVE-2025-40024 * CVE-2025-40027 * CVE-2025-40031 * CVE-2025-40033 * CVE-2025-40038 * CVE-2025-40047 * CVE-2025-40053 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40081 * CVE-2025-40083 * CVE-2025-40086 * CVE-2025-40098 * CVE-2025-40101 * CVE-2025-40102 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40132 * CVE-2025-40133 * CVE-2025-40134 * CVE-2025-40135 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40142 * CVE-2025-40149 * CVE-2025-40153 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40158 * CVE-2025-40159 * CVE-2025-40161 * CVE-2025-40162 * CVE-2025-40164 * CVE-2025-40165 * CVE-2025-40166 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40175 * CVE-2025-40176 * CVE-2025-40177 * CVE-2025-40178 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40185 * CVE-2025-40186 * CVE-2025-40187 * CVE-2025-40188 * CVE-2025-40192 * CVE-2025-40194 * CVE-2025-40196 * CVE-2025-40197 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40201 * CVE-2025-40202 * CVE-2025-40203 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38084 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38085 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38321 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39897 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39897 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39917 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39917 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39917 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39917 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39961 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39961 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39961 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40003 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40003 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40031 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40047 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40047 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40086 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40086 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40133 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40133 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-40134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40142 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40142 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40158 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40165 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40165 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40166 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40175 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40177 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40177 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40192 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40196 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40196 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40203 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves 100 vulnerabilities, contains five features and has 19 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498). * CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499). * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034). * CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746). * CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301). * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779). * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790). * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328). * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). * CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423). * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). * CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394). * CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths (bsc#1253455). * CVE-2025-40203: listmount: don't call path_put() under namespace semaphore (bsc#1253457). The following non security issues were fixed: * ACPI: scan: Update honor list for RPMI System MSI (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a proper watchdog interface and has many code issues. It only handles obscure and obsolete hardware. Stop building and supporting this driver (jsc#PED-14062). * Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds" (bsc#1252923) * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: s390: improve interrupt cpu for wakeup (bsc#1235463). * KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352). * KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes). * PCI/ERR: Update device error_state already after reset (stable-fixes). * PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes). * Update config files: enable zstd module decompression (jsc#PED-14115). * bpf/selftests: Fix test_tcpnotify_user (bsc#1253635). * btrfs: do not clear read-only when adding sprout device (bsc#1253238). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386) * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: update color on atomic commit time (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable- fixes). * hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * mount: handle NULL values in mnt_ns_release() (bsc#1254308) * net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357). * net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353). * net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353). * net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353). * net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353). * net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353). * net: phy: realtek: improve mmd register access for internal PHY's (jsc#PED-14353). * net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353). * net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353). * net: phy: realtek: use string choices helpers (jsc#PED-14353). * net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746) * net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746) * net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746) * nvmet-auth: update sc_c in host response (git-fixes bsc#1249397). * nvmet-auth: update sc_c in target host hash calculation (git-fixes). * perf list: Add IBM z17 event descriptions (jsc#PED-13611). * platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes). * powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949). * pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes). * r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353). * r8169: add support for Intel Killer E5000 (jsc#PED-14353). * r8169: add support for RTL8125BP rev.b (jsc#PED-14353). * r8169: add support for RTL8125D rev.b (jsc#PED-14353). * r8169: adjust version numbering for RTL8126 (jsc#PED-14353). * r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353). * r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353). * r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353). * r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353). * r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353). * r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353). * r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353). * r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353). * r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353). * r8169: implement additional ethtool stats ops (jsc#PED-14353). * r8169: improve __rtl8169_set_wol (jsc#PED-14353). * r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353). * r8169: improve rtl_set_d3_pll_down (jsc#PED-14353). * r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353). * r8169: remove leftover locks after reverted change (jsc#PED-14353). * r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353). * r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353). * r8169: remove support for chip version 11 (jsc#PED-14353). * r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353). * r8169: replace custom flag with disable_work() et al (jsc#PED-14353). * r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353). * r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353). * ring-buffer: Update pages_touched to reflect persistent buffer content (git- fixes). * s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643). * sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask() (bsc#1246843). * sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792). * sched/fair: Proportional newidle balance (bsc#1248792). * sched/fair: Proportional newidle balance -KABI (bsc#1248792). * sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792). * sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792). * sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792). * sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792). * scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). * scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). * selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221). * smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843). * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155) * spi: tegra210-quad: Fix timeout handling (bsc#1253155) * spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155) * spi: tegra210-quad: Update dummy sequence configuration (git-fixes) * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181). * wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315). * wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315). * wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315). * wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315). * wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315). * wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315). * wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315). * wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315). * wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315). * wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315). * wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315). * wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315). * wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315). * wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315). * wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315). * wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315). * wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315). * x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843). * x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843). * x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-113=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-debugsource-6.12.0-160000.8.1 * kernel-obs-build-6.12.0-160000.8.1 * kernel-syms-6.12.0-160000.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38084.html * https://www.suse.com/security/cve/CVE-2025-38085.html * https://www.suse.com/security/cve/CVE-2025-38321.html * https://www.suse.com/security/cve/CVE-2025-38728.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39822.html * https://www.suse.com/security/cve/CVE-2025-39831.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39897.html * https://www.suse.com/security/cve/CVE-2025-39917.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39961.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-39990.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40003.html * https://www.suse.com/security/cve/CVE-2025-40006.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40024.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40031.html * https://www.suse.com/security/cve/CVE-2025-40033.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40047.html * https://www.suse.com/security/cve/CVE-2025-40053.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40081.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40086.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40101.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40132.html * https://www.suse.com/security/cve/CVE-2025-40133.html * https://www.suse.com/security/cve/CVE-2025-40134.html * https://www.suse.com/security/cve/CVE-2025-40135.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40142.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40153.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40158.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40161.html * https://www.suse.com/security/cve/CVE-2025-40162.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40165.html * https://www.suse.com/security/cve/CVE-2025-40166.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40175.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40177.html * https://www.suse.com/security/cve/CVE-2025-40178.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40185.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40187.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40192.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40196.html * https://www.suse.com/security/cve/CVE-2025-40197.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40201.html * https://www.suse.com/security/cve/CVE-2025-40202.html * https://www.suse.com/security/cve/CVE-2025-40203.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1235463 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1245498 * https://bugzilla.suse.com/show_bug.cgi?id=1245499 * https://bugzilla.suse.com/show_bug.cgi?id=1246328 * https://bugzilla.suse.com/show_bug.cgi?id=1246843 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1248792 * https://bugzilla.suse.com/show_bug.cgi?id=1249256 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249977 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250034 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250723 * https://bugzilla.suse.com/show_bug.cgi?id=1250746 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251817 * https://bugzilla.suse.com/show_bug.cgi?id=1252054 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252301 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252342 * https://bugzilla.suse.com/show_bug.cgi?id=1252352 * https://bugzilla.suse.com/show_bug.cgi?id=1252357 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252686 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252776 * https://bugzilla.suse.com/show_bug.cgi?id=1252779 * https://bugzilla.suse.com/show_bug.cgi?id=1252790 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252808 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252824 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252901 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://bugzilla.suse.com/show_bug.cgi?id=1252923 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253238 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253328 * https://bugzilla.suse.com/show_bug.cgi?id=1253330 * https://bugzilla.suse.com/show_bug.cgi?id=1253342 * https://bugzilla.suse.com/show_bug.cgi?id=1253348 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253386 * https://bugzilla.suse.com/show_bug.cgi?id=1253394 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253402 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253405 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253408 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253410 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253422 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253426 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253433 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253443 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253450 * https://bugzilla.suse.com/show_bug.cgi?id=1253451 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253455 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253457 * https://bugzilla.suse.com/show_bug.cgi?id=1253463 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253622 * https://bugzilla.suse.com/show_bug.cgi?id=1253624 * https://bugzilla.suse.com/show_bug.cgi?id=1253635 * https://bugzilla.suse.com/show_bug.cgi?id=1253643 * https://bugzilla.suse.com/show_bug.cgi?id=1253647 * https://bugzilla.suse.com/show_bug.cgi?id=1254119 * https://bugzilla.suse.com/show_bug.cgi?id=1254181 * https://bugzilla.suse.com/show_bug.cgi?id=1254221 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254315 * https://jira.suse.com/browse/PED-13611 * https://jira.suse.com/browse/PED-13949 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-14115 * https://jira.suse.com/browse/PED-14353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 12:49:43 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 12:49:43 -0000 Subject: SUSE-SU-2026:20561-1: important: Security update for the Linux Kernel Message-ID: <177271498383.1872.6521843347075745653@13ea24840d99> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20561-1 Release Date: 2025-11-26T15:35:38Z Rating: important References: * bsc#1218644 * bsc#1238472 * bsc#1239206 * bsc#1241166 * bsc#1241637 * bsc#1247222 * bsc#1248630 * bsc#1249161 * bsc#1249226 * bsc#1249302 * bsc#1249317 * bsc#1249397 * bsc#1249398 * bsc#1249495 * bsc#1249512 * bsc#1249608 * bsc#1249735 * bsc#1250202 * bsc#1250379 * bsc#1250400 * bsc#1250455 * bsc#1250491 * bsc#1250704 * bsc#1250721 * bsc#1250749 * bsc#1250946 * bsc#1251176 * bsc#1251177 * bsc#1251232 * bsc#1251233 * bsc#1251804 * bsc#1251809 * bsc#1251819 * bsc#1251930 * bsc#1251967 * bsc#1252033 * bsc#1252035 * bsc#1252039 * bsc#1252044 * bsc#1252047 * bsc#1252051 * bsc#1252052 * bsc#1252056 * bsc#1252060 * bsc#1252062 * bsc#1252064 * bsc#1252065 * bsc#1252067 * bsc#1252069 * bsc#1252070 * bsc#1252072 * bsc#1252074 * bsc#1252075 * bsc#1252076 * bsc#1252078 * bsc#1252079 * bsc#1252081 * bsc#1252082 * bsc#1252083 * bsc#1252253 * bsc#1252265 * bsc#1252267 * bsc#1252270 * bsc#1252330 * bsc#1252333 * bsc#1252336 * bsc#1252346 * bsc#1252348 * bsc#1252349 * bsc#1252678 * bsc#1252679 * bsc#1252688 * bsc#1252725 * bsc#1252734 * bsc#1252772 * bsc#1252774 * bsc#1252780 * bsc#1252785 * bsc#1252787 * bsc#1252789 * bsc#1252797 * bsc#1252819 * bsc#1252822 * bsc#1252826 * bsc#1252841 * bsc#1252848 * bsc#1252849 * bsc#1252850 * bsc#1252851 * bsc#1252854 * bsc#1252858 * bsc#1252862 * bsc#1252865 * bsc#1252866 * bsc#1252873 * bsc#1252902 * bsc#1252909 * bsc#1252915 * bsc#1252918 * bsc#1252921 * bsc#1252939 * jsc#PED-348 * jsc#PED-4593 * jsc#PED-9891 Cross-References: * CVE-2025-21816 * CVE-2025-38653 * CVE-2025-38718 * CVE-2025-39676 * CVE-2025-39702 * CVE-2025-39756 * CVE-2025-39779 * CVE-2025-39797 * CVE-2025-39812 * CVE-2025-39866 * CVE-2025-39876 * CVE-2025-39881 * CVE-2025-39895 * CVE-2025-39903 * CVE-2025-39911 * CVE-2025-39947 * CVE-2025-39948 * CVE-2025-39949 * CVE-2025-39950 * CVE-2025-39955 * CVE-2025-39956 * CVE-2025-39963 * CVE-2025-39965 * CVE-2025-39967 * CVE-2025-39968 * CVE-2025-39969 * CVE-2025-39970 * CVE-2025-39971 * CVE-2025-39972 * CVE-2025-39973 * CVE-2025-39978 * CVE-2025-39979 * CVE-2025-39981 * CVE-2025-39982 * CVE-2025-39984 * CVE-2025-39985 * CVE-2025-39986 * CVE-2025-39987 * CVE-2025-39988 * CVE-2025-39991 * CVE-2025-39992 * CVE-2025-39993 * CVE-2025-39994 * CVE-2025-39995 * CVE-2025-39996 * CVE-2025-39997 * CVE-2025-40000 * CVE-2025-40005 * CVE-2025-40009 * CVE-2025-40011 * CVE-2025-40012 * CVE-2025-40013 * CVE-2025-40016 * CVE-2025-40018 * CVE-2025-40019 * CVE-2025-40020 * CVE-2025-40029 * CVE-2025-40032 * CVE-2025-40035 * CVE-2025-40036 * CVE-2025-40037 * CVE-2025-40040 * CVE-2025-40043 * CVE-2025-40044 * CVE-2025-40048 * CVE-2025-40049 * CVE-2025-40051 * CVE-2025-40052 * CVE-2025-40056 * CVE-2025-40058 * CVE-2025-40060 * CVE-2025-40061 * CVE-2025-40062 * CVE-2025-40071 * CVE-2025-40078 * CVE-2025-40080 * CVE-2025-40085 * CVE-2025-40087 * CVE-2025-40091 * CVE-2025-40096 * CVE-2025-40100 * CVE-2025-40104 * CVE-2025-40364 CVSS scores: * CVE-2025-21816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38653 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38653 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38718 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39702 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39866 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39866 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39866 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39876 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39881 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39895 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39903 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39903 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39903 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39911 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39947 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39947 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39948 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39948 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39949 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39949 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39949 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39950 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39950 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39950 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39955 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39955 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39955 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39956 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39956 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39956 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39963 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39963 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39963 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39965 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39967 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39969 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39970 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39970 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39971 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39971 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39972 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39972 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39979 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39979 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39981 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40005 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40009 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40012 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40012 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40016 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40016 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40020 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40032 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40032 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40037 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40043 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40043 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40049 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40049 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40056 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40056 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40085 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40091 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40096 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40104 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40104 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40364 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40364 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40364 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves 83 vulnerabilities, contains three features and has 18 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-21816: hrtimers: Force migrate away hrtimers queued after (bsc#1238472). * CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630). * CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161). * CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302). * CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317). * CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512). * CVE-2025-39779: btrfs: subpage: keep TOWRITE tag until folio is cleaned (bsc#1249495). * CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202). * CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455). * CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400). * CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379). * CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721). * CVE-2025-39903: of_numa: fix uninitialized memory nodes causing kernel panic (bsc#1250749). * CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704). * CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232). * CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233). * CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177). * CVE-2025-39950: net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR (bsc#1251176). * CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804). * CVE-2025-39956: igc: don't fail igc_probe() on LED setup error (bsc#1251809). * CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251819). * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047). * CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044). * CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051). * CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052). * CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039). * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035). * CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069). * CVE-2025-39979: net/mlx5: fs, add API for sharing HWS action by refcount (bsc#1252067). * CVE-2025-39984: net: tun: Update napi->skb after XDP process (bsc#1252081). * CVE-2025-39992: mm: swap: check for stable address space before operating on the VMA (bsc#1252076). * CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062). * CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349). * CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling get_page() (bsc#1252330). * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858). * CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826). * CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848). * CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789). * CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774). * CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918). The following non security issues were fixed: * add bug reference to existing hv_netvsc change (bsc#1252265) * amd-pstate-ut: Reset amd-pstate driver mode after running selftests (bsc#1249226). * cgroup/cpuset: Remove remote_partition_check() & make update_cpumasks_hier() handle remote partition (bsc#1241166). * cpuset: Use new excpus for nocpu error check when enabling root partition (bsc#1241166). * cpuset: fix failure to enable isolated partition when containing isolcpus (bsc#1241166). * doc/README.SUSE: Correct the character used for TAINT_NO_SUPPORT The character was previously 'N', but upstream used it for TAINT_TEST, which prompted the change of TAINT_NO_SUPPORT to 'n'. * dpll: zl3073x: Add firmware loading functionality (bsc#1252253). * dpll: zl3073x: Add functions to access hardware registers (bsc#1252253). * dpll: zl3073x: Add low-level flash functions (bsc#1252253). * dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253). * dpll: zl3073x: Add support to get phase offset on connected input pin (bsc#1252253). * dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253). * dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update() (bsc#1252253). * dpll: zl3073x: Handle missing or corrupted flash configuration (bsc#1252253). * dpll: zl3073x: Implement devlink flash callback (bsc#1252253). * dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253). * dpll: zl3073x: Refactor DPLL initialization (bsc#1252253). * drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes). * drm/xe/guc: Prepare GuC register list and update ADS size for error capture (stable-fixes). * ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222). * ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222). * ixgbevf: fix getting link speed data for E610 devices (bsc#1247222). * ixgbevf: fix mailbox API compatibility by negotiating supported features (bsc#1247222). * kbuild/modfinal: Link livepatches with module-common.o (bsc#1218644, bsc#1252270). * kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939). * kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930). * nvme-auth: update sc_c in host response (git-fixes bsc#1249397). * perf hwmon_pmu: Fix uninitialized variable warning (perf- sle16-v6.13-userspace-update, git-fixes). * phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes). * powerpc/fadump: skip parameter area allocation when fadump is disabled (jsc#PED-9891 git-fixes). * proc: fix missing pde_set_flags() for net proc files (bsc#1248630) * proc: fix type confusion in pde_set_flags() (bsc#1248630) * rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946) * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). * x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1252725). * x86/resctrl: Fix miscount of bandwidth event when reactivating previously unavailable RMID (bsc#1252734). * x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734). * x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL (jsc#PED-348). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-58=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.12.0-160000.7.1 * kernel-syms-6.12.0-160000.7.1 * kernel-obs-build-debugsource-6.12.0-160000.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21816.html * https://www.suse.com/security/cve/CVE-2025-38653.html * https://www.suse.com/security/cve/CVE-2025-38718.html * https://www.suse.com/security/cve/CVE-2025-39676.html * https://www.suse.com/security/cve/CVE-2025-39702.html * https://www.suse.com/security/cve/CVE-2025-39756.html * https://www.suse.com/security/cve/CVE-2025-39779.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39812.html * https://www.suse.com/security/cve/CVE-2025-39866.html * https://www.suse.com/security/cve/CVE-2025-39876.html * https://www.suse.com/security/cve/CVE-2025-39881.html * https://www.suse.com/security/cve/CVE-2025-39895.html * https://www.suse.com/security/cve/CVE-2025-39903.html * https://www.suse.com/security/cve/CVE-2025-39911.html * https://www.suse.com/security/cve/CVE-2025-39947.html * https://www.suse.com/security/cve/CVE-2025-39948.html * https://www.suse.com/security/cve/CVE-2025-39949.html * https://www.suse.com/security/cve/CVE-2025-39950.html * https://www.suse.com/security/cve/CVE-2025-39955.html * https://www.suse.com/security/cve/CVE-2025-39956.html * https://www.suse.com/security/cve/CVE-2025-39963.html * https://www.suse.com/security/cve/CVE-2025-39965.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-39968.html * https://www.suse.com/security/cve/CVE-2025-39969.html * https://www.suse.com/security/cve/CVE-2025-39970.html * https://www.suse.com/security/cve/CVE-2025-39971.html * https://www.suse.com/security/cve/CVE-2025-39972.html * https://www.suse.com/security/cve/CVE-2025-39973.html * https://www.suse.com/security/cve/CVE-2025-39978.html * https://www.suse.com/security/cve/CVE-2025-39979.html * https://www.suse.com/security/cve/CVE-2025-39981.html * https://www.suse.com/security/cve/CVE-2025-39982.html * https://www.suse.com/security/cve/CVE-2025-39984.html * https://www.suse.com/security/cve/CVE-2025-39985.html * https://www.suse.com/security/cve/CVE-2025-39986.html * https://www.suse.com/security/cve/CVE-2025-39987.html * https://www.suse.com/security/cve/CVE-2025-39988.html * https://www.suse.com/security/cve/CVE-2025-39991.html * https://www.suse.com/security/cve/CVE-2025-39992.html * https://www.suse.com/security/cve/CVE-2025-39993.html * https://www.suse.com/security/cve/CVE-2025-39994.html * https://www.suse.com/security/cve/CVE-2025-39995.html * https://www.suse.com/security/cve/CVE-2025-39996.html * https://www.suse.com/security/cve/CVE-2025-39997.html * https://www.suse.com/security/cve/CVE-2025-40000.html * https://www.suse.com/security/cve/CVE-2025-40005.html * https://www.suse.com/security/cve/CVE-2025-40009.html * https://www.suse.com/security/cve/CVE-2025-40011.html * https://www.suse.com/security/cve/CVE-2025-40012.html * https://www.suse.com/security/cve/CVE-2025-40013.html * https://www.suse.com/security/cve/CVE-2025-40016.html * https://www.suse.com/security/cve/CVE-2025-40018.html * https://www.suse.com/security/cve/CVE-2025-40019.html * https://www.suse.com/security/cve/CVE-2025-40020.html * https://www.suse.com/security/cve/CVE-2025-40029.html * https://www.suse.com/security/cve/CVE-2025-40032.html * https://www.suse.com/security/cve/CVE-2025-40035.html * https://www.suse.com/security/cve/CVE-2025-40036.html * https://www.suse.com/security/cve/CVE-2025-40037.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40043.html * https://www.suse.com/security/cve/CVE-2025-40044.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40049.html * https://www.suse.com/security/cve/CVE-2025-40051.html * https://www.suse.com/security/cve/CVE-2025-40052.html * https://www.suse.com/security/cve/CVE-2025-40056.html * https://www.suse.com/security/cve/CVE-2025-40058.html * https://www.suse.com/security/cve/CVE-2025-40060.html * https://www.suse.com/security/cve/CVE-2025-40061.html * https://www.suse.com/security/cve/CVE-2025-40062.html * https://www.suse.com/security/cve/CVE-2025-40071.html * https://www.suse.com/security/cve/CVE-2025-40078.html * https://www.suse.com/security/cve/CVE-2025-40080.html * https://www.suse.com/security/cve/CVE-2025-40085.html * https://www.suse.com/security/cve/CVE-2025-40087.html * https://www.suse.com/security/cve/CVE-2025-40091.html * https://www.suse.com/security/cve/CVE-2025-40096.html * https://www.suse.com/security/cve/CVE-2025-40100.html * https://www.suse.com/security/cve/CVE-2025-40104.html * https://www.suse.com/security/cve/CVE-2025-40364.html * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1238472 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241637 * https://bugzilla.suse.com/show_bug.cgi?id=1247222 * https://bugzilla.suse.com/show_bug.cgi?id=1248630 * https://bugzilla.suse.com/show_bug.cgi?id=1249161 * https://bugzilla.suse.com/show_bug.cgi?id=1249226 * https://bugzilla.suse.com/show_bug.cgi?id=1249302 * https://bugzilla.suse.com/show_bug.cgi?id=1249317 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249398 * https://bugzilla.suse.com/show_bug.cgi?id=1249495 * https://bugzilla.suse.com/show_bug.cgi?id=1249512 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249735 * https://bugzilla.suse.com/show_bug.cgi?id=1250202 * https://bugzilla.suse.com/show_bug.cgi?id=1250379 * https://bugzilla.suse.com/show_bug.cgi?id=1250400 * https://bugzilla.suse.com/show_bug.cgi?id=1250455 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250704 * https://bugzilla.suse.com/show_bug.cgi?id=1250721 * https://bugzilla.suse.com/show_bug.cgi?id=1250749 * https://bugzilla.suse.com/show_bug.cgi?id=1250946 * https://bugzilla.suse.com/show_bug.cgi?id=1251176 * https://bugzilla.suse.com/show_bug.cgi?id=1251177 * https://bugzilla.suse.com/show_bug.cgi?id=1251232 * https://bugzilla.suse.com/show_bug.cgi?id=1251233 * https://bugzilla.suse.com/show_bug.cgi?id=1251804 * https://bugzilla.suse.com/show_bug.cgi?id=1251809 * https://bugzilla.suse.com/show_bug.cgi?id=1251819 * https://bugzilla.suse.com/show_bug.cgi?id=1251930 * https://bugzilla.suse.com/show_bug.cgi?id=1251967 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252035 * https://bugzilla.suse.com/show_bug.cgi?id=1252039 * https://bugzilla.suse.com/show_bug.cgi?id=1252044 * https://bugzilla.suse.com/show_bug.cgi?id=1252047 * https://bugzilla.suse.com/show_bug.cgi?id=1252051 * https://bugzilla.suse.com/show_bug.cgi?id=1252052 * https://bugzilla.suse.com/show_bug.cgi?id=1252056 * https://bugzilla.suse.com/show_bug.cgi?id=1252060 * https://bugzilla.suse.com/show_bug.cgi?id=1252062 * https://bugzilla.suse.com/show_bug.cgi?id=1252064 * https://bugzilla.suse.com/show_bug.cgi?id=1252065 * https://bugzilla.suse.com/show_bug.cgi?id=1252067 * https://bugzilla.suse.com/show_bug.cgi?id=1252069 * https://bugzilla.suse.com/show_bug.cgi?id=1252070 * https://bugzilla.suse.com/show_bug.cgi?id=1252072 * https://bugzilla.suse.com/show_bug.cgi?id=1252074 * https://bugzilla.suse.com/show_bug.cgi?id=1252075 * https://bugzilla.suse.com/show_bug.cgi?id=1252076 * https://bugzilla.suse.com/show_bug.cgi?id=1252078 * https://bugzilla.suse.com/show_bug.cgi?id=1252079 * https://bugzilla.suse.com/show_bug.cgi?id=1252081 * https://bugzilla.suse.com/show_bug.cgi?id=1252082 * https://bugzilla.suse.com/show_bug.cgi?id=1252083 * https://bugzilla.suse.com/show_bug.cgi?id=1252253 * https://bugzilla.suse.com/show_bug.cgi?id=1252265 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252270 * https://bugzilla.suse.com/show_bug.cgi?id=1252330 * https://bugzilla.suse.com/show_bug.cgi?id=1252333 * https://bugzilla.suse.com/show_bug.cgi?id=1252336 * https://bugzilla.suse.com/show_bug.cgi?id=1252346 * https://bugzilla.suse.com/show_bug.cgi?id=1252348 * https://bugzilla.suse.com/show_bug.cgi?id=1252349 * https://bugzilla.suse.com/show_bug.cgi?id=1252678 * https://bugzilla.suse.com/show_bug.cgi?id=1252679 * https://bugzilla.suse.com/show_bug.cgi?id=1252688 * https://bugzilla.suse.com/show_bug.cgi?id=1252725 * https://bugzilla.suse.com/show_bug.cgi?id=1252734 * https://bugzilla.suse.com/show_bug.cgi?id=1252772 * https://bugzilla.suse.com/show_bug.cgi?id=1252774 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252785 * https://bugzilla.suse.com/show_bug.cgi?id=1252787 * https://bugzilla.suse.com/show_bug.cgi?id=1252789 * https://bugzilla.suse.com/show_bug.cgi?id=1252797 * https://bugzilla.suse.com/show_bug.cgi?id=1252819 * https://bugzilla.suse.com/show_bug.cgi?id=1252822 * https://bugzilla.suse.com/show_bug.cgi?id=1252826 * https://bugzilla.suse.com/show_bug.cgi?id=1252841 * https://bugzilla.suse.com/show_bug.cgi?id=1252848 * https://bugzilla.suse.com/show_bug.cgi?id=1252849 * https://bugzilla.suse.com/show_bug.cgi?id=1252850 * https://bugzilla.suse.com/show_bug.cgi?id=1252851 * https://bugzilla.suse.com/show_bug.cgi?id=1252854 * https://bugzilla.suse.com/show_bug.cgi?id=1252858 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1252865 * https://bugzilla.suse.com/show_bug.cgi?id=1252866 * https://bugzilla.suse.com/show_bug.cgi?id=1252873 * https://bugzilla.suse.com/show_bug.cgi?id=1252902 * https://bugzilla.suse.com/show_bug.cgi?id=1252909 * https://bugzilla.suse.com/show_bug.cgi?id=1252915 * https://bugzilla.suse.com/show_bug.cgi?id=1252918 * https://bugzilla.suse.com/show_bug.cgi?id=1252921 * https://bugzilla.suse.com/show_bug.cgi?id=1252939 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-4593 * https://jira.suse.com/browse/PED-9891 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:07:53 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:07:53 -0000 Subject: SUSE-SU-2026:0821-1: moderate: Security update for python-Django Message-ID: <177271607320.1901.726415684919608845@13ea24840d99> # Security update for python-Django Announcement ID: SUSE-SU-2026:0821-1 Release Date: 2026-03-05T11:43:16Z Rating: moderate References: * bsc#1259142 Cross-References: * CVE-2026-25674 CVSS scores: * CVE-2026-25674 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2026-25674 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2026-25674 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-Django fixes the following issue: * CVE-2026-25674: race condition can lead to potential incorrect permissions on newly created file system objects (bsc#1259142). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-821=1 openSUSE-SLE-15.6-2026-821=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-821=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-Django-4.2.11-150600.3.50.1 * SUSE Package Hub 15 15-SP7 (noarch) * python311-Django-4.2.11-150600.3.50.1 ## References: * https://www.suse.com/security/cve/CVE-2026-25674.html * https://bugzilla.suse.com/show_bug.cgi?id=1259142 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:07:54 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:07:54 -0000 Subject: SUSE-RU-2026:0820-1: moderate: Recommended update for libnvidia-egl-wayland Message-ID: <177271607470.1901.2729480022887011455@13ea24840d99> # Recommended update for libnvidia-egl-wayland Announcement ID: SUSE-RU-2026:0820-1 Release Date: 2026-03-05T10:51:39Z Rating: moderate References: Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for libnvidia-egl-wayland fixes the following issues: * update to version 1.1.22: * egl-wayland: remove extraneous call to wl_display_rou * update to version 1.1.21: * fix loading libdrm when wl_drm is not available * add FP16 DRM format - requires some fixes to the core driver to fully work however * fixed build against sle15-sp6/Leap 15.6 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-820=1 ## Package List: * Desktop Applications Module 15-SP7 (x86_64) * libnvidia-egl-wayland1-32bit-debuginfo-1.1.22-150700.3.9.1 * libnvidia-egl-wayland1-32bit-1.1.22-150700.3.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:07:57 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:07:57 -0000 Subject: SUSE-SU-2026:0819-1: important: Security update for virtiofsd Message-ID: <177271607739.1901.7248384377578342801@13ea24840d99> # Security update for virtiofsd Announcement ID: SUSE-SU-2026:0819-1 Release Date: 2026-03-05T10:49:51Z Rating: important References: * bsc#1257912 Cross-References: * CVE-2026-25727 CVSS scores: * CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25727 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for virtiofsd fixes the following issue: * CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257912). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-819=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * virtiofsd-debuginfo-1.12.0-150700.3.3.1 * virtiofsd-1.12.0-150700.3.3.1 * virtiofsd-debugsource-1.12.0-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2026-25727.html * https://bugzilla.suse.com/show_bug.cgi?id=1257912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:01 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:01 -0000 Subject: SUSE-RU-2026:0818-1: important: Recommended update for grub2 Message-ID: <177271608142.1901.4099712371187702347@13ea24840d99> # Recommended update for grub2 Announcement ID: SUSE-RU-2026:0818-1 Release Date: 2026-03-05T10:26:15Z Rating: important References: * bsc#1258022 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that has one fix can now be installed. ## Description: This update for grub2 fixes the following issues: * Backport upstream's commit to prevent BIOS assert (bsc#1258022) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-818=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-818=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * grub2-2.06-150500.29.62.1 * grub2-branding-upstream-2.06-150500.29.62.1 * grub2-debuginfo-2.06-150500.29.62.1 * openSUSE Leap 15.5 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150500.29.62.1 * openSUSE Leap 15.5 (noarch) * grub2-arm64-efi-2.06-150500.29.62.1 * grub2-i386-efi-debug-2.06-150500.29.62.1 * grub2-i386-xen-extras-2.06-150500.29.62.1 * grub2-i386-efi-extras-2.06-150500.29.62.1 * grub2-powerpc-ieee1275-extras-2.06-150500.29.62.1 * grub2-arm64-efi-extras-2.06-150500.29.62.1 * grub2-systemd-sleep-plugin-2.06-150500.29.62.1 * grub2-x86_64-efi-debug-2.06-150500.29.62.1 * grub2-s390x-emu-extras-2.06-150500.29.62.1 * grub2-x86_64-efi-2.06-150500.29.62.1 * grub2-x86_64-xen-2.06-150500.29.62.1 * grub2-i386-efi-2.06-150500.29.62.1 * grub2-x86_64-efi-extras-2.06-150500.29.62.1 * grub2-arm64-efi-debug-2.06-150500.29.62.1 * grub2-powerpc-ieee1275-debug-2.06-150500.29.62.1 * grub2-i386-pc-debug-2.06-150500.29.62.1 * grub2-snapper-plugin-2.06-150500.29.62.1 * grub2-i386-xen-2.06-150500.29.62.1 * grub2-i386-xen-debug-2.06-150500.29.62.1 * grub2-i386-pc-2.06-150500.29.62.1 * grub2-x86_64-xen-debug-2.06-150500.29.62.1 * grub2-powerpc-ieee1275-2.06-150500.29.62.1 * grub2-i386-pc-extras-2.06-150500.29.62.1 * grub2-x86_64-xen-extras-2.06-150500.29.62.1 * openSUSE Leap 15.5 (s390x) * grub2-s390x-emu-debug-2.06-150500.29.62.1 * grub2-s390x-emu-2.06-150500.29.62.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * grub2-2.06-150500.29.62.1 * grub2-debuginfo-2.06-150500.29.62.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * grub2-x86_64-efi-2.06-150500.29.62.1 * grub2-x86_64-xen-2.06-150500.29.62.1 * grub2-arm64-efi-2.06-150500.29.62.1 * grub2-i386-pc-2.06-150500.29.62.1 * grub2-powerpc-ieee1275-2.06-150500.29.62.1 * grub2-snapper-plugin-2.06-150500.29.62.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64) * grub2-debugsource-2.06-150500.29.62.1 * SUSE Linux Enterprise Micro 5.5 (s390x) * grub2-s390x-emu-2.06-150500.29.62.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1258022 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:04 -0000 Subject: SUSE-SU-2026:0817-1: moderate: Security update for wireshark Message-ID: <177271608458.1901.9475437378790165664@13ea24840d99> # Security update for wireshark Announcement ID: SUSE-SU-2026:0817-1 Release Date: 2026-03-05T09:51:15Z Rating: moderate References: * bsc#1254472 Cross-References: * CVE-2025-13946 CVSS scores: * CVE-2025-13946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for wireshark fixes the following issues: * CVE-2025-13946: MEGACO dissector infinite loop (bsc#1254472). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-817=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libwscodecs1-2.4.16-48.66.1 * wireshark-devel-2.4.16-48.66.1 * libwscodecs1-debuginfo-2.4.16-48.66.1 * libwireshark9-debuginfo-2.4.16-48.66.1 * wireshark-2.4.16-48.66.1 * wireshark-gtk-2.4.16-48.66.1 * wireshark-debugsource-2.4.16-48.66.1 * libwiretap7-2.4.16-48.66.1 * wireshark-debuginfo-2.4.16-48.66.1 * libwiretap7-debuginfo-2.4.16-48.66.1 * wireshark-gtk-debuginfo-2.4.16-48.66.1 * libwsutil8-2.4.16-48.66.1 * libwsutil8-debuginfo-2.4.16-48.66.1 * libwireshark9-2.4.16-48.66.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13946.html * https://bugzilla.suse.com/show_bug.cgi?id=1254472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:09 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:09 -0000 Subject: SUSE-SU-2026:0816-1: important: Security update for virtiofsd Message-ID: <177271608995.1901.13330534115942776462@13ea24840d99> # Security update for virtiofsd Announcement ID: SUSE-SU-2026:0816-1 Release Date: 2026-03-05T09:51:05Z Rating: important References: * bsc#1257912 Cross-References: * CVE-2026-25727 CVSS scores: * CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25727 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for virtiofsd fixes the following issue: * CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257912). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-816=1 openSUSE-SLE-15.6-2026-816=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-816=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-816=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * virtiofsd-debugsource-1.10.1-150600.4.6.1 * virtiofsd-debuginfo-1.10.1-150600.4.6.1 * virtiofsd-1.10.1-150600.4.6.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * virtiofsd-debuginfo-1.10.1-150600.4.6.1 * virtiofsd-1.10.1-150600.4.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * virtiofsd-debuginfo-1.10.1-150600.4.6.1 * virtiofsd-1.10.1-150600.4.6.1 ## References: * https://www.suse.com/security/cve/CVE-2026-25727.html * https://bugzilla.suse.com/show_bug.cgi?id=1257912 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:14 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:14 -0000 Subject: SUSE-RU-2026:0564-2: important: Recommended update for s390-tools Message-ID: <177271609467.1901.12693933306370017584@13ea24840d99> # Recommended update for s390-tools Announcement ID: SUSE-RU-2026:0564-2 Release Date: 2026-03-05T09:50:39Z Rating: important References: * bsc#1246792 * bsc#1258180 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for s390-tools fixes the following issues: * Fix: SLES15 SP6 - cpacfstatsd.service config file is missing an extension to start cpacfstatsd on 2nd level guests (bsc#1258180) * capcfstatsd: update service unit to build on zVM and KVM * Amended the .spec file (bsc#1246792) * Changed '%{release}' to '%{rbrelease}' in "DISTRELEASE=" to remove embedded build counters from the binaries * Re-vendor-ed vendor.tar.zst ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-564=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-564=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-564=1 openSUSE-SLE-15.6-2026-564=1 ## Package List: * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x) * libekmfweb1-devel-2.31.0-150600.8.27.1 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.27.1 * s390-tools-zdsfs-debuginfo-2.31.0-150600.8.27.1 * libkmipclient1-2.31.0-150600.8.27.1 * osasnmpd-2.31.0-150600.8.27.1 * osasnmpd-debuginfo-2.31.0-150600.8.27.1 * libekmfweb1-2.31.0-150600.8.27.1 * s390-tools-zdsfs-2.31.0-150600.8.27.1 * s390-tools-hmcdrvfs-2.31.0-150600.8.27.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.27.1 * libkmipclient1-debuginfo-2.31.0-150600.8.27.1 * libekmfweb1-debuginfo-2.31.0-150600.8.27.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x x86_64) * s390-tools-debugsource-2.31.0-150600.8.27.1 * s390-tools-2.31.0-150600.8.27.1 * s390-tools-debuginfo-2.31.0-150600.8.27.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * s390-tools-debugsource-2.31.0-150600.8.27.1 * s390-tools-2.31.0-150600.8.27.1 * s390-tools-debuginfo-2.31.0-150600.8.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.27.1 * openSUSE Leap 15.6 (s390x x86_64) * s390-tools-debugsource-2.31.0-150600.8.27.1 * s390-tools-2.31.0-150600.8.27.1 * s390-tools-debuginfo-2.31.0-150600.8.27.1 * openSUSE Leap 15.6 (s390x) * libekmfweb1-devel-2.31.0-150600.8.27.1 * s390-tools-hmcdrvfs-debuginfo-2.31.0-150600.8.27.1 * s390-tools-zdsfs-debuginfo-2.31.0-150600.8.27.1 * libkmipclient1-2.31.0-150600.8.27.1 * osasnmpd-2.31.0-150600.8.27.1 * osasnmpd-debuginfo-2.31.0-150600.8.27.1 * libekmfweb1-2.31.0-150600.8.27.1 * s390-tools-zdsfs-2.31.0-150600.8.27.1 * s390-tools-hmcdrvfs-2.31.0-150600.8.27.1 * s390-tools-chreipl-fcp-mpath-2.31.0-150600.8.27.1 * libkmipclient1-debuginfo-2.31.0-150600.8.27.1 * libkmipclient1-devel-2.31.0-150600.8.27.1 * libekmfweb1-debuginfo-2.31.0-150600.8.27.1 * openSUSE Leap 15.6 (noarch) * s390-tools-genprotimg-data-2.31.0-150600.8.27.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1246792 * https://bugzilla.suse.com/show_bug.cgi?id=1258180 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:16 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:16 -0000 Subject: SUSE-FU-2026:0815-1: moderate: Feature update for ansible-trento Message-ID: <177271609600.1901.17170711279052776518@13ea24840d99> # Feature update for ansible-trento Announcement ID: SUSE-FU-2026:0815-1 Release Date: 2026-03-05T09:27:43Z Rating: moderate References: * jsc#PED-13752 Affected Products: * openSUSE Leap 15.5 * SAP Applications Module 15-SP5 * SAP Applications Module 15-SP6 * SAP Applications Module 15-SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for ansible-trento fixes the following issues: * Initial Release 1.0.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SAP Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP6-2026-815=1 * SAP Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP7-2026-815=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-815=1 * SAP Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-SAP-Applications-15-SP5-2026-815=1 ## Package List: * SAP Applications Module 15-SP6 (noarch) * ansible-trento-1.0.0-150500.11.3.1 * SAP Applications Module 15-SP7 (noarch) * ansible-trento-1.0.0-150500.11.3.1 * openSUSE Leap 15.5 (noarch) * ansible-trento-1.0.0-150500.11.3.1 * SAP Applications Module 15-SP5 (noarch) * ansible-trento-1.0.0-150500.11.3.1 ## References: * https://jira.suse.com/browse/PED-13752 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:22 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:22 -0000 Subject: SUSE-SU-2026:0814-1: moderate: Security update for mozilla-nss Message-ID: <177271610274.1901.15955851061008315927@13ea24840d99> # Security update for mozilla-nss Announcement ID: SUSE-SU-2026:0814-1 Release Date: 2026-03-05T09:06:50Z Rating: moderate References: * bsc#1258568 Cross-References: * CVE-2026-2781 CVSS scores: * CVE-2026-2781 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2781 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2781 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Update to NSS 3.112.3: * CVE-2026-2781: Avoid integer overflow in platform-independent ghash (bsc#1258568) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-814=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-814=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * mozilla-nss-3.112.3-58.136.1 * libfreebl3-debuginfo-3.112.3-58.136.1 * mozilla-nss-debugsource-3.112.3-58.136.1 * libsoftokn3-3.112.3-58.136.1 * mozilla-nss-sysinit-3.112.3-58.136.1 * libfreebl3-3.112.3-58.136.1 * libsoftokn3-debuginfo-3.112.3-58.136.1 * mozilla-nss-tools-3.112.3-58.136.1 * mozilla-nss-certs-3.112.3-58.136.1 * mozilla-nss-sysinit-debuginfo-3.112.3-58.136.1 * mozilla-nss-devel-3.112.3-58.136.1 * mozilla-nss-certs-debuginfo-3.112.3-58.136.1 * mozilla-nss-tools-debuginfo-3.112.3-58.136.1 * mozilla-nss-debuginfo-3.112.3-58.136.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * mozilla-nss-certs-32bit-3.112.3-58.136.1 * mozilla-nss-sysinit-debuginfo-32bit-3.112.3-58.136.1 * mozilla-nss-certs-debuginfo-32bit-3.112.3-58.136.1 * mozilla-nss-32bit-3.112.3-58.136.1 * libfreebl3-32bit-3.112.3-58.136.1 * mozilla-nss-debuginfo-32bit-3.112.3-58.136.1 * libfreebl3-debuginfo-32bit-3.112.3-58.136.1 * libsoftokn3-32bit-3.112.3-58.136.1 * mozilla-nss-sysinit-32bit-3.112.3-58.136.1 * libsoftokn3-debuginfo-32bit-3.112.3-58.136.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libfreebl3-debuginfo-3.112.3-58.136.1 * mozilla-nss-debuginfo-32bit-3.112.3-58.136.1 * mozilla-nss-tools-3.112.3-58.136.1 * mozilla-nss-certs-3.112.3-58.136.1 * mozilla-nss-debuginfo-3.112.3-58.136.1 * libfreebl3-debuginfo-32bit-3.112.3-58.136.1 * libsoftokn3-32bit-3.112.3-58.136.1 * mozilla-nss-3.112.3-58.136.1 * mozilla-nss-debugsource-3.112.3-58.136.1 * mozilla-nss-sysinit-3.112.3-58.136.1 * libfreebl3-32bit-3.112.3-58.136.1 * mozilla-nss-sysinit-debuginfo-3.112.3-58.136.1 * mozilla-nss-devel-3.112.3-58.136.1 * mozilla-nss-sysinit-debuginfo-32bit-3.112.3-58.136.1 * mozilla-nss-certs-32bit-3.112.3-58.136.1 * libsoftokn3-debuginfo-32bit-3.112.3-58.136.1 * mozilla-nss-certs-debuginfo-32bit-3.112.3-58.136.1 * libfreebl3-3.112.3-58.136.1 * mozilla-nss-32bit-3.112.3-58.136.1 * mozilla-nss-sysinit-32bit-3.112.3-58.136.1 * libsoftokn3-3.112.3-58.136.1 * libsoftokn3-debuginfo-3.112.3-58.136.1 * mozilla-nss-certs-debuginfo-3.112.3-58.136.1 * mozilla-nss-tools-debuginfo-3.112.3-58.136.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2781.html * https://bugzilla.suse.com/show_bug.cgi?id=1258568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:25 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:25 -0000 Subject: SUSE-SU-2026:0813-1: moderate: Security update for mozilla-nss Message-ID: <177271610591.1901.16638122972333517780@13ea24840d99> # Security update for mozilla-nss Announcement ID: SUSE-SU-2026:0813-1 Release Date: 2026-03-05T08:34:59Z Rating: moderate References: * bsc#1258568 Cross-References: * CVE-2026-2781 CVSS scores: * CVE-2026-2781 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2781 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2781 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for mozilla-nss fixes the following issues: Update to NSS 3.112.3: * CVE-2026-2781: Avoid integer overflow in platform-independent ghash (bsc#1258568) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-813=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-813=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-813=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-813=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-813=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-813=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-813=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-813=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-813=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-813=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-813=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-813=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-813=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-813=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-813=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-813=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-813=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-813=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * openSUSE Leap 15.4 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-32bit-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-32bit-debuginfo-3.112.3-150400.3.63.1 * openSUSE Leap 15.4 (aarch64_ilp32) * mozilla-nss-64bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-64bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-64bit-3.112.3-150400.3.63.1 * libfreebl3-64bit-3.112.3-150400.3.63.1 * mozilla-nss-64bit-3.112.3-150400.3.63.1 * libsoftokn3-64bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-64bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-64bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-64bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-64bit-3.112.3-150400.3.63.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * openSUSE Leap 15.6 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-32bit-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-32bit-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * Basesystem Module 15-SP7 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libfreebl3-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-debugsource-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-3.112.3-150400.3.63.1 * mozilla-nss-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-3.112.3-150400.3.63.1 * libsoftokn3-3.112.3-150400.3.63.1 * mozilla-nss-tools-3.112.3-150400.3.63.1 * mozilla-nss-devel-3.112.3-150400.3.63.1 * mozilla-nss-sysinit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-tools-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-3.112.3-150400.3.63.1 * libfreebl3-3.112.3-150400.3.63.1 * libsoftokn3-debuginfo-3.112.3-150400.3.63.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * libfreebl3-32bit-debuginfo-3.112.3-150400.3.63.1 * libfreebl3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-32bit-3.112.3-150400.3.63.1 * libsoftokn3-32bit-debuginfo-3.112.3-150400.3.63.1 * libsoftokn3-32bit-3.112.3-150400.3.63.1 * mozilla-nss-32bit-debuginfo-3.112.3-150400.3.63.1 * mozilla-nss-certs-32bit-3.112.3-150400.3.63.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2781.html * https://bugzilla.suse.com/show_bug.cgi?id=1258568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:08:29 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:08:29 -0000 Subject: SUSE-SU-2026:0812-1: important: Security update for MozillaFirefox Message-ID: <177271610984.1901.4368725262992333790@13ea24840d99> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2026:0812-1 Release Date: 2026-03-05T08:31:47Z Rating: important References: * bsc#1258568 Cross-References: * CVE-2026-2757 * CVE-2026-2758 * CVE-2026-2759 * CVE-2026-2760 * CVE-2026-2761 * CVE-2026-2762 * CVE-2026-2763 * CVE-2026-2764 * CVE-2026-2765 * CVE-2026-2766 * CVE-2026-2767 * CVE-2026-2768 * CVE-2026-2769 * CVE-2026-2770 * CVE-2026-2771 * CVE-2026-2772 * CVE-2026-2773 * CVE-2026-2774 * CVE-2026-2775 * CVE-2026-2776 * CVE-2026-2777 * CVE-2026-2778 * CVE-2026-2779 * CVE-2026-2780 * CVE-2026-2781 * CVE-2026-2782 * CVE-2026-2783 * CVE-2026-2784 * CVE-2026-2785 * CVE-2026-2786 * CVE-2026-2787 * CVE-2026-2788 * CVE-2026-2789 * CVE-2026-2790 * CVE-2026-2791 * CVE-2026-2792 * CVE-2026-2793 CVSS scores: * CVE-2026-2757 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2757 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2757 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2758 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2758 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2758 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2759 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2759 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2759 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2760 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2026-2760 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2760 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2761 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2761 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2761 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2762 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2762 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2762 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2763 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2763 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2763 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2764 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2764 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2764 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2765 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2765 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2765 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2766 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2766 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2766 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2767 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2767 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2767 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2768 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2768 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2768 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2769 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2769 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2770 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2770 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2770 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2771 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2771 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2772 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2772 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2772 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2773 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2773 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2773 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2774 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2774 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2774 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2775 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2026-2775 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2775 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2776 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2026-2776 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2776 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2777 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2777 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2777 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2778 ( SUSE ): 8.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2026-2778 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2778 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2026-2779 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2779 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2779 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2780 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2780 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2780 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2781 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2781 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2781 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2782 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2782 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2782 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2783 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2026-2783 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2026-2783 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2026-2784 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2784 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2784 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2785 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2785 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2785 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2786 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2786 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2786 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2787 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2787 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2787 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2788 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2788 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2788 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2789 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2026-2789 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2789 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2790 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2026-2790 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2790 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2791 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2026-2791 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2791 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2792 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2792 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2792 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2793 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-2793 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2793 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 37 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.8.0 ESR (MFSA 2026-15) (bsc#1258568): * CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component * CVE-2026-2758: Use-after-free in the JavaScript: GC component * CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component * CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component * CVE-2026-2761: Sandbox escape in the Graphics: WebRender component * CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component * CVE-2026-2763: Use-after-free in the JavaScript Engine component * CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component * CVE-2026-2765: Use-after-free in the JavaScript Engine component * CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component * CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component * CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component * CVE-2026-2769: Use-after-free in the Storage: IndexedDB component * CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component * CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component * CVE-2026-2772: Use-after-free in the Audio/Video: Playback component * CVE-2026-2773: Incorrect boundary conditions in the Web Audio component * CVE-2026-2774: Integer overflow in the Audio/Video component * CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component * CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software * CVE-2026-2777: Privilege escalation in the Messaging System component * CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component * CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component * CVE-2026-2780: Privilege escalation in the Netmonitor component * CVE-2026-2781: Integer overflow in the Libraries component in NSS * CVE-2026-2782: Privilege escalation in the Netmonitor component * CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component * CVE-2026-2784: Mitigation bypass in the DOM: Security component * CVE-2026-2785: Invalid pointer in the JavaScript Engine component * CVE-2026-2786: Use-after-free in the JavaScript Engine component * CVE-2026-2787: Use-after-free in the DOM: Window and Location component * CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component * CVE-2026-2789: Use-after-free in the Graphics: ImageLib component * CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component * CVE-2026-2791: Mitigation bypass in the Networking: Cache component * CVE-2026-2792: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 * CVE-2026-2793: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-812=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-812=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-140.8.0-112.301.1 * MozillaFirefox-debuginfo-140.8.0-112.301.1 * MozillaFirefox-translations-common-140.8.0-112.301.1 * MozillaFirefox-debugsource-140.8.0-112.301.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-140.8.0-112.301.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-140.8.0-112.301.1 * MozillaFirefox-debuginfo-140.8.0-112.301.1 * MozillaFirefox-translations-common-140.8.0-112.301.1 * MozillaFirefox-debugsource-140.8.0-112.301.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-140.8.0-112.301.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2757.html * https://www.suse.com/security/cve/CVE-2026-2758.html * https://www.suse.com/security/cve/CVE-2026-2759.html * https://www.suse.com/security/cve/CVE-2026-2760.html * https://www.suse.com/security/cve/CVE-2026-2761.html * https://www.suse.com/security/cve/CVE-2026-2762.html * https://www.suse.com/security/cve/CVE-2026-2763.html * https://www.suse.com/security/cve/CVE-2026-2764.html * https://www.suse.com/security/cve/CVE-2026-2765.html * https://www.suse.com/security/cve/CVE-2026-2766.html * https://www.suse.com/security/cve/CVE-2026-2767.html * https://www.suse.com/security/cve/CVE-2026-2768.html * https://www.suse.com/security/cve/CVE-2026-2769.html * https://www.suse.com/security/cve/CVE-2026-2770.html * https://www.suse.com/security/cve/CVE-2026-2771.html * https://www.suse.com/security/cve/CVE-2026-2772.html * https://www.suse.com/security/cve/CVE-2026-2773.html * https://www.suse.com/security/cve/CVE-2026-2774.html * https://www.suse.com/security/cve/CVE-2026-2775.html * https://www.suse.com/security/cve/CVE-2026-2776.html * https://www.suse.com/security/cve/CVE-2026-2777.html * https://www.suse.com/security/cve/CVE-2026-2778.html * https://www.suse.com/security/cve/CVE-2026-2779.html * https://www.suse.com/security/cve/CVE-2026-2780.html * https://www.suse.com/security/cve/CVE-2026-2781.html * https://www.suse.com/security/cve/CVE-2026-2782.html * https://www.suse.com/security/cve/CVE-2026-2783.html * https://www.suse.com/security/cve/CVE-2026-2784.html * https://www.suse.com/security/cve/CVE-2026-2785.html * https://www.suse.com/security/cve/CVE-2026-2786.html * https://www.suse.com/security/cve/CVE-2026-2787.html * https://www.suse.com/security/cve/CVE-2026-2788.html * https://www.suse.com/security/cve/CVE-2026-2789.html * https://www.suse.com/security/cve/CVE-2026-2790.html * https://www.suse.com/security/cve/CVE-2026-2791.html * https://www.suse.com/security/cve/CVE-2026-2792.html * https://www.suse.com/security/cve/CVE-2026-2793.html * https://bugzilla.suse.com/show_bug.cgi?id=1258568 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:26:45 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:26:45 -0000 Subject: SUSE-SU-2026:20560-1: important: Security update for the Linux Kernel Message-ID: <177271720514.1901.5027944246002198026@13ea24840d99> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20560-1 Release Date: 2025-11-25T07:34:55Z Rating: important References: * bsc#1215199 * bsc#1218644 * bsc#1230062 * bsc#1234634 * bsc#1234693 * bsc#1234863 * bsc#1235953 * bsc#1236897 * bsc#1237108 * bsc#1237131 * bsc#1237542 * bsc#1237776 * bsc#1238972 * bsc#1239206 * bsc#1240324 * bsc#1240696 * bsc#1240966 * bsc#1240998 * bsc#1241166 * bsc#1241353 * bsc#1241403 * bsc#1241435 * bsc#1242034 * bsc#1242086 * bsc#1242414 * bsc#1242782 * bsc#1242864 * bsc#1242965 * bsc#1242995 * bsc#1243000 * bsc#1243055 * bsc#1243068 * bsc#1243100 * bsc#1243112 * bsc#1243774 * bsc#1244309 * bsc#1244723 * bsc#1244734 * bsc#1244749 * bsc#1244792 * bsc#1244812 * bsc#1244930 * bsc#1244939 * bsc#1245000 * bsc#1245151 * bsc#1245193 * bsc#1245206 * bsc#1245216 * bsc#1245260 * bsc#1245410 * bsc#1245457 * bsc#1245504 * bsc#1245506 * bsc#1245508 * bsc#1245510 * bsc#1245596 * bsc#1245621 * bsc#1245630 * bsc#1245654 * bsc#1245657 * bsc#1245658 * bsc#1245659 * bsc#1245663 * bsc#1245664 * bsc#1245665 * bsc#1245666 * bsc#1245668 * bsc#1245669 * bsc#1245670 * bsc#1245671 * bsc#1245675 * bsc#1245676 * bsc#1245678 * bsc#1245683 * bsc#1245684 * bsc#1245686 * bsc#1245688 * bsc#1245690 * bsc#1245691 * bsc#1245695 * bsc#1245700 * bsc#1245703 * bsc#1245705 * bsc#1245710 * bsc#1245711 * bsc#1245713 * bsc#1245714 * bsc#1245715 * bsc#1245717 * bsc#1245719 * bsc#1245721 * bsc#1245723 * bsc#1245726 * bsc#1245728 * bsc#1245729 * bsc#1245730 * bsc#1245731 * bsc#1245735 * bsc#1245737 * bsc#1245744 * bsc#1245745 * bsc#1245746 * bsc#1245747 * bsc#1245748 * bsc#1245749 * bsc#1245751 * bsc#1245757 * bsc#1245763 * bsc#1245765 * bsc#1245767 * bsc#1245769 * bsc#1245777 * bsc#1245780 * bsc#1245781 * bsc#1245784 * bsc#1245785 * bsc#1245787 * bsc#1245812 * bsc#1245814 * bsc#1245815 * bsc#1245937 * bsc#1245945 * bsc#1245952 * bsc#1245955 * bsc#1245956 * bsc#1245963 * bsc#1245966 * bsc#1245970 * bsc#1245973 * bsc#1245976 * bsc#1245977 * bsc#1245986 * bsc#1246000 * bsc#1246002 * bsc#1246005 * bsc#1246008 * bsc#1246012 * bsc#1246022 * bsc#1246023 * bsc#1246031 * bsc#1246034 * bsc#1246037 * bsc#1246041 * bsc#1246042 * bsc#1246047 * bsc#1246049 * bsc#1246050 * bsc#1246053 * bsc#1246054 * bsc#1246055 * bsc#1246057 * bsc#1246098 * bsc#1246109 * bsc#1246125 * bsc#1246166 * bsc#1246171 * bsc#1246176 * bsc#1246181 * bsc#1246183 * bsc#1246185 * bsc#1246186 * bsc#1246188 * bsc#1246190 * bsc#1246192 * bsc#1246193 * bsc#1246195 * bsc#1246220 * bsc#1246234 * bsc#1246236 * bsc#1246240 * bsc#1246243 * bsc#1246244 * bsc#1246245 * bsc#1246246 * bsc#1246248 * bsc#1246250 * bsc#1246252 * bsc#1246253 * bsc#1246255 * bsc#1246258 * bsc#1246259 * bsc#1246260 * bsc#1246262 * bsc#1246266 * bsc#1246268 * bsc#1246283 * bsc#1246285 * bsc#1246286 * bsc#1246287 * bsc#1246290 * bsc#1246292 * bsc#1246293 * bsc#1246295 * bsc#1246297 * bsc#1246333 * bsc#1246334 * bsc#1246337 * bsc#1246342 * bsc#1246349 * bsc#1246351 * bsc#1246353 * bsc#1246354 * bsc#1246358 * bsc#1246364 * bsc#1246366 * bsc#1246370 * bsc#1246375 * bsc#1246376 * bsc#1246385 * bsc#1246386 * bsc#1246387 * bsc#1246438 * bsc#1246443 * bsc#1246444 * bsc#1246447 * bsc#1246450 * bsc#1246453 * bsc#1246473 * bsc#1246490 * bsc#1246509 * bsc#1246547 * bsc#1246631 * bsc#1246651 * bsc#1246688 * bsc#1246777 * bsc#1246781 * bsc#1246782 * bsc#1246868 * bsc#1246896 * bsc#1246911 * bsc#1246979 * bsc#1247018 * bsc#1247020 * bsc#1247022 * bsc#1247023 * bsc#1247024 * bsc#1247027 * bsc#1247028 * bsc#1247031 * bsc#1247033 * bsc#1247035 * bsc#1247061 * bsc#1247062 * bsc#1247064 * bsc#1247076 * bsc#1247078 * bsc#1247079 * bsc#1247088 * bsc#1247089 * bsc#1247091 * bsc#1247097 * bsc#1247098 * bsc#1247099 * bsc#1247101 * bsc#1247102 * bsc#1247103 * bsc#1247104 * bsc#1247112 * bsc#1247113 * bsc#1247116 * bsc#1247118 * bsc#1247119 * bsc#1247123 * bsc#1247125 * bsc#1247126 * bsc#1247128 * bsc#1247130 * bsc#1247131 * bsc#1247132 * bsc#1247136 * bsc#1247137 * bsc#1247138 * bsc#1247141 * bsc#1247143 * bsc#1247145 * bsc#1247146 * bsc#1247147 * bsc#1247149 * bsc#1247150 * bsc#1247151 * bsc#1247152 * bsc#1247153 * bsc#1247154 * bsc#1247155 * bsc#1247156 * bsc#1247157 * bsc#1247160 * bsc#1247162 * bsc#1247163 * bsc#1247164 * bsc#1247167 * bsc#1247169 * bsc#1247170 * bsc#1247171 * bsc#1247174 * bsc#1247176 * bsc#1247177 * bsc#1247178 * bsc#1247181 * bsc#1247209 * bsc#1247210 * bsc#1247220 * bsc#1247223 * bsc#1247227 * bsc#1247229 * bsc#1247231 * bsc#1247233 * bsc#1247234 * bsc#1247235 * bsc#1247236 * bsc#1247238 * bsc#1247239 * bsc#1247241 * bsc#1247243 * bsc#1247250 * bsc#1247251 * bsc#1247252 * bsc#1247253 * bsc#1247255 * bsc#1247262 * bsc#1247265 * bsc#1247270 * bsc#1247271 * bsc#1247273 * bsc#1247274 * bsc#1247276 * bsc#1247277 * bsc#1247278 * bsc#1247279 * bsc#1247280 * bsc#1247282 * bsc#1247283 * bsc#1247284 * bsc#1247285 * bsc#1247288 * bsc#1247289 * bsc#1247290 * bsc#1247293 * bsc#1247308 * bsc#1247311 * bsc#1247313 * bsc#1247314 * bsc#1247317 * bsc#1247325 * bsc#1247347 * bsc#1247348 * bsc#1247349 * bsc#1247366 * bsc#1247372 * bsc#1247376 * bsc#1247426 * bsc#1247437 * bsc#1247442 * bsc#1247483 * bsc#1247500 * bsc#1247712 * bsc#1247837 * bsc#1247838 * bsc#1247935 * bsc#1247936 * bsc#1247949 * bsc#1247950 * bsc#1247963 * bsc#1247976 * bsc#1248088 * bsc#1248111 * bsc#1248121 * bsc#1248183 * bsc#1248186 * bsc#1248190 * bsc#1248192 * bsc#1248194 * bsc#1248198 * bsc#1248199 * bsc#1248200 * bsc#1248202 * bsc#1248205 * bsc#1248211 * bsc#1248223 * bsc#1248224 * bsc#1248225 * bsc#1248230 * bsc#1248235 * bsc#1248255 * bsc#1248296 * bsc#1248297 * bsc#1248299 * bsc#1248302 * bsc#1248304 * bsc#1248306 * bsc#1248312 * bsc#1248333 * bsc#1248334 * bsc#1248337 * bsc#1248338 * bsc#1248340 * bsc#1248341 * bsc#1248343 * bsc#1248345 * bsc#1248349 * bsc#1248350 * bsc#1248354 * bsc#1248355 * bsc#1248357 * bsc#1248359 * bsc#1248361 * bsc#1248363 * bsc#1248365 * bsc#1248367 * bsc#1248368 * bsc#1248374 * bsc#1248377 * bsc#1248378 * bsc#1248380 * bsc#1248386 * bsc#1248390 * bsc#1248392 * bsc#1248395 * bsc#1248396 * bsc#1248399 * bsc#1248401 * bsc#1248511 * bsc#1248512 * bsc#1248573 * bsc#1248575 * bsc#1248577 * bsc#1248609 * bsc#1248610 * bsc#1248616 * bsc#1248617 * bsc#1248619 * bsc#1248621 * bsc#1248622 * bsc#1248624 * bsc#1248627 * bsc#1248628 * bsc#1248634 * bsc#1248635 * bsc#1248639 * bsc#1248643 * bsc#1248647 * bsc#1248648 * bsc#1248652 * bsc#1248655 * bsc#1248662 * bsc#1248664 * bsc#1248666 * bsc#1248669 * bsc#1248674 * bsc#1248681 * bsc#1248727 * bsc#1248728 * bsc#1248748 * bsc#1248754 * bsc#1248775 * bsc#1249022 * bsc#1249038 * bsc#1249060 * bsc#1249061 * bsc#1249062 * bsc#1249064 * bsc#1249065 * bsc#1249066 * bsc#1249126 * bsc#1249143 * bsc#1249156 * bsc#1249159 * bsc#1249160 * bsc#1249163 * bsc#1249164 * bsc#1249166 * bsc#1249167 * bsc#1249169 * bsc#1249170 * bsc#1249172 * bsc#1249176 * bsc#1249177 * bsc#1249182 * bsc#1249186 * bsc#1249190 * bsc#1249193 * bsc#1249195 * bsc#1249199 * bsc#1249201 * bsc#1249202 * bsc#1249203 * bsc#1249204 * bsc#1249206 * bsc#1249215 * bsc#1249220 * bsc#1249221 * bsc#1249254 * bsc#1249258 * bsc#1249262 * bsc#1249263 * bsc#1249265 * bsc#1249266 * bsc#1249269 * bsc#1249271 * bsc#1249272 * bsc#1249273 * bsc#1249274 * bsc#1249278 * bsc#1249279 * bsc#1249281 * bsc#1249282 * bsc#1249284 * bsc#1249285 * bsc#1249286 * bsc#1249288 * bsc#1249290 * bsc#1249292 * bsc#1249295 * bsc#1249296 * bsc#1249297 * bsc#1249299 * bsc#1249300 * bsc#1249301 * bsc#1249303 * bsc#1249304 * bsc#1249305 * bsc#1249306 * bsc#1249308 * bsc#1249309 * bsc#1249312 * bsc#1249313 * bsc#1249314 * bsc#1249315 * bsc#1249316 * bsc#1249318 * bsc#1249319 * bsc#1249320 * bsc#1249321 * bsc#1249322 * bsc#1249323 * bsc#1249324 * bsc#1249333 * bsc#1249334 * bsc#1249338 * bsc#1249346 * bsc#1249374 * bsc#1249413 * bsc#1249477 * bsc#1249478 * bsc#1249479 * bsc#1249486 * bsc#1249490 * bsc#1249494 * bsc#1249500 * bsc#1249504 * bsc#1249506 * bsc#1249508 * bsc#1249509 * bsc#1249510 * bsc#1249513 * bsc#1249515 * bsc#1249516 * bsc#1249522 * bsc#1249523 * bsc#1249524 * bsc#1249526 * bsc#1249533 * bsc#1249538 * bsc#1249540 * bsc#1249542 * bsc#1249545 * bsc#1249547 * bsc#1249548 * bsc#1249550 * bsc#1249552 * bsc#1249554 * bsc#1249562 * bsc#1249566 * bsc#1249587 * bsc#1249598 * bsc#1249604 * bsc#1249608 * bsc#1249615 * bsc#1249618 * bsc#1249774 * bsc#1249833 * bsc#1249887 * bsc#1249888 * bsc#1249901 * bsc#1249904 * bsc#1249906 * bsc#1249915 * bsc#1249974 * bsc#1249975 * bsc#1250002 * bsc#1250007 * bsc#1250021 * bsc#1250025 * bsc#1250028 * bsc#1250032 * bsc#1250087 * bsc#1250088 * bsc#1250119 * bsc#1250123 * bsc#1250124 * bsc#1250177 * bsc#1250179 * bsc#1250203 * bsc#1250204 * bsc#1250205 * bsc#1250237 * bsc#1250242 * bsc#1250247 * bsc#1250249 * bsc#1250251 * bsc#1250258 * bsc#1250262 * bsc#1250266 * bsc#1250267 * bsc#1250268 * bsc#1250275 * bsc#1250276 * bsc#1250281 * bsc#1250291 * bsc#1250292 * bsc#1250294 * bsc#1250296 * bsc#1250297 * bsc#1250298 * bsc#1250334 * bsc#1250344 * bsc#1250365 * bsc#1250371 * bsc#1250377 * bsc#1250386 * bsc#1250389 * bsc#1250398 * bsc#1250402 * bsc#1250406 * bsc#1250407 * bsc#1250408 * bsc#1250450 * bsc#1250491 * bsc#1250519 * bsc#1250522 * bsc#1250650 * bsc#1250655 * bsc#1250671 * bsc#1250702 * bsc#1250711 * bsc#1250712 * bsc#1250713 * bsc#1250716 * bsc#1250719 * bsc#1250722 * bsc#1250729 * bsc#1250736 * bsc#1250737 * bsc#1250739 * bsc#1250741 * bsc#1250742 * bsc#1250758 * bsc#1250952 * bsc#1251100 * bsc#1251114 * bsc#1251134 * bsc#1251135 * bsc#1251143 * bsc#1251146 * bsc#1251186 * bsc#1251216 * bsc#1251230 * bsc#1251810 * bsc#1252084 * jsc#PED-10909 * jsc#PED-12405 * jsc#PED-12745 * jsc#PED-12882 * jsc#PED-13113 * jsc#PED-13256 * jsc#PED-13302 * jsc#PED-13331 * jsc#PED-13343 * jsc#PED-13345 * jsc#PED-13631 * jsc#PED-13704 * jsc#PED-13728 * jsc#PED-13762 * jsc#PED-13815 * jsc#PED-348 * jsc#PED-7249 Cross-References: * CVE-2024-53164 * CVE-2024-57891 * CVE-2024-57951 * CVE-2024-57952 * CVE-2024-58090 * CVE-2025-22034 * CVE-2025-22077 * CVE-2025-23141 * CVE-2025-37798 * CVE-2025-37821 * CVE-2025-37849 * CVE-2025-37856 * CVE-2025-37861 * CVE-2025-37864 * CVE-2025-38006 * CVE-2025-38008 * CVE-2025-38019 * CVE-2025-38034 * CVE-2025-38038 * CVE-2025-38052 * CVE-2025-38058 * CVE-2025-38062 * CVE-2025-38075 * CVE-2025-38087 * CVE-2025-38088 * CVE-2025-38089 * CVE-2025-38090 * CVE-2025-38091 * CVE-2025-38095 * CVE-2025-38096 * CVE-2025-38098 * CVE-2025-38099 * CVE-2025-38101 * CVE-2025-38102 * CVE-2025-38103 * CVE-2025-38106 * CVE-2025-38107 * CVE-2025-38108 * CVE-2025-38109 * CVE-2025-38110 * CVE-2025-38111 * CVE-2025-38112 * CVE-2025-38113 * CVE-2025-38114 * CVE-2025-38117 * CVE-2025-38118 * CVE-2025-38119 * CVE-2025-38120 * CVE-2025-38122 * CVE-2025-38123 * CVE-2025-38124 * CVE-2025-38125 * CVE-2025-38127 * CVE-2025-38128 * CVE-2025-38129 * CVE-2025-38134 * CVE-2025-38135 * CVE-2025-38136 * CVE-2025-38137 * CVE-2025-38138 * CVE-2025-38140 * CVE-2025-38141 * CVE-2025-38142 * CVE-2025-38143 * CVE-2025-38145 * CVE-2025-38146 * CVE-2025-38148 * CVE-2025-38149 * CVE-2025-38151 * CVE-2025-38153 * CVE-2025-38154 * CVE-2025-38155 * CVE-2025-38156 * CVE-2025-38157 * CVE-2025-38159 * CVE-2025-38160 * CVE-2025-38161 * CVE-2025-38165 * CVE-2025-38168 * CVE-2025-38169 * CVE-2025-38170 * CVE-2025-38172 * CVE-2025-38173 * CVE-2025-38174 * CVE-2025-38177 * CVE-2025-38180 * CVE-2025-38181 * CVE-2025-38182 * CVE-2025-38184 * CVE-2025-38185 * CVE-2025-38186 * CVE-2025-38188 * CVE-2025-38189 * CVE-2025-38190 * CVE-2025-38193 * CVE-2025-38197 * CVE-2025-38198 * CVE-2025-38201 * CVE-2025-38205 * CVE-2025-38208 * CVE-2025-38209 * CVE-2025-38211 * CVE-2025-38213 * CVE-2025-38214 * CVE-2025-38215 * CVE-2025-38216 * CVE-2025-38217 * CVE-2025-38220 * CVE-2025-38222 * CVE-2025-38224 * CVE-2025-38225 * CVE-2025-38226 * CVE-2025-38227 * CVE-2025-38228 * CVE-2025-38229 * CVE-2025-38231 * CVE-2025-38232 * CVE-2025-38233 * CVE-2025-38234 * CVE-2025-38242 * CVE-2025-38244 * CVE-2025-38245 * CVE-2025-38246 * CVE-2025-38249 * CVE-2025-38251 * CVE-2025-38253 * CVE-2025-38255 * CVE-2025-38256 * CVE-2025-38257 * CVE-2025-38258 * CVE-2025-38259 * CVE-2025-38263 * CVE-2025-38265 * CVE-2025-38267 * CVE-2025-38268 * CVE-2025-38270 * CVE-2025-38272 * CVE-2025-38273 * CVE-2025-38274 * CVE-2025-38275 * CVE-2025-38277 * CVE-2025-38278 * CVE-2025-38286 * CVE-2025-38287 * CVE-2025-38288 * CVE-2025-38289 * CVE-2025-38290 * CVE-2025-38291 * CVE-2025-38292 * CVE-2025-38293 * CVE-2025-38299 * CVE-2025-38300 * CVE-2025-38301 * CVE-2025-38302 * CVE-2025-38303 * CVE-2025-38304 * CVE-2025-38305 * CVE-2025-38306 * CVE-2025-38307 * CVE-2025-38311 * CVE-2025-38312 * CVE-2025-38313 * CVE-2025-38315 * CVE-2025-38317 * CVE-2025-38318 * CVE-2025-38319 * CVE-2025-38322 * CVE-2025-38323 * CVE-2025-38326 * CVE-2025-38332 * CVE-2025-38335 * CVE-2025-38336 * CVE-2025-38337 * CVE-2025-38338 * CVE-2025-38339 * CVE-2025-38341 * CVE-2025-38342 * CVE-2025-38343 * CVE-2025-38344 * CVE-2025-38345 * CVE-2025-38348 * CVE-2025-38349 * CVE-2025-38350 * CVE-2025-38351 * CVE-2025-38352 * CVE-2025-38353 * CVE-2025-38354 * CVE-2025-38355 * CVE-2025-38356 * CVE-2025-38359 * CVE-2025-38360 * CVE-2025-38361 * CVE-2025-38362 * CVE-2025-38363 * CVE-2025-38364 * CVE-2025-38365 * CVE-2025-38368 * CVE-2025-38369 * CVE-2025-38371 * CVE-2025-38372 * CVE-2025-38373 * CVE-2025-38374 * CVE-2025-38375 * CVE-2025-38376 * CVE-2025-38377 * CVE-2025-38380 * CVE-2025-38381 * CVE-2025-38382 * CVE-2025-38383 * CVE-2025-38384 * CVE-2025-38385 * CVE-2025-38386 * CVE-2025-38387 * CVE-2025-38389 * CVE-2025-38390 * CVE-2025-38391 * CVE-2025-38392 * CVE-2025-38393 * CVE-2025-38395 * CVE-2025-38396 * CVE-2025-38397 * CVE-2025-38399 * CVE-2025-38400 * CVE-2025-38401 * CVE-2025-38402 * CVE-2025-38403 * CVE-2025-38404 * CVE-2025-38405 * CVE-2025-38406 * CVE-2025-38408 * CVE-2025-38409 * CVE-2025-38410 * CVE-2025-38412 * CVE-2025-38413 * CVE-2025-38414 * CVE-2025-38415 * CVE-2025-38416 * CVE-2025-38417 * CVE-2025-38418 * CVE-2025-38419 * CVE-2025-38420 * CVE-2025-38421 * CVE-2025-38424 * CVE-2025-38425 * CVE-2025-38426 * CVE-2025-38427 * CVE-2025-38428 * CVE-2025-38429 * CVE-2025-38430 * CVE-2025-38436 * CVE-2025-38438 * CVE-2025-38439 * CVE-2025-38440 * CVE-2025-38441 * CVE-2025-38443 * CVE-2025-38444 * CVE-2025-38445 * CVE-2025-38446 * CVE-2025-38448 * CVE-2025-38449 * CVE-2025-38450 * CVE-2025-38451 * CVE-2025-38453 * CVE-2025-38454 * CVE-2025-38455 * CVE-2025-38456 * CVE-2025-38457 * CVE-2025-38458 * CVE-2025-38459 * CVE-2025-38460 * CVE-2025-38461 * CVE-2025-38462 * CVE-2025-38463 * CVE-2025-38464 * CVE-2025-38465 * CVE-2025-38466 * CVE-2025-38467 * CVE-2025-38468 * CVE-2025-38470 * CVE-2025-38472 * CVE-2025-38473 * CVE-2025-38474 * CVE-2025-38475 * CVE-2025-38476 * CVE-2025-38477 * CVE-2025-38478 * CVE-2025-38480 * CVE-2025-38481 * CVE-2025-38482 * CVE-2025-38483 * CVE-2025-38484 * CVE-2025-38485 * CVE-2025-38487 * CVE-2025-38488 * CVE-2025-38489 * CVE-2025-38490 * CVE-2025-38491 * CVE-2025-38493 * CVE-2025-38494 * CVE-2025-38495 * CVE-2025-38496 * CVE-2025-38497 * CVE-2025-38499 * CVE-2025-38500 * CVE-2025-38503 * CVE-2025-38506 * CVE-2025-38508 * CVE-2025-38514 * CVE-2025-38524 * CVE-2025-38526 * CVE-2025-38527 * CVE-2025-38528 * CVE-2025-38531 * CVE-2025-38533 * CVE-2025-38539 * CVE-2025-38544 * CVE-2025-38545 * CVE-2025-38546 * CVE-2025-38549 * CVE-2025-38552 * CVE-2025-38553 * CVE-2025-38554 * CVE-2025-38555 * CVE-2025-38556 * CVE-2025-38557 * CVE-2025-38559 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38564 * CVE-2025-38565 * CVE-2025-38566 * CVE-2025-38568 * CVE-2025-38571 * CVE-2025-38572 * CVE-2025-38573 * CVE-2025-38574 * CVE-2025-38576 * CVE-2025-38581 * CVE-2025-38582 * CVE-2025-38583 * CVE-2025-38584 * CVE-2025-38585 * CVE-2025-38586 * CVE-2025-38587 * CVE-2025-38588 * CVE-2025-38591 * CVE-2025-38593 * CVE-2025-38595 * CVE-2025-38597 * CVE-2025-38601 * CVE-2025-38602 * CVE-2025-38604 * CVE-2025-38605 * CVE-2025-38608 * CVE-2025-38609 * CVE-2025-38610 * CVE-2025-38612 * CVE-2025-38614 * CVE-2025-38616 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38619 * CVE-2025-38621 * CVE-2025-38622 * CVE-2025-38623 * CVE-2025-38624 * CVE-2025-38628 * CVE-2025-38630 * CVE-2025-38631 * CVE-2025-38632 * CVE-2025-38634 * CVE-2025-38635 * CVE-2025-38639 * CVE-2025-38640 * CVE-2025-38643 * CVE-2025-38644 * CVE-2025-38646 * CVE-2025-38648 * CVE-2025-38656 * CVE-2025-38658 * CVE-2025-38659 * CVE-2025-38660 * CVE-2025-38662 * CVE-2025-38664 * CVE-2025-38665 * CVE-2025-38668 * CVE-2025-38670 * CVE-2025-38671 * CVE-2025-38676 * CVE-2025-38678 * CVE-2025-38679 * CVE-2025-38680 * CVE-2025-38681 * CVE-2025-38683 * CVE-2025-38684 * CVE-2025-38685 * CVE-2025-38686 * CVE-2025-38687 * CVE-2025-38691 * CVE-2025-38692 * CVE-2025-38693 * CVE-2025-38694 * CVE-2025-38695 * CVE-2025-38700 * CVE-2025-38701 * CVE-2025-38702 * CVE-2025-38703 * CVE-2025-38705 * CVE-2025-38706 * CVE-2025-38709 * CVE-2025-38710 * CVE-2025-38717 * CVE-2025-38721 * CVE-2025-38722 * CVE-2025-38724 * CVE-2025-38725 * CVE-2025-38727 * CVE-2025-38729 * CVE-2025-38730 * CVE-2025-38732 * CVE-2025-38733 * CVE-2025-38734 * CVE-2025-38735 * CVE-2025-38736 * CVE-2025-39673 * CVE-2025-39675 * CVE-2025-39677 * CVE-2025-39678 * CVE-2025-39679 * CVE-2025-39681 * CVE-2025-39682 * CVE-2025-39683 * CVE-2025-39684 * CVE-2025-39685 * CVE-2025-39686 * CVE-2025-39687 * CVE-2025-39691 * CVE-2025-39693 * CVE-2025-39694 * CVE-2025-39695 * CVE-2025-39697 * CVE-2025-39698 * CVE-2025-39700 * CVE-2025-39701 * CVE-2025-39703 * CVE-2025-39705 * CVE-2025-39706 * CVE-2025-39707 * CVE-2025-39709 * CVE-2025-39710 * CVE-2025-39711 * CVE-2025-39712 * CVE-2025-39713 * CVE-2025-39714 * CVE-2025-39718 * CVE-2025-39719 * CVE-2025-39721 * CVE-2025-39722 * CVE-2025-39723 * CVE-2025-39724 * CVE-2025-39726 * CVE-2025-39727 * CVE-2025-39730 * CVE-2025-39732 * CVE-2025-39738 * CVE-2025-39739 * CVE-2025-39742 * CVE-2025-39744 * CVE-2025-39746 * CVE-2025-39747 * CVE-2025-39748 * CVE-2025-39749 * CVE-2025-39750 * CVE-2025-39751 * CVE-2025-39754 * CVE-2025-39757 * CVE-2025-39758 * CVE-2025-39759 * CVE-2025-39760 * CVE-2025-39761 * CVE-2025-39763 * CVE-2025-39764 * CVE-2025-39765 * CVE-2025-39766 * CVE-2025-39770 * CVE-2025-39772 * CVE-2025-39773 * CVE-2025-39775 * CVE-2025-39782 * CVE-2025-39783 * CVE-2025-39787 * CVE-2025-39788 * CVE-2025-39790 * CVE-2025-39791 * CVE-2025-39792 * CVE-2025-39797 * CVE-2025-39798 * CVE-2025-39800 * CVE-2025-39801 * CVE-2025-39806 * CVE-2025-39807 * CVE-2025-39808 * CVE-2025-39810 * CVE-2025-39811 * CVE-2025-39813 * CVE-2025-39816 * CVE-2025-39823 * CVE-2025-39824 * CVE-2025-39825 * CVE-2025-39826 * CVE-2025-39827 * CVE-2025-39828 * CVE-2025-39830 * CVE-2025-39832 * CVE-2025-39833 * CVE-2025-39834 * CVE-2025-39835 * CVE-2025-39836 * CVE-2025-39838 * CVE-2025-39839 * CVE-2025-39841 * CVE-2025-39842 * CVE-2025-39844 * CVE-2025-39845 * CVE-2025-39847 * CVE-2025-39848 * CVE-2025-39849 * CVE-2025-39850 * CVE-2025-39851 * CVE-2025-39852 * CVE-2025-39853 * CVE-2025-39854 * CVE-2025-39857 * CVE-2025-39860 * CVE-2025-39861 * CVE-2025-39863 * CVE-2025-39864 * CVE-2025-39865 * CVE-2025-39869 * CVE-2025-39870 * CVE-2025-39871 * CVE-2025-39873 * CVE-2025-39875 * CVE-2025-39877 * CVE-2025-39882 * CVE-2025-39884 * CVE-2025-39885 * CVE-2025-39889 * CVE-2025-39890 * CVE-2025-39891 * CVE-2025-39896 * CVE-2025-39898 * CVE-2025-39899 * CVE-2025-39900 * CVE-2025-39902 * CVE-2025-39907 * CVE-2025-39909 * CVE-2025-39916 * CVE-2025-39918 * CVE-2025-39922 * CVE-2025-39923 * CVE-2025-39925 * CVE-2025-39926 * CVE-2025-39931 * CVE-2025-39934 * CVE-2025-39937 * CVE-2025-39938 * CVE-2025-39945 * CVE-2025-39946 * CVE-2025-39952 * CVE-2025-39957 * CVE-2025-40300 * CVE-2026-38264 CVSS scores: * CVE-2024-53164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57951 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57952 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57952 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37849 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-37849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37856 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37856 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37861 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38006 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38006 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38008 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38019 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38019 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38019 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38034 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38034 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38038 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38052 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38058 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38062 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38075 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38088 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38088 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38088 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38089 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38090 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38090 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38091 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38098 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38099 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38101 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38101 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38102 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38102 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38103 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38103 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38106 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38106 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38107 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38107 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38108 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38108 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38109 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38109 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38110 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38110 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38111 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38111 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38111 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38112 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38112 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38114 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38117 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38117 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38118 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38118 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38118 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38120 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-38120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38122 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38124 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38125 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38128 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38128 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38129 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38129 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38135 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38136 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38137 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38137 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38137 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38140 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38142 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38143 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38145 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38146 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38146 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38148 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38149 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38153 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38153 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38154 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38156 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38157 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38157 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38159 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38160 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38165 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38168 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38168 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38168 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38169 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38169 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38169 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38170 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38170 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38172 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38172 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38172 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38173 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38173 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38174 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38174 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38181 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38186 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38188 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38189 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38190 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38193 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38197 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38197 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38198 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38201 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38209 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38209 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38211 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38211 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38213 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38214 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38214 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38216 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38216 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38217 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38217 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38220 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38220 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38222 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38224 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38224 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38226 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38226 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38227 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38228 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38228 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38229 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38231 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38231 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38232 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38232 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38233 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38234 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38234 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38234 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38242 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38242 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38242 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38244 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38244 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38245 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38245 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38246 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38249 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38249 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38251 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38253 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38255 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38255 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38256 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38256 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38258 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38258 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38258 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38259 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38259 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38263 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38265 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38267 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38267 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38267 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38268 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38270 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38270 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38272 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38273 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38273 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38274 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38274 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38274 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38275 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38275 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38277 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38277 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38278 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38278 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38286 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38286 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38289 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38289 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38290 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38291 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38291 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38291 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38292 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38292 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38293 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38293 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38300 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38300 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38302 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38303 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38305 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38306 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38306 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38311 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38313 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38315 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38315 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38317 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38317 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38317 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38318 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38318 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38318 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38319 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38322 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38322 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38322 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38323 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38323 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38336 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38337 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38338 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38339 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-38339 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-38339 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38341 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38341 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38342 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38343 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38344 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38344 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38345 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38345 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38348 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38349 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38350 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-38350 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38351 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38353 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38354 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38354 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38355 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38355 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38356 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38356 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38356 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38360 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38362 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38362 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38363 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38363 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38364 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38364 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38365 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38365 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38368 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38369 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38371 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38371 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38372 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38372 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38372 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38373 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38373 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38374 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38375 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38375 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38375 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38376 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38377 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38377 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38380 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38381 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38382 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38382 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38383 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38384 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38384 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38385 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38386 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38387 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38387 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38389 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38389 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38390 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38390 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38391 ( SUSE ): 5.2 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38391 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38392 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38393 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38393 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38395 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38395 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38396 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38396 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38397 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38397 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38399 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38399 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38400 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38400 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38401 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38401 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38402 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38402 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38403 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38403 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38404 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38404 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38405 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38405 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38405 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38406 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38406 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38408 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38408 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38408 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38409 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38410 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38410 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38412 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38412 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38413 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38413 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38413 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38414 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38415 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38415 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38416 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38417 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38417 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38417 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38418 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38418 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38419 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38420 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38420 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38421 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38421 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38421 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38424 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38424 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38425 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38425 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38426 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38426 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38427 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38428 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38428 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38429 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38429 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38430 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38430 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38439 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38439 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38439 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38440 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38440 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38440 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38441 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38441 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38441 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38443 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38443 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38444 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38444 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38445 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38446 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38446 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38446 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38448 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38448 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38449 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38449 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38449 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38450 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38450 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38451 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38451 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38453 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38453 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38454 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38454 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38455 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38455 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38456 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38456 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38456 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38457 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38457 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38458 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38458 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38459 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38460 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38460 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38461 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38461 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38462 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38462 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38463 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38463 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38464 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38464 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38464 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38465 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38465 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38466 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L * CVE-2025-38466 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38467 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38467 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38468 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38468 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38470 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38470 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38472 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38472 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38472 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38473 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38473 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38474 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38474 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38475 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38475 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38475 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38477 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38478 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38478 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38480 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38480 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38481 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38481 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38482 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38482 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38483 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38483 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38484 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38484 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38485 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38485 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38487 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38488 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38488 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38488 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38489 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38489 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38490 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38491 ( SUSE ): 2.3 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38491 ( SUSE ): 5.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-38491 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-38493 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L * CVE-2025-38493 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38494 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38494 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38495 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38495 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38496 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38496 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38497 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38497 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38499 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38500 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38500 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38500 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38503 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38503 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38506 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38506 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38506 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38508 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38508 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38508 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38514 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38524 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38526 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38527 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38527 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38527 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38528 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38528 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38528 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38531 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38531 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38531 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38533 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38533 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38533 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38544 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38545 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38545 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38545 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38549 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38549 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38552 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38553 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38553 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38554 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38554 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38554 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38556 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38556 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38556 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38557 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38560 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38564 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38564 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38565 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38565 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38565 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38566 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38566 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38568 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38568 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38568 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38571 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38571 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38571 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38573 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38573 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38574 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38574 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38574 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38576 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38576 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38576 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38581 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38582 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38583 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38583 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38584 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38584 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38584 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38585 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38585 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38585 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38586 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38586 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38586 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38587 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38587 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38587 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38591 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38591 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-38591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38593 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38593 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38595 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38595 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38597 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38597 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38601 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38602 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38602 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38604 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38604 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38604 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38605 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38605 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38609 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38610 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38610 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38612 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38612 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38614 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38614 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38616 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38616 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38619 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38619 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38622 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38622 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38623 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38623 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38624 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38624 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38628 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38628 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38628 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38630 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38630 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38632 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38635 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38639 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38639 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38640 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38646 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38646 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38648 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38648 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38658 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38658 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38659 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38659 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38660 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38662 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38662 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38662 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38664 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38665 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38670 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38676 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38676 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38676 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38678 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38679 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38680 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38680 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38681 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38681 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38685 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38685 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38686 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38687 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38691 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38691 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38692 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38692 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38695 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38695 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38700 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38701 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38701 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38701 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38702 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-38702 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38703 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38703 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38706 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38709 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38709 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38710 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38710 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38717 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38717 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38722 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38724 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38729 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38732 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38732 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38733 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38734 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38735 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38736 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39673 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39675 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39681 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39682 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39683 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39684 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39684 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39685 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39686 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39687 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39691 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-39691 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39694 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39695 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39697 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39698 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-39700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39700 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39707 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39710 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39713 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39719 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39721 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39723 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39726 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39732 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39738 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39738 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-39738 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39739 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39739 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39742 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39744 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39746 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39746 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39747 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39747 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39749 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39750 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39750 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39751 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39751 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39754 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39757 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39759 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N * CVE-2025-39759 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39759 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39760 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2025-39760 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39761 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39763 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39764 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39765 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39766 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39782 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39783 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39787 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39787 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39788 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39790 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39790 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39790 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39791 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39791 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39791 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39792 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39792 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39792 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39798 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39798 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39798 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39801 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39801 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-39801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39806 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39810 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39810 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39811 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39823 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39824 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39824 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39825 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39825 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-39825 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39826 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39826 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39826 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39827 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39828 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39830 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39830 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39833 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39835 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39836 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39838 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39838 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39838 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39839 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39841 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39842 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39848 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39851 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39852 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39853 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39854 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39860 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39861 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39863 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39864 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39869 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39870 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39871 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39875 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39875 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39877 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39882 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39884 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39884 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39889 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39891 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-39891 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-39891 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39896 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39896 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39899 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39899 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39899 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39900 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39902 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39907 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39909 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39918 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-39918 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-39918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39918 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39922 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39922 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39922 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39923 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39923 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39925 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39926 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39926 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2025-39926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39926 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39934 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39945 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39952 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39957 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40300 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-40300 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-40300 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves 573 vulnerabilities, contains 17 features and has 96 fixes can now be installed. ## Description: The SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863). * CVE-2024-57891: sched_ext: Fix invalid irq restore in scx_ops_bypass() (bsc#1235953). * CVE-2024-57951: hrtimers: Handle CPU state correctly on hotplug (bsc#1237108). * CVE-2024-57952: Revert "libfs: fix infinite directory reads for offset dir" (bsc#1237131). * CVE-2024-58090: sched/core: Prevent rescheduling when interrupts are disabled (bsc#1240324). * CVE-2025-22034: mm/rmap: avoid -EBUSY from make_device_exclusive() (bsc#1241435). * CVE-2025-22077: Revert "smb: client: fix TCP timers deadlock after rmmod" (bsc#1241403). * CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782). * CVE-2025-37821: sched/eevdf: Fix se->slice being set to U64_MAX and resulting (bsc#1242864). * CVE-2025-37849: KVM: arm64: Tear down vGIC on failed vCPU creation (bsc#1243000). * CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races (bsc#1243068). * CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055). * CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind (bsc#1242965). * CVE-2025-38006: net: mctp: Do not access ifa_index when missing (bsc#1244930). * CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939). * CVE-2025-38019: mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices (bsc#1245000). * CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref (bsc#1244792). * CVE-2025-38038: cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost (bsc#1244812). * CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock (bsc#1245151). * CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216). * CVE-2025-38075: scsi: target: iscsi: Fix timeout on deleted connection (bsc#1244734). * CVE-2025-38101: ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set() (bsc#1245659). * CVE-2025-38103: HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse() (bsc#1245663). * CVE-2025-38106: io_uring/sqpoll: do not put task_struct on tctx setup failure (bsc#1245664). * CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695). * CVE-2025-38119: scsi: core: ufs: Fix a hang in the error handler (bsc#1245700). * CVE-2025-38125: net: stmmac: make sure that ptp_rate is not 0 before configuring EST (bsc#1245710). * CVE-2025-38146: net: openvswitch: Fix the dead loop of MPLS parse (bsc#1245767). * CVE-2025-38160: clk: bcm: rpi: Add NULL check in raspberrypi_clk_register() (bsc#1245780). * CVE-2025-38168: perf: arm-ni: Unregister PMUs on probe failure (bsc#1245763). * CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970). * CVE-2025-38182: ublk: santizize the arguments from userspace when adding a device (bsc#1245937). * CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956). * CVE-2025-38185: atm: atmtcp: Free invalid length skb in atmtcp_c_send() (bsc#1246012). * CVE-2025-38190: atm: Revert atm_account_tx() if copy_from_iter_full() fails (bsc#1245973). * CVE-2025-38201: netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX (bsc#1245977). * CVE-2025-38205: drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1 (bsc#1246005). * CVE-2025-38208: smb: client: add NULL check in automount_fullpath (bsc#1245815). * CVE-2025-38216: iommu/vt-d: Restore context entry setup order for aliased devices (bsc#1245963). * CVE-2025-38220: ext4: only dirty folios when data journaling regular files (bsc#1245966). * CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data (bsc#1245976). * CVE-2025-38242: mm: userfaultfd: fix race of userfaultfd_move and swap cache (bsc#1246176). * CVE-2025-38244: smb: client: fix potential deadlock when reconnecting channels (bsc#1246183). * CVE-2025-38245: atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister() (bsc#1246193). * CVE-2025-38251: atm: clip: prevent NULL deref in clip_push() (bsc#1246181). * CVE-2025-38256: io_uring/rsrc: fix folio unpinning (bsc#1246188). * CVE-2025-38258: mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter->memcg_path on write (bsc#1246185). * CVE-2025-38263: bcache: fix NULL pointer in cache_set_flush() (bsc#1246248). * CVE-2025-38267: ring-buffer: Do not trigger WARN_ON() due to a commit_overrun (bsc#1246245). * CVE-2025-38270: net: drv: netdevsim: do not napi_complete() from netpoll (bsc#1246252). * CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268). * CVE-2025-38301: nvmem: zynqmp_nvmem: unbreak driver after cleanup (bsc#1246351). * CVE-2025-38306: fs/fhandle.c: fix a race in call of has_locked_children() (bsc#1246366). * CVE-2025-38311: iavf: get rid of the crit lock (bsc#1246376). * CVE-2025-38318: perf: arm-ni: Fix missing platform_set_drvdata() (bsc#1246444). * CVE-2025-38322: perf/x86/intel: Fix crash in icl_update_topdown_event() (bsc#1246447). * CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473). * CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata() (bsc#1246253). * CVE-2025-38341: eth: fbnic: avoid double free when failing to DMA-map FW msg (bsc#1246260). * CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding the ep mutex (bsc#1246777). * CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781). * CVE-2025-38351: KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush (bsc#1246782). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38360: drm/amd/display: Add more checks for DSC / HUBP ONO guarantees (bsc#1247078). * CVE-2025-38365: btrfs: fix a race between renames and directory logging (bsc#1247023). * CVE-2025-38374: optee: ffa: fix sleep in atomic context (bsc#1247024). * CVE-2025-38382: btrfs: fix iteration of extrefs during log replay (bsc#1247031). * CVE-2025-38383: mm/vmalloc: fix data race in show_numa_info() (bsc#1247250). * CVE-2025-38392: idpf: convert control queue mutex to a spinlock (bsc#1247169). * CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass (bsc#1247156). * CVE-2025-38399: scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port() (bsc#1247097). * CVE-2025-38402: idpf: return 0 size for RSS key if not supported (bsc#1247262). * CVE-2025-38408: genirq/irq_sim: Initialize work context pointers properly (bsc#1247126). * CVE-2025-38418: remoteproc: core: Release rproc->clean_table after rproc_attach() fails (bsc#1247137). * CVE-2025-38419: remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach() (bsc#1247136). * CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header (bsc#1247252). * CVE-2025-38439: bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT (bsc#1247155). * CVE-2025-38440: net/mlx5e: Fix race between DIM disable and net_dim() (bsc#1247290). * CVE-2025-38441: netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto() (bsc#1247167). * CVE-2025-38444: raid10: cleanup memleak at raid10_make_request (bsc#1247162). * CVE-2025-38445: md/raid1: Fix stack memory use after return in raid1_reshape (bsc#1247229). * CVE-2025-38451: md/md-bitmap: fix GPF in bitmap_get_stats() (bsc#1247102). * CVE-2025-38453: kABI: io_uring: msg_ring ensure io_kiocb freeing is deferred (bsc#1247234). * CVE-2025-38456: ipmi:msghandler: Fix potential memory corruption in ipmi_create_user() (bsc#1247099). * CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not exist (bsc#1247098). * CVE-2025-38458: atm: clip: Fix NULL pointer dereference in vcc_sendmsg() (bsc#1247116). * CVE-2025-38459: atm: clip: Fix infinite recursive call of clip_push() (bsc#1247119). * CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143). * CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation (bsc#1247113). * CVE-2025-38464: tipc: Fix use-after-free in tipc_conn_close() (bsc#1247112). * CVE-2025-38470: net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime (bsc#1247288). * CVE-2025-38472: netfilter: nf_conntrack: fix crash due to removal of uninitialised entry (bsc#1247313). * CVE-2025-38475: smc: Fix various oops due to inet_sock type confusion (bsc#1247308). * CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239). * CVE-2025-38490: net: libwx: remove duplicate page_pool_put_full_page() (bsc#1247243). * CVE-2025-38491: mptcp: make fallback action and fallback decision atomic (bsc#1247280). * CVE-2025-38493: tracing/osnoise: Fix crash in timerlat_dump_stack() (bsc#1247283). * CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248088). * CVE-2025-38508: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (bsc#1248190). * CVE-2025-38514: rxrpc: Fix oops due to non-existence of prealloc backlog struct (bsc#1248202). * CVE-2025-38524: rxrpc: Fix recv-recv race of completed call (bsc#1248194). * CVE-2025-38526: ice: add NULL check in eswitch lag check (bsc#1248192). * CVE-2025-38527: smb: client: fix use-after-free in cifs_oplock_break (bsc#1248199). * CVE-2025-38533: net: libwx: fix the using of Rx buffer DMA (bsc#1248200). * CVE-2025-38539: tracing: Add down_write(trace_event_sem) when adding trace event (bsc#1248211). * CVE-2025-38544: rxrpc: Fix bug due to prealloc collision (bsc#1248225). * CVE-2025-38545: net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info (bsc#1248224). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38549: efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths (bsc#1248235). * CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped (bsc#1248299). * CVE-2025-38556: HID: core: Harden s32ton() against conversion to 0 bits (bsc#1248296). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38566: sunrpc: fix handling of server side tls alerts (bsc#1248374). * CVE-2025-38571: sunrpc: fix client side handling of tls alerts (bsc#1248401). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399). * CVE-2025-38574: pptp: ensure minimal skb length in pptp_xmit() (bsc#1248365). * CVE-2025-38584: padata: Fix pd UAF once and for all (bsc1248343). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1248368). * CVE-2025-38593: kABI workaround for bluetooth discovery_state change (bsc#1248357). * CVE-2025-38597: drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port (bsc#1248378). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38614: eventpoll: Fix semi-unbounded recursion (bsc#1248392). * CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1248512). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38622: net: drop UFO packets in udp_rcv_segment() (bsc#1248619). * CVE-2025-38623: PCI: pnv_php: Fix surprise plug detection and recovery (bsc#1248610). * CVE-2025-38628: vdpa/mlx5: Fix release of uninitialized resources on error path (bsc#1248616). * CVE-2025-38639: netfilter: xt_nfacct: do not assume acct name is null- terminated (bsc#1248674). * CVE-2025-38640: bpf: Disable migration in nf_hook_run_bpf() (bsc#1248622). * CVE-2025-38643: wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac() (bsc#1248681). * CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748). * CVE-2025-38659: gfs2: No more self recovery (bsc#1248639). * CVE-2025-38660: [ceph] parse_longname(): strrchr() expects NUL-terminated string (bsc#1248634). * CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628). * CVE-2025-38676: iommu/amd: Avoid stack buffer overflow from kernel cmdline (bsc#1248775). * CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126). * CVE-2025-38684: net/sched: ets: use old 'nbands' while purging unused classes (bsc#1249156). * CVE-2025-38686: userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry (bsc#1249160). * CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182). * CVE-2025-38701: ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr (bsc#1249258). * CVE-2025-38709: loop: Avoid updating block size under exclusive owner (bsc#1249199). * CVE-2025-38710: gfs2: Validate i_depth for exhash directories (bsc#1249201). * CVE-2025-38730: io_uring/net: commit partial buffers on retry (bsc#1249172). * CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324). * CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320). * CVE-2025-39677: net/sched: Fix backlog accounting in qdisc_dequeue_internal (bsc#1249300). * CVE-2025-39681: x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper (bsc#1249303). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1249284). * CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286). * CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374). * CVE-2025-39698: io_uring/futex: ensure io_futex_wait() cleans up properly on failure (bsc#1249322). * CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315). * CVE-2025-39723: kABI: netfs: handle new netfs_io_stream flag (bsc#1249314). * CVE-2025-39744: rcu: Fix rcu_read_unlock() deadloop due to IRQ work (bsc#1249494). * CVE-2025-39749: rcu: Protect ->defer_qs_iw_pending from data race (bsc#1249533). * CVE-2025-39754: mm/smaps: fix race between smaps_hugetlb_range and migration (bsc#1249524). * CVE-2025-39766: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit (bsc#1249510). * CVE-2025-39770: net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM (bsc#1249508). * CVE-2025-39773: net: bridge: fix soft lockup in br_multicast_query_expired() (bsc#1249504). * CVE-2025-39775: mm/mremap: fix WARN with uffd that has remap events disabled (bsc#1249500). * CVE-2025-39782: jbd2: prevent softlockup in jbd2_log_do_checkpoint() (bsc#1249526). * CVE-2025-39791: dm: dm-crypt: Do not partially accept write BIOs with zoned targets (bsc#1249550). * CVE-2025-39792: dm: Always split write BIOs to zoned device limits (bsc#1249618). * CVE-2025-39797: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI (bsc#1249608). * CVE-2025-39813: ftrace: Also allocate and copy hash for reading of filter files (bsc#1250032). * CVE-2025-39816: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths (bsc#1249906). * CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002). * CVE-2025-39825: smb: client: fix race with concurrent opens in rename(2) (bsc#1250179). * CVE-2025-39828: kABI workaround for struct atmdev_ops extension (bsc#1250205). * CVE-2025-39830: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path (bsc#1249974). * CVE-2025-39838: cifs: prevent NULL pointer dereference in UTF16 conversion (bsc#1250365). * CVE-2025-39842: ocfs2: prevent release journal inode after journal shutdown (bsc#1250267). * CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292). * CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276). * CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296). * CVE-2025-39852: net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6 (bsc#1250258). * CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275). * CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297). * CVE-2025-39857: net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync() (bsc#1250251). * CVE-2025-39865: tee: fix NULL pointer dereference in tee_shm_put (bsc#1250294). * CVE-2025-39875: igb: Fix NULL pointer dereference in ethtool loopback test (bsc#1250398). * CVE-2025-39885: ocfs2: fix recursive semaphore deadlock in fiemap call (bsc#1250407). * CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742). * CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758). * CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702). * CVE-2025-39922: ixgbe: fix incorrect map used in eee linkmode (bsc#1250722). * CVE-2025-39926: genetlink: fix genl_bind() invoking bind() after -EPERM (bsc#1250737). * CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230). * CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114). * CVE-2025-40300: x86/vmscape: Warn when STIBP is disabled with SMT (bsc#1247483). * CVE-2026-38264: nvme-tcp: sanitize request list handling (bsc#1246387). The following non-security bugs were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI/processor_idle: Add FFH state handling (jsc#PED-13815). * ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815). * ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes). * ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered (stable-fixes). * ACPI: EC: Add device to acpi_ec_no_wakeup[] qurik list (stable-fixes). * ACPI: LPSS: Remove AudioDSP related ID (git-fixes). * ACPI: NFIT: Fix incorrect ndr_desc being reportedin dev_err message (git- fixes). * ACPI: RISC-V: Fix FFH_CPPC_CSR error handling (git-fixes). * ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled (stable-fixes). * ACPI: Suppress misleading SPCR console message when SPCR table is absent (stable-fixes). * ACPI: TAD: Add missing sysfs_remove_group() for ACPI_TAD_RT (git-fixes). * ACPI: battery: Add synchronization between interface updates (git-fixes). * ACPI: debug: fix signedness issues in read/write helpers (git-fixes). * ACPI: pfr_update: Fix the driver update version check (git-fixes). * ACPI: processor: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * ACPI: processor: fix acpi_object initialization (stable-fixes). * ACPI: processor: idle: Fix memory leak when register cpuidle device failed (git-fixes). * ACPI: processor: perflib: Fix initial _PPC limit application (git-fixes). * ACPI: processor: perflib: Move problematic pr->performance check (git- fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * ACPICA: Fix largest possible resource descriptor index (git-fixes). * ALSA: firewire-motu: drop EPOLLOUT from poll return values as write is not supported (stable-fixes). * ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (stable-fixes). * ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out() (git-fixes). * ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX (stable-fixes). * ALSA: hda/hdmi: Add pin fix for another HP EliteDesk 800 G4 model (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable- fixes). * ALSA: hda/realtek - Add mute LED support for HP Victus 15-fa0xxx (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26) (stable- fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r0xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx (stable-fixes). * ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx (stable-fixes). * ALSA: hda/realtek: Add ALC295 Dell TAS2781 I2C fixup (git-fixes). * ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks (stable-fixes). * ALSA: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes). * ALSA: hda/realtek: Add support for ASUS NUC using CS35L41 HDA (stable- fixes). * ALSA: hda/realtek: Add support for HP EliteBook x360 830 G6 and EliteBook 830 G6 (stable-fixes). * ALSA: hda/realtek: Audio disappears on HP 15-fc000 after warm boot again (git-fixes). * ALSA: hda/realtek: Fix headset mic for TongFang X6[AF]R5xxY (stable-fixes). * ALSA: hda/realtek: Fix headset mic on ASUS Zenbook 14 (git-fixes). * ALSA: hda/realtek: Fix headset mic on HONOR BRB-X (stable-fixes). * ALSA: hda/realtek: Fix mute LED mask on HP OMEN 16 laptop (git-fixes). * ALSA: hda/realtek: Fix mute led for HP Laptop 15-dw4xx (stable-fixes). * ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table (stable- fixes). * ALSA: hda: Disable jack polling at shutdown (stable-fixes). * ALSA: hda: Handle the jack polling always via a work (stable-fixes). * ALSA: hda: intel-dsp-config: Prevent SEGFAULT if ACPI_HANDLE() is NULL (git- fixes). * ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4 (stable- fixes). * ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git- fixes). * ALSA: lx_core: use int type to store negative error codes (git-fixes). * ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT (git-fixes). * ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop (stable- fixes). * ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx() (git-fixes). * ALSA: timer: fix ida_free call while not allocated (git-fixes). * ALSA: usb-audio: Add DSD support for Comtrue USB Audio device (stable- fixes). * ALSA: usb-audio: Add mixer quirk for Sony DualSense PS5 (stable-fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on more devices (stable- fixes). * ALSA: usb-audio: Add mute TLV for playback volumes on some devices (stable- fixes). * ALSA: usb-audio: Allow Focusrite devices to use low samplerates (git-fixes). * ALSA: usb-audio: Avoid multiple assignments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros (stable- fixes). * ALSA: usb-audio: Convert comma to semicolon (git-fixes). * ALSA: usb-audio: Drop unnecessary parentheses in mixer_quirks (stable- fixes). * ALSA: usb-audio: Fix block comments in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix build with CONFIG_INPUT=n (git-fixes). * ALSA: usb-audio: Fix code alignment in mixer_quirks (stable-fixes). * ALSA: usb-audio: Fix size validation in convert_chmap_v3() (git-fixes). * ALSA: usb-audio: Remove unneeded wmb() in mixer_quirks (stable-fixes). * ALSA: usb-audio: Simplify NULL comparison in mixer_quirks (stable-fixes). * ALSA: usb-audio: Use correct sub-type for UAC3 feature unit validation (git- fixes). * ALSA: usb-audio: Validate UAC3 cluster segment descriptors (git-fixes). * ALSA: usb-audio: Validate UAC3 power domain descriptors, too (git-fixes). * ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free (git-fixes). * ALSA: usb-audio: move mixer_quirks' min_mute into common quirk (stable- fixes). * ASoC: Intel: avs: Fix uninitialized pointer error in probe() (stable-fixes). * ASoC: Intel: bytcht_es8316: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (git-fixes). * ASoC: Intel: catpt: Expose correct bit depth to userspace (git-fixes). * ASoC: Intel: fix SND_SOC_SOF dependencies (stable-fixes). * ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback (git-fixes). * ASoC: SOF: Intel: Read the LLP via the associated Link DMA channel (git- fixes). * ASoC: SOF: Intel: hda-pcm: Place the constraint on period time instead of buffer time (git-fixes). * ASoC: SOF: Intel: hda-stream: Fix incorrect variable used in error message (git-fixes). * ASoC: SOF: amd: acp-loader: Use GFP_KERNEL for DMA allocations in resume context (git-fixes). * ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes). * ASoC: SOF: ipc4-topology: Account for different ChainDMA host buffer size (git-fixes). * ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git- fixes). * ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode (stable-fixes). * ASoC: amd: acp: Adjust pdm gain value (stable-fixes). * ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx (stable-fixes). * ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx (stable-fixes). * ASoC: amd: yc: add DMI quirk for ASUS M6501RM (stable-fixes). * ASoC: codecs: rt5640: Retry DEVICE_ID verification (stable-fixes). * ASoC: codecs: tx-macro: correct tx_macro_component_drv name (stable-fixes). * ASoC: codecs: wcd9375: Fix double free of regulator supplies (git-fixes). * ASoC: codecs: wcd937x: Drop unused buck_supply (git-fixes). * ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (stable- fixes). * ASoC: fsl_sai: replace regmap_write with regmap_update_bits (git-fixes). * ASoC: fsl_xcvr: get channel status data when PHY is not exists (git-fixes). * ASoC: hdac_hdmi: Rate limit logging on connection and disconnection (stable- fixes). * ASoC: imx-hdmi: remove cpu_pdev related code (git-fixes). * ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv (git-fixes). * ASoC: mediatek: use reserved memory or enable buffer pre-allocation (git- fixes). * ASoC: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes). * ASoC: qcom: audioreach: Fix lpaif_type configuration for the I2S interface (git-fixes). * ASoC: qcom: audioreach: fix potential null pointer dereference (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed (git-fixes). * ASoC: qcom: q6apm-lpass-dais: Fix missing set_fmt DAI op for I2S (git- fixes). * ASoC: qcom: use drvdata instead of component to keep id (stable-fixes). * ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes). * ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git- fixes). * ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was successed (stable-fixes). * ASoC: tas2781: Fix the wrong step for TLV on tas2781 (git-fixes). * ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data() (git-fixes). * ASoC: wm8940: Correct PLL rate rounding (git-fixes). * ASoC: wm8940: Correct typo in control name (git-fixes). * ASoC: wm8974: Correct PLL rate rounding (git-fixes). * Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (git-fixes). * Bluetooth: ISO: Fix possible UAF on iso_conn_free (git-fixes). * Bluetooth: ISO: do not leak skb in ISO_CONT RX (git-fixes). * Bluetooth: ISO: free rx_skb if not consumed (git-fixes). * Bluetooth: MGMT: Fix not exposing debug UUID on MGMT_OP_READ_EXP_FEATURES_INFO (git-fixes). * Bluetooth: MGMT: Fix possible UAFs (git-fixes). * Bluetooth: btmtk: Fix wait_on_bit_timeout interruption during shutdown (git- fixes). * Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable- fixes). * Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano (stable-fixes). * Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925 (stable-fixes). * Bluetooth: hci_conn: do return error from hci_enhanced_setup_sync() (git- fixes). * Bluetooth: hci_core: Fix using {cis,bis}_capable for current settings (git- fixes). * Bluetooth: hci_event: Detect if HCI_EV_NUM_COMP_PKTS is unbalanced (git- fixes). * Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync (git-fixes). * Bluetooth: hci_event: Mark connection as closed during suspend disconnect (git-fixes). * Bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes). * Bluetooth: hci_event: Treat UNKNOWN_CONN_ID on disconnect as success (git- fixes). * Bluetooth: hci_event: fix MTU for BN == 0 in CIS Established (git-fixes). * Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie() (stable- fixes). * Bluetooth: hci_sync: Avoid adding default advertising on startup (stable- fixes). * Bluetooth: hci_sync: Fix hci_resume_advertising_sync (git-fixes). * Bluetooth: hci_sync: Fix scan state after PA Sync has been established (git- fixes). * Bluetooth: hci_sync: Fix using random address for BIG/PA advertisements (git-fixes). * Bluetooth: hci_sync: Prevent unintended PA sync when SID is 0xFF (git- fixes). * Bluetooth: hci_sync: fix set_local_name race condition (git-fixes). * Bluetooth: vhci: Prevent use-after-free by removing debugfs files early (git-fixes). * CONFIG & no reference -> OK temporarily, must be resolved eventually * Disable CET before shutdown by tboot (bsc#1247950). * Docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes). * Documentation/x86: Document new attack vector controls (git-fixes). * Documentation: ACPI: Fix parent device references (git-fixes). * Documentation: KVM: Fix unexpected unindent warning (git-fixes). * Documentation: KVM: Fix unexpected unindent warnings (git-fixes). * Documentation: usb: gadget: Wrap remaining usage snippets in literal code block (git-fixes). * Drop ath12k patch that was reverted in the upstream (git-fixes) * EDAC/{i10nm,skx,skx_common}: Support UV systems (bsc#1234693). * Enable CONFIG_CMA_SYSFS This is a generally useful feature for anyone using CMA or investigating CMA issues, with a small and simple code base and no runtime overhead. * Enable MT7925 WiFi drivers for openSUSE Leap 16.0 (bsc#1247325) * Enable SMC_LO (a.k.a SMC-D) (jsc#PED-13256). * Fix bogus i915 patch backport (bsc#1238972) It's been already cherry-picked in 6.12 kernel itself. * Fix dma_unmap_sg() nents value (git-fixes) * HID: amd_sfh: Add sync across amd sfh work functions (git-fixes). * HID: apple: avoid setting up battery timer for devices without battery (git- fixes). * HID: apple: validate feature-report field count to prevent NULL pointer dereference (git-fixes). * HID: asus: add support for missing PX series fn keys (stable-fixes). * HID: asus: fix UAF via HID_CLAIMED_INPUT validation (git-fixes). * HID: core: do not bypass hid_hw_raw_request (stable-fixes). * HID: core: ensure the allocated report buffer can contain the reserved report ID (stable-fixes). * HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version() (stable-fixes). * HID: hidraw: tighten ioctl command parsing (git-fixes). * HID: input: rename hidinput_set_battery_charge_status() (stable-fixes). * HID: input: report battery status changes immediately (git-fixes). * HID: intel-ish-ipc: Remove redundant ready check after timeout function (git-fixes). * HID: logitech: Add ids for G PRO 2 LIGHTSPEED (stable-fixes). * HID: magicmouse: avoid setting up battery timer when not needed (git-fixes). * HID: multitouch: fix slab out-of-bounds access in mt_report_fixup() (git- fixes). * HID: quirks: add support for Legion Go dual dinput modes (stable-fixes). * HID: wacom: Add a new Art Pen 2 (stable-fixes). * IB/mlx5: Fix obj_type mismatch for SRQ event subscriptions (git-fixes) * IB/sa: Fix sa_local_svc_timeout_ms read race (git-fixes) * Input: i8042 - add TUXEDO InfinityBook Pro Gen10 AMD to i8042 quirk table (stable-fixes). * Input: iqs7222 - avoid enabling unused interrupts (stable-fixes). * Input: psxpad-spi - add a check for the return value of spi_setup() (git- fixes). * Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes). * KEYS: X.509: Fix Basic Constraints CA flag parsing (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * KVM: Allow CPU to reschedule while setting per-page memory attributes (git- fixes). * KVM: Bail from the dirty ring reset flow if a signal is pending (git-fixes). * KVM: Bound the number of dirty ring entries in a single reset at INT_MAX (git-fixes). * KVM: Conditionally reschedule when resetting the dirty ring (git-fixes). * KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199). * KVM: SVM: Disable interception of SPEC_CTRL iff the MSR exists for the guest (git-fixes). * KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight (git-fixes). * KVM: TDX: Add new TDVMCALL status code for unsupported subfuncs (jsc#PED-13302). * KVM: TDX: Do not report base TDVMCALLs (git-fixes). * KVM: TDX: Exit to userspace for GetTdVmCallInfo (jsc#PED-13302). * KVM: TDX: Exit to userspace for SetupEventNotifyInterrupt (jsc#PED-13302). * KVM: TDX: Handle TDG.VP.VMCALL<GetQuote> (jsc#PED-13302). * KVM: TDX: Report supported optional TDVMCALLs in TDX capabilities (jsc#PED-13302). * KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL (git-fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Ensure unused kvm_tdx_capabilities fields are zeroed out (jsc#PED-13302). * KVM: arm64: Adjust range correctly during host stage-2 faults (git-fixes). * KVM: arm64: Do not free hyp pages with pKVM on GICv2 (git-fixes). * KVM: arm64: Fix error path in init_hyp_mode() (git-fixes). * KVM: arm64: Mark freed S2 MMUs as invalid (git-fixes). * KVM: arm64: vgic: fix incorrect spinlock API usage (git-fixes). * KVM: s390: Fix access to unavailable adapter indicator pages during postcopy (git-fixes bsc#1250124). * KVM: s390: Fix incorrect usage of mmu_notifier_register() (git-fixes bsc#1250123). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86/xen: Allow 'out of range' event channel ports in IRQ routing table (git-fixes). * KVM: x86: Avoid calling kvm_is_mmio_pfn() when kvm_x86_ops.get_mt_mask is NULL (git-fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Drop pending_smi vs. INIT_RECEIVED check when setting MP_STATE (git-fixes). * KVM: x86: Reject KVM_SET_TSC_KHZ vCPU ioctl for TSC protected guest (git- fixes). * KVM: x86: avoid underflow when scaling TSC frequency (git-fixes). * Limit patch filenames to 100 characters (bsc#1249604). * Move upstreamed SPI patch into sorted section * NFS: Fix a race when updating an existing write (git-fixes). * NFS: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes). * NFS: Fix the setting of capabilities when automounting a new filesystem (git-fixes). * NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git- fixes). * NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes). * NFS: nfs_invalidate_folio() must observe the offset and size arguments (git- fixes). * NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes). * NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes). * NFSD: detect mismatch of file handle and delegation stateid in OPEN op (git- fixes). * NFSv4.1: fix backchannel max_resp_sz verification check (git-fixes). * NFSv4.2: another fix for listxattr (git-fixes). * NFSv4/flexfiles: Fix layout merge mirror check (git-fixes). * NFSv4: Clear NFS_CAP_OPEN_XOR and NFS_CAP_DELEGTIME if not supported (git- fixes). * NFSv4: Clear the NFS_CAP_FS_LOCATIONS flag if it is not set (git-fixes). * NFSv4: Clear the NFS_CAP_XATTR flag if not supported by the server (git- fixes). * NFSv4: Do not clear capabilities that won't be reset (git-fixes). * Octeontx2-af: Skip overlap check for SPI field (git-fixes). * PCI/ACPI: Fix pci_acpi_preserve_config() memory leak (git-fixes). * PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * PCI/AER: Fix missing uevent on recovery when a reset is requested (git- fixes). * PCI/ERR: Fix uevent on failure to recover (git-fixes). * PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (git- fixes). * PCI/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations (bsc#1245457). * PCI/portdrv: Use is_pciehp instead of is_hotplug_bridge (git-fixes). * PCI/pwrctrl: Fix device leak at registration (git-fixes). * PCI/sysfs: Ensure devices are powered for config reads (git-fixes). * PCI: Extend isolated function probing to LoongArch (git-fixes). * PCI: Rename PCIE_RESET_CONFIG_DEVICE_WAIT_MS to PCIE_RESET_CONFIG_WAIT_MS (git-fixes). * PCI: Support Immediate Readiness on devices without PM capabilities (git- fixes). * PCI: dw-rockchip: Replace PERST# sleep time with proper macro (git-fixes). * PCI: dw-rockchip: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git- fixes). * PCI: dwc: Ensure that dw_pcie_wait_for_link() waits 100 ms after link up (stable-fixes). * PCI: endpoint: Fix configfs group list head handling (git-fixes). * PCI: endpoint: Fix configfs group removal on driver teardown (git-fixes). * PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute (git-fixes). * PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar() fails (git-fixes). * PCI: hv: Allow dynamic MSI-X vector allocation (bsc#1245457). * PCI: imx6: Add IMX8MM_EP and IMX8MP_EP fixed 256-byte BAR 4 in epc_features (git-fixes). * PCI: imx6: Add IMX8MQ_EP third 64-bit BAR in epc_features (git-fixes). * PCI: imx6: Add i.MX8Q PCIe Endpoint (EP) support (git-fixes). * PCI: imx6: Delay link start until configfs 'start' written (git-fixes). * PCI: imx6: Remove apps_reset toggling from imx_pcie_{assert/deassert}_core_reset (git-fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: j721e: Fix programming sequence of "strap" settings (git-fixes). * PCI: keystone: Use devm_request_irq() to free "ks-pcie-error-irq" on exit (git-fixes). * PCI: pnv_php: Clean up allocated IRQs on unplug (bsc#1215199). * PCI: pnv_php: Work around switches with broken presence detection (bsc#1215199). * PCI: qcom: Wait PCIE_RESET_CONFIG_WAIT_MS after link-up IRQ (git-fixes). * PCI: rcar-gen4: Add missing 1ms delay after PWR reset assertion (git-fixes). * PCI: rcar-gen4: Assure reset occurs before DBI access (git-fixes). * PCI: rcar-gen4: Fix PHY initialization (git-fixes). * PCI: rcar-gen4: Fix inverted break condition in PHY initialization (git- fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: rcar-host: Drop PMSR spinlock (git-fixes). * PCI: rockchip-host: Fix "Unexpected Completion" log message (git-fixes). * PCI: rockchip: Set Target Link Speed to 5.0 GT/s before retraining (git- fixes). * PCI: rockchip: Use standard PCIe definitions (git-fixes). * PCI: tegra194: Fix broken tegra_pcie_ep_raise_msi_irq() (git-fixes). * PCI: tegra194: Fix duplicate PLL disable in pex_ep_event_pex_rst_assert() (git-fixes). * PCI: tegra194: Handle errors in BPMP response (git-fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * PCI: tegra: Convert struct tegra_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra: Fix devm_kcalloc() argument order for port->phys allocation (git-fixes). * PCI: xilinx-nwl: Fix ECAM programming (git-fixes). * PM / devfreq: Check governor before using governor->name (git-fixes). * PM / devfreq: Fix a index typo in trans_stat (git-fixes). * PM / devfreq: governor: Replace sscanf() with kstrtoul() in set_freq_store() (stable-fixes). * PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() (git-fixes). * PM / devfreq: rockchip-dfi: double count on RK3588 (git-fixes). * PM: EM: use kfree_rcu() to simplify the code (stable-fixes). * PM: cpufreq: powernv/tracing: Move powernv_throttle trace event (git-fixes). * PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112). * PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112). * PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112). * PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112). * PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit() (stable- fixes). * PM: runtime: Take active children into account in pm_runtime_get_if_in_use() (git-fixes). * PM: sleep: console: Fix the black screen issue (stable-fixes). * PM: sleep: core: Clear power.must_resume in noirq suspend error path (git- fixes). * RAS/AMD/ATL: Include row bit in row retirement (bsc#1242034). * RAS/AMD/FMPM: Get masked address (bsc#1242034). * RDMA/bnxt_re: Fix a possible memory leak in the driver (git-fixes) * RDMA/bnxt_re: Fix size of uverbs_copy_to() in BNXT_RE_METHOD_GET_TOGGLE_MEM (git-fixes) * RDMA/bnxt_re: Fix to do SRQ armena by default (git-fixes) * RDMA/bnxt_re: Fix to initialize the PBL array (git-fixes) * RDMA/bnxt_re: Fix to remove workload check in SRQ limit path (git-fixes) * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes) * RDMA/core: Rate limit GID cache warning messages (git-fixes) * RDMA/core: Resolve MAC of next-hop device without ARP support (git-fixes) * RDMA/core: reduce stack using in nldev_stat_get_doit() (git-fixes) * RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes) * RDMA/erdma: Fix ignored return value of init_kernel_qp (git-fixes) * RDMA/hns: Drop GFP_NOWARN (git-fixes) * RDMA/hns: Fix -Wframe-larger-than issue (git-fixes) * RDMA/hns: Fix HW configurations not cleared in error flow (git-fixes) * RDMA/hns: Fix accessing uninitialized resources (git-fixes) * RDMA/hns: Fix dip entries leak on devices newer than hip09 (git-fixes) * RDMA/hns: Fix double destruction of rsv_qp (git-fixes) * RDMA/hns: Fix querying wrong SCC context for DIP algorithm (git-fixes) * RDMA/hns: Get message length of ack_req from FW (git-fixes) * RDMA/mana_ib: Add device statistics support (bsc#1246651). * RDMA/mana_ib: Drain send wrs of GSI QP (bsc#1251135). * RDMA/mana_ib: Extend modify QP (bsc#1251135). * RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes). * RDMA/mana_ib: add additional port counters (git-fixes). * RDMA/mana_ib: add support of multiple ports (git-fixes). * RDMA/mlx5: Better estimate max_qp_wr to reflect WQE count (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes) * RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA/mlx5: Fix UMR modifying of mkey page size (git-fixes) * RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes) * RDMA/mlx5: Fix vport loopback forcing for MPV device (git-fixes) * RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes) * RDMA/rxe: Fix race in do_task() when draining (git-fixes) * RDMA/rxe: Flush delayed SKBs while releasing RXE resources (git-fixes) * RDMA/siw: Always report immediate post SQ errors (git-fixes) * RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes) * RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git- fixes) * RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes) * RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (git-fixes) * README.BRANCH: mfranc at suse.cz leaving SUSE * RISC-V: Add defines for the SBI nested acceleration extension (jsc#PED-348). * Reapply "wifi: mac80211: Update skb's control block key in ieee80211_tx_dequeue()" (git-fixes). * Reapply "x86/smp: Eliminate mwait_play_dead_cpuid_hint()" (jsc#PED-13815). * Revert "SUNRPC: Do not allow waiting for exiting tasks" (git-fixes). * Revert "drm/amdgpu: fix incorrect vm flags to map bo" (stable-fixes). * Revert "drm/nouveau: check ioctl command codes better" (git-fixes). * Revert "gpio: mlxbf3: only get IRQ for device instance 0" (git-fixes). * Revert "leds: trigger: netdev: Configure LED blink interval for HW offload" (git-fixes). * Revert "mac80211: Dynamically set CoDel parameters per station" (stable- fixes). * Revert "usb: xhci: Avoid Stop Endpoint retry loop if the endpoint seems Running" (git-fixes). * Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()" (stable-fixes). * Revert "wifi: mt76: mt7925: Update mt7925_mcu_uni_[tx,rx]_ba for MLO" (git- fixes). * SUNRPC: call xs_sock_process_cmsg for all cmsg (git-fixes). * Squashfs: add additional inode sanity checking (git-fixes). * Squashfs: fix uninit-value in squashfs_get_parent (git-fixes). * Squashfs: reject negative file sizes in squashfs_read_inode() (git-fixes). * USB: gadget: dummy-hcd: Fix locking bug in RT-enabled kernels (git-fixes). * USB: gadget: f_hid: Fix memory leak in hidg_bind error path (git-fixes). * USB: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes). * USB: serial: option: add Foxconn T99W640 (stable-fixes). * USB: serial: option: add Foxconn T99W709 (stable-fixes). * USB: serial: option: add SIMCom 8230C compositions (stable-fixes). * USB: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable- fixes). * USB: serial: option: add Telit Cinterion FN990A w/audio compositions (stable-fixes). * USB: serial: option: add Telit Cinterion LE910C4-WWX new compositions (stable-fixes). * USB: storage: Add unusual-devs entry for Novatek NTK96550-based camera (stable-fixes). * USB: storage: Ignore driver CD mode for Realtek multi-mode Wi-Fi dongles (stable-fixes). * Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps. * Update config files: revive pwc driver for Leap (bsc#1249060) * accel/habanalabs/gaudi2: Use kvfree() for memory allocated with kvcalloc() (git-fixes). * accel/ivpu: Correct DCT interrupt handling (git-fixes). * accel/ivpu: Fix reset_engine debugfs file logic (stable-fixes). * accel/ivpu: Fix warning in ivpu_gem_bo_free() (git-fixes). * accel/ivpu: Prevent recovery work from being queued during device removal (git-fixes). * amdgpu/amdgpu_discovery: increase timeout limit for IFWI init (stable- fixes). * aoe: defer rexmit timer downdev work to workqueue (git-fixes). * arch/powerpc: Remove .interp section in vmlinux (bsc#1215199). * arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack() (git-fixes) * arm64/mm: Check PUD_TYPE_TABLE in pud_bad() (git-fixes) * arm64/mm: Check pmd_table() in pmd_trans_huge() (git-fixes) * arm64/mm: Close theoretical race where stale TLB entry remains valid (git- fixes) * arm64/mm: Drop wrong writes into TCR2_EL1 (git-fixes) * arm64/mm: Ensure adequate HUGE_MAX_HSTATE (git-fixes) * arm64/sysreg: Add register fields for HDFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HDFGWTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGITR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGRTR2_EL2 (git-fixes) * arm64/sysreg: Add register fields for HFGWTR2_EL2 (git-fixes) * arm64/sysreg: Update register fields for ID_AA64MMFR0_EL1 (git-fixes) * arm64: Filter out SME hwcaps when FEAT_SME isn't implemented (git-fixes) * arm64: Handle KCOV __init vs inline mismatches (git-fixes) * arm64: Mark kernel as tainted on SAE and SError panic (git-fixes) * arm64: Restrict pagetable teardown to avoid false warning (git-fixes) * arm64: config: Make tpm_tis_spi module build-in (bsc#1246896) * arm64: cputype: Add QCOM_CPU_PART_KRYO_3XX_GOLD (git-fixes) * arm64: dts: add big-endian property back into watchdog node (git-fixes) * arm64: dts: apple: Add ethernet0 alias for J375 template (git-fixes) * arm64: dts: apple: t8103-j457: Fix PCIe ethernet iommu-map (git-fixes) * arm64: dts: apple: t8103: Fix PCIe BCM4377 nodename (git-fixes) * arm64: dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes (git- fixes) * arm64: dts: exynos: gs101: ufs: add dma-coherent property (git-fixes) * arm64: dts: freescale: imx8mm-verdin: Keep LDO5 always on (git-fixes) * arm64: dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV (git-fixes) * arm64: dts: imx8mm-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mm-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mm-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mm-venice-gw700x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7901: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7903: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mm-venice-gw7904: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mn-beacon: Fix HS400 USDHC clock speed (git-fixes) * arm64: dts: imx8mn-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mn-beacon: Set SAI5 MCLK direction to output for HDMI (git- fixes) * arm64: dts: imx8mn-venice-gw7902: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-beacon: Fix RTC capacitive load (git-fixes) * arm64: dts: imx8mp-tqma8mpql: fix LDO5 power off (git-fixes) * arm64: dts: imx8mp-venice-gw702x: Increase HS400 USDHC clock speed (git- fixes) * arm64: dts: imx8mp-venice-gw71xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw72xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw73xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp-venice-gw74xx: fix TPM SPI frequency (git-fixes) * arm64: dts: imx8mp: Correct thermal sensor index (git-fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on DH electronics (git- fixes) * arm64: dts: imx8mp: Fix missing microSD slot vqmmc on Data Modul (git-fixes) * arm64: dts: imx93-kontron: Fix GPIO for panel regulator (git-fixes) * arm64: dts: imx93-kontron: Fix USB port assignment (git-fixes) * arm64: dts: imx95: Correct the DMA interrupter number of pcie0_ep (git- fixes) * arm64: dts: imx95: Correct the lpuart7 and lpuart8 srcid (git-fixes) * arm64: dts: marvell: cn9132-clearfog: disable eMMC high-speed modes (git- fixes) * arm64: dts: marvell: cn9132-clearfog: fix multi-lane pci x2 and x4 (git- fixes) * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi 4B (git- fixes). * arm64: dts: rockchip: Add cd-gpios for sdcard detect on Cool Pi CM5 (git- fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on (git-fixes) * arm64: dts: rockchip: Add vcc-supply to SPI flash on rk3566-rock3c (git- fixes) * arm64: dts: rockchip: Fix Bluetooth interrupts flag on Neardi LBA3368 (git- fixes) * arm64: dts: rockchip: Fix the headphone detection on the orangepi 5 (git- fixes) * arm64: dts: rockchip: Move SHMEM memory to reserved memory on rk3588 (git- fixes) * arm64: dts: rockchip: Update eMMC for NanoPi R5 series (git-fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on (git- fixes) * arm64: dts: rockchip: disable unrouted USB controllers and PHY on RK3399 Puma (git-fixes) * arm64: dts: rockchip: fix endpoint dtc warning for PX30 ISP (git-fixes) * arm64: dts: rockchip: fix internal USB hub instability on RK3399 Puma (git- fixes) * arm64: dts: rockchip: use cs-gpios for spi1 on ringneck (git-fixes) * arm64: dts: st: fix timer used for ticks (git-fixes) * arm64: ftrace: fix unreachable PLT for ftrace_caller in init_module (git- fixes) * arm64: map [_text, _stext) virtual address range (git-fixes) * arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes) * arm64: poe: Handle spurious Overlay faults (git-fixes) * arm64: rust: clean Rust 1.85.0 warning using softfloat target (git-fixes) * arm64: stacktrace: Check kretprobe_find_ret_addr() return value (git-fixes) * arm64: tegra: Add uartd serial alias for Jetson TX1 module (git-fixes) * arm64: tegra: Drop remaining serial clock-names and reset-names (git-fixes) * arm64: tegra: Resize aperture for the IGX PCIe C5 slot (git-fixes) * arm64: tegra: p2597: Fix gpio for vdd-1v8-dis regulator (git-fixes) * arm64: zynqmp: add clock-output-names property in clock nodes (git-fixes) * ata: ahci: Disable DIPM if host lacks support (stable-fixes). * ata: ahci: Disallow LPM policy control if not supported (stable-fixes). * ata: libata-sata: Add link_power_management_supported sysfs attribute (git- fixes). * ata: libata-sata: Disallow changing LPM state if not supported (stable- fixes). * ata: libata-scsi: Fix CDL control (git-fixes). * audit,module: restore audit logging in load failure case (git-fixes). * ax25: properly unshare skbs in ax25_kiss_rcv() (git-fixes). * batman-adv: fix OOB read/write in network-coding decode (git-fixes). * benet: fix BUG when creating VFs (git-fixes). * block: Introduce bio_needs_zone_write_plugging() (git-fixes). * block: Make REQ_OP_ZONE_FINISH a write operation (git-fixes, bsc#1249552). * block: ensure discard_granularity is zero when discard is not supported (git-fixes). * block: fix kobject leak in blk_unregister_queue (git-fixes). * block: mtip32xx: Fix usage of dma_map_sg() (git-fixes). * block: sanitize chunk_sectors for atomic write limits (git-fixes). * bnxt_en: Add a helper function to configure MRU and RSS (git-fixes). * bnxt_en: Adjust TX rings if reservation is less than requested (git-fixes). * bnxt_en: Fix DCB ETS validation (git-fixes). * bnxt_en: Fix memory corruption when FW resources change during ifdown (git- fixes). * bnxt_en: Fix stats context reservation logic (git-fixes). * bnxt_en: Flush FW trace before copying to the coredump (git-fixes). * bnxt_en: Update MRU and RSS table of RSS contexts on queue reset (git- fixes). * bnxt_en: eliminate the compile warning in bnxt_request_irq due to CONFIG_RFS_ACCEL (git-fixes). * bpf, arm64: Call bpf_jit_binary_pack_finalize() in bpf_jit_free() (git- fixes) * bpf, arm64: Fix fp initialization for exception boundary (git-fixes) * bpf, docs: Fix broken link to renamed bpf_iter_task_vmas.c (git-fixes). * bpf, sockmap: Fix psock incorrectly pointing to sk (git-fixes). * bpf: Adjust free target to avoid global starvation of LRU map (git-fixes). * bpf: Allow XDP dev-bound programs to perform XDP_REDIRECT into maps (git- fixes). * bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes). * bpf: Check link_create.flags parameter for multi_kprobe (git-fixes). * bpf: Check link_create.flags parameter for multi_uprobe (git-fixes). * bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes). * bpf: Fix uninitialized values in BPF_{CORE,PROBE}_READ (git-fixes). * bpf: Forget ranges when refining tnum after JSET (git-fixes). * bpf: Make reg_not_null() true for CONST_PTR_TO_MAP (git-fixes). * bpf: Only fails the busy counter check in bpf_cgrp_storage_get if it creates storage (git-fixes). * bpf: Reject %p% format string in bprintf-like helpers (git-fixes). * bpf: Reject attaching fexit/fmod_ret to __noreturn functions (git-fixes). * bpf: Reject narrower access to pointer ctx fields (git-fixes). * bpf: Return prog btf_id without capable check (git-fixes). * bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes). * bpf: Use proper type to calculate bpf_raw_tp_null_args.mask index (git- fixes). * bpf: fix possible endless loop in BPF map iteration (git-fixes). * btrfs: abort transaction during log replay if walk_log_tree() failed (git- fixes). * btrfs: abort transaction on unexpected eb generation at btrfs_copy_root() (git-fixes). * btrfs: add assertions and comment about path expectations to btrfs_cross_ref_exist() (git-fixes). * btrfs: add debug build only WARN (bsc#1249038). * btrfs: add function comment for check_committed_ref() (git-fixes). * btrfs: always abort transaction on failure to add block group to free space tree (git-fixes). * btrfs: avoid load/store tearing races when checking if an inode was logged (git-fixes). * btrfs: avoid redundant call to get inline ref type at check_committed_ref() (git-fixes). * btrfs: avoid starting new transaction when cleaning qgroup during subvolume drop (git-fixes). * btrfs: clear dirty status from extent buffer on error at insert_new_root() (git-fixes). * btrfs: codify pattern for adding block_group to bg_list (git-fixes). * btrfs: convert ASSERT(0) with handled errors to DEBUG_WARN() (bsc#1249038). * btrfs: convert BUG_ON in btrfs_reloc_cow_block() to proper error handling (git-fixes). * btrfs: correctly escape subvol in btrfs_show_options() (git-fixes). * btrfs: do not allow relocation of partially dropped subvolumes (bsc#1249540). * btrfs: do not ignore inode missing when replaying log tree (git-fixes). * btrfs: do not output error message if a qgroup has been already cleaned up (git-fixes). * btrfs: do not return VM_FAULT_SIGBUS on failure to set delalloc for mmap write (bsc#1247949). * btrfs: do not silently ignore unexpected extent type when replaying log (git-fixes). * btrfs: do not skip remaining extrefs if dir not found during log replay (git-fixes). * btrfs: enhance ASSERT() to take optional format string (bsc#1249038). * btrfs: error on missing block group when unaccounting log tree extent buffers (git-fixes). * btrfs: exit after state split error at set_extent_bit() (git-fixes). * btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068) * btrfs: fix -ENOSPC mmap write failure on NOCOW files/extents (bsc#1247949). * btrfs: fix assertion when building free space tree (git-fixes). * btrfs: fix corruption reading compressed range when block size is smaller than page size (git-fixes). * btrfs: fix data overwriting bug during buffered write when block size < page size (git-fixes). * btrfs: fix data race when accessing the inode's disk_i_size at btrfs_drop_extents() (git-fixes). * btrfs: fix incorrect log message for nobarrier mount option (git-fixes). * btrfs: fix inode lookup error handling during log replay (git-fixes). * btrfs: fix invalid extref key setup when replaying dentry (git-fixes). * btrfs: fix invalid inode pointer after failure to create reloc inode (git- fixes). * btrfs: fix invalid inode pointer dereferences during log replay (git-fixes). * btrfs: fix iteration bug in __qgroup_excl_accounting() (git-fixes). * btrfs: fix log tree replay failure due to file with 0 links and extents (git-fixes). * btrfs: fix missing error handling when searching for inode refs during log replay (git-fixes). * btrfs: fix non-empty delayed iputs list on unmount due to async workers (git-fixes). * btrfs: fix printing of mount info messages for NODATACOW/NODATASUM (git- fixes). * btrfs: fix race between logging inode and checking if it was logged before (git-fixes). * btrfs: fix race between setting last_dir_index_offset and inode logging (git-fixes). * btrfs: fix squota compressed stats leak (git-fixes). * btrfs: fix ssd_spread overallocation (git-fixes). * btrfs: fix subvolume deletion lockup caused by inodes xarray race (git- fixes). * btrfs: fix the inode leak in btrfs_iget() (git-fixes). * btrfs: fix two misuses of folio_shift() (git-fixes). * btrfs: fix wrong length parameter for btrfs_cleanup_ordered_extents() (git- fixes). * btrfs: handle unaligned EOF truncation correctly for subpage cases (bsc#1249038). * btrfs: initialize inode::file_extent_tree after i_mode has been set (git- fixes). * btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068) * btrfs: make btrfs_iget() return a btrfs inode instead (git-fixes). * btrfs: make btrfs_iget_path() return a btrfs inode instead (git-fixes). * btrfs: move transaction aborts to the error site in add_block_group_free_space() (git-fixes). * btrfs: pass a btrfs_inode to fixup_inode_link_count() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_defrag_file() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_lock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_double_mmap_unlock() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_extent_same_range() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_fill_inode() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_iget_locked() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_inherit_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_inode_type() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_load_inode_props() (git-fixes). * btrfs: pass struct btrfs_inode to btrfs_read_locked_inode() (git-fixes). * btrfs: pass struct btrfs_inode to can_nocow_extent() (git-fixes). * btrfs: pass struct btrfs_inode to clone_copy_inline_extent() (git-fixes). * btrfs: pass struct btrfs_inode to extent_range_clear_dirty_for_io() (git- fixes). * btrfs: pass struct btrfs_inode to fill_stack_inode_item() (git-fixes). * btrfs: pass struct btrfs_inode to new_simple_dir() (git-fixes). * btrfs: pass true to btrfs_delalloc_release_space() at btrfs_page_mkwrite() (bsc#1247949). * btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes). * btrfs: props: switch prop_handler::apply to struct btrfs_inode (git-fixes). * btrfs: props: switch prop_handler::extract to struct btrfs_inode (git- fixes). * btrfs: push cleanup into btrfs_read_locked_inode() (git-fixes). * btrfs: qgroup: fix qgroup create ioctl returning success after quotas disabled (git-fixes). * btrfs: qgroup: fix race between quota disable and quota rescan ioctl (git- fixes). * btrfs: qgroup: remove no longer used fs_info->qgroup_ulist (git-fixes). * btrfs: qgroup: set quota enabled bit if quota disable fails flushing reservations (git-fixes). * btrfs: record new subvolume in parent dir earlier to avoid dir logging races (git-fixes). * btrfs: remove conditional path allocation in btrfs_read_locked_inode() (git- fixes). * btrfs: remove no longer needed strict argument from can_nocow_extent() (git- fixes). * btrfs: remove redundant path release when replaying a log tree (git-fixes). * btrfs: remove the snapshot check from check_committed_ref() (git-fixes). * btrfs: restore mount option info messages during mount (git-fixes). * btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes). * btrfs: return a btrfs_inode from read_one_inode() (git-fixes). * btrfs: return any hit error from extent_writepage_io() (git-fixes). * btrfs: send: remove unnecessary inode lookup at send_encoded_inline_extent() (git-fixes). * btrfs: simplify arguments for btrfs_cross_ref_exist() (git-fixes). * btrfs: simplify early error checking in btrfs_page_mkwrite() (bsc#1247949). * btrfs: simplify error detection flow during log replay (git-fixes). * btrfs: simplify return logic at check_committed_ref() (git-fixes). * btrfs: subpage: fix the bitmap dump of the locked flags (git-fixes). * btrfs: tests: fix chunk map leak after failure to add it to the tree (git- fixes). * btrfs: tree-checker: fix the incorrect inode ref size check (git-fixes). * btrfs: unfold transaction aborts when replaying log trees (git-fixes). * btrfs: unify ordering of btrfs_key initializations (git-fixes). * btrfs: update superblock's device bytes_used when dropping chunk (git- fixes). * btrfs: use a single variable to track return value at btrfs_page_mkwrite() (bsc#1247949). * btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes). * btrfs: use filemap_get_folio() helper (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_name() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_get_parent() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range() (git-fixes). * btrfs: use struct btrfs_inode inside btrfs_remap_file_range_prep() (git- fixes). * btrfs: use struct btrfs_inode inside create_pending_snapshot() (git-fixes). * btrfs: use verbose ASSERT() in volumes.c (bsc#1249038). * build_bug.h: Add KABI assert (bsc#1249186). * bus: firewall: Fix missing static inline annotations for stubs (git-fixes). * bus: fsl-mc: Check return value of platform_get_resource() (git-fixes). * bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint() (git-fixes). * bus: mhi: ep: Fix chained transfer handling in read path (git-fixes). * bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes). * bus: mhi: host: Do not use uninitialized 'dev' pointer in mhi_init_irq_setup() (git-fixes). * bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640 (git- fixes). * can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes). * can: hi311x: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: j1939: implement NETDEV_UNREGISTER notification handler (git-fixes). * can: j1939: j1939_local_ecu_get(): undo increment when j1939_local_ecu_get() fails (git-fixes). * can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed (git-fixes). * can: kvaser_pciefd: Store device channel index (git-fixes). * can: kvaser_usb: Assign netdev.dev_port based on device channel index (git- fixes). * can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode (git-fixes). * can: peak_usb: fix USB FD devices potential malfunction (git-fixes). * can: peak_usb: fix shift-out-of-bounds issue (git-fixes). * can: rcar_can: rcar_can_resume(): fix s2ram with PSCI (stable-fixes). * can: rcar_canfd: Fix controller mode setting (stable-fixes). * can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow (git- fixes). * can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB (git-fixes). * cdc-acm: fix race between initial clearing halt and open (git-fixes). * cdc_ncm: Flag Intel OEM version of Fibocom L850-GL as WWAN (stable-fixes). * cdx: Fix off-by-one error in cdx_rpmsg_probe() (git-fixes). * cgroup/cpuset: Fix a partition error with CPU hotplug (bsc#1241166). * cgroup/cpuset: Use static_branch_enable_cpuslocked() on cpusets_insane_config_key (bsc#1241166). * cgroup: Add compatibility option for content of /proc/cgroups (jsc#PED-12405). * cgroup: Print message when /proc/cgroups is read on v2-only system (jsc#PED-12405). * cgroup: llist: avoid memory tears for llist_node (bsc#1247963). * cgroup: make css_rstat_updated nmi safe (bsc#1247963). * cgroup: remove per-cpu per-subsystem locks (bsc#1247963). * cgroup: support to enable nmi-safe css_rstat_updated (bsc#1247963). * char: misc: Fix improper and inaccurate error code returned by misc_init() (stable-fixes). * clk: at91: peripheral: fix return value (git-fixes). * clk: at91: sam9x7: update pll clk ranges (git-fixes). * clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes). * clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes). * clk: imx95-blk-ctl: Fix synchronous abort (git-fixes). * clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes). * clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git- fixes). * clk: qcom: common: Fix NULL vs IS_ERR() check in qcom_cc_icc_register() (git-fixes). * clk: qcom: gcc-ipq8074: fix broken freq table for nss_port6_tx_clk_src (git- fixes). * clk: qcom: tcsrcc-x1e80100: Set the bi_tcxo as parent to eDP refclk (git- fixes). * clk: renesas: cpg-mssr: Fix memory leak in cpg_mssr_reserved_init() (git- fixes). * clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv clocks (git-fixes). * clk: samsung: exynos850: fix a comment (git-fixes). * clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD (git-fixes). * clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent clock (git- fixes). * clk: sunxi-ng: v3s: Fix de clock definition (git-fixes). * clk: tegra: do not overallocate memory for bpmp clocks (git-fixes). * clk: thead: th1520-ap: Correctly refer the parent of osc_12m (git-fixes). * clk: xilinx: vcu: unregister pll_post only if registered correctly (git- fixes). * comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl() (git-fixes). * comedi: Make insn_rw_emulate_bits() do insn->n samples (git-fixes). * comedi: fix race between polling and detaching (git-fixes). * comedi: pcl726: Prevent invalid irq number (git-fixes). * compiler-clang.h: define **SANITIZE_*** macros only when undefined (stable- fixes). * compiler: remove __ADDRESSABLE_ASM{_STR,}() again (git-fixes). * config.sh: SLFO 1.2 branched in IBS * config: arm64: default: enable mtu3 dual-role support for MediaTek platforms (bsc#1245206) * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cpu: Define attack vectors (git-fixes). * cpufreq/amd-pstate: Fix a regression leading to EPP 0 after resume (git- fixes). * cpufreq/amd-pstate: Fix setting of CPPC.min_perf in active mode for performance governor (git-fixes). * cpufreq/sched: Explicitly synchronize limits_changed flag (git-fixes) * cpufreq/sched: Fix the usage of CPUFREQ_NEED_UPDATE_LIMITS (git-fixes) * cpufreq: Add SM8650 to cpufreq-dt-platdev blocklist (stable-fixes). * cpufreq: CPPC: Avoid using CPUFREQ_ETERNAL as transition delay (stable- fixes). * cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag (stable-fixes). * cpufreq: Exit governor when failed to start old governor (stable-fixes). * cpufreq: Init policy->rwsem before it may be possibly used (git-fixes). * cpufreq: Initialize cpufreq-based frequency-invariance later (git-fixes). * cpufreq: Initialize cpufreq-based invariance before subsys (git-fixes). * cpufreq: Make drivers using CPUFREQ_ETERNAL specify transition latency (stable-fixes git-fixes). * cpufreq: Reference count policy in cpufreq_update_limits() (git-fixes). * cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes). * cpufreq: armada-8k: make both cpu masks static (git-fixes). * cpufreq: cppc: Fix invalid return value in .get() callback (git-fixes). * cpufreq: governor: Fix negative 'idle_time' handling in dbs_update() (git- fixes). * cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode (stable- fixes). * cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode (git- fixes). * cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (git-fixes). * cpufreq: intel_pstate: Unchecked MSR aceess in legacy mode (git-fixes). * cpufreq: mediatek: fix device leak on probe failure (git-fixes). * cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git- fixes). * cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable- fixes). * cpufreq: scpi: compare kHz instead of Hz (git-fixes). * cpufreq: sun50i: prevent out-of-bounds access (git-fixes). * cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes). * cpufreq: tegra186: Share policy per cluster (stable-fixes). * cpupower: Fix a bug where the -t option of the set subcommand was not working (stable-fixes). * crypto: af_alg - Set merge to zero early in af_alg_sendmsg (git-fixes). * crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes). * crypto: aspeed - Fix dma_unmap_sg() direction (git-fixes). * crypto: atmel - Fix dma_unmap_sg() direction (git-fixes). * crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP (git-fixes). * crypto: ccp - Add missing bootloader info reg for pspv6 (stable-fixes). * crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes). * crypto: ccp - Fix locking on alloc failure handling (git-fixes). * crypto: essiv - Check ssize for decryption and in-place encryption (git- fixes). * crypto: hisilicon - re-enable address prefetch after device resuming (git- fixes). * crypto: hisilicon/hpre - fix dma unmap sequence (stable-fixes). * crypto: hisilicon/qm - check whether the input function and PF are on the same device (git-fixes). * crypto: hisilicon/qm - set NULL to qm->debug.qm_diff_regs (git-fixes). * crypto: hisilicon/zip - remove unnecessary validation for high-performance mode configurations (git-fixes). * crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes). * crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes). * crypto: jitter - fix intermediary handling (stable-fixes). * crypto: keembay - Add missing check after sg_nents_for_len() (git-fixes). * crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes). * crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes). * crypto: octeontx2 - Call strscpy() with correct size argument (git-fixes). * crypto: octeontx2 - Fix address alignment issue on ucode loading (stable- fixes). * crypto: octeontx2 - Fix address alignment on CN10K A0/A1 and OcteonTX2 (stable-fixes). * crypto: octeontx2 - Fix address alignment on CN10KB and CN10KA-B0 (stable- fixes). * crypto: octeontx2 - add timeout for load_fvc completion poll (stable-fixes). * crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes). * crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes). * crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes). * crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes). * crypto: qat - fix state restore for banks with exceptions (git-fixes). * crypto: qat - flush misc workqueue during device shutdown (git-fixes). * crypto: qat - lower priority for skcipher and aead algorithms (stable- fixes). * crypto: qat - use unmanaged allocation for dc_data (git-fixes). * crypto: rng - Ensure set_ent is always present (git-fixes). * crypto: rockchip - Fix dma_unmap_sg() nents value (git-fixes). * crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes). * devlink: Add support for u64 parameters (jsc#PED-13331). * devlink: avoid param type value translations (jsc#PED-13331). * devlink: define enum for attr types of dynamic attributes (jsc#PED-13331). * devlink: introduce devlink_nl_put_u64() (jsc#PED-13331). * devlink: let driver opt out of automatic phys_port_name generation (git- fixes). * dm-mpath: do not print the "loaded" message if registering fails (git- fixes). * dm-stripe: limit chunk_sectors to the stripe size (git-fixes). * dm-table: fix checking for rq stackable devices (git-fixes). * dm: Check for forbidden splitting of zone write operations (git-fixes). * dm: split write BIOs on zone boundaries when zone append is not emulated (git-fixes). * dma/pool: Ensure DMA_DIRECT_REMAP allocations are decrypted (stable-fixes). * dmaengine: Fix dma_async_tx_descriptor->tx_submit documentation (git-fixes). * dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes). * dmaengine: dw: dmamux: Fix device reference leak in rzn1_dmamux_route_allocate (git-fixes). * dmaengine: fsl-dpaa2-qdma: Drop unused mc_enc() (git-fixes). * dmaengine: idxd: Fix double free in idxd_setup_wqs() (git-fixes). * dmaengine: idxd: Fix refcount underflow on module unload (git-fixes). * dmaengine: idxd: Remove improper idxd_free (git-fixes). * dmaengine: mediatek: Fix a flag reuse error in mtk_cqdma_tx_status() (git- fixes). * dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning (git-fixes). * dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git- fixes). * dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes). * dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees (git- fixes). * dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes). * dmaengine: stm32-dma: configure next sg only if there are more than 2 sgs (stable-fixes). * dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (git- fixes). * docs: admin-guide: update to current minimum pipe size default (git-fixes). * dpll: Add basic Microchip ZL3073x support (jsc#PED-13331). * dpll: Make ZL3073X invisible (jsc#PED-13331). * dpll: zl3073x: Add support to get/set frequency on pins (jsc#PED-13331). * dpll: zl3073x: Add support to get/set priority on input pins (jsc#PED-13331). * dpll: zl3073x: Fetch invariants during probe (jsc#PED-13331). * dpll: zl3073x: Fix build failure (jsc#PED-13331). * dpll: zl3073x: Implement input pin selection in manual mode (jsc#PED-13331). * dpll: zl3073x: Implement input pin state setting in automatic mode (jsc#PED-13331). * dpll: zl3073x: Read DPLL types and pin properties from system firmware (jsc#PED-13331). * dpll: zl3073x: Register DPLL devices and pins (jsc#PED-13331). * dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (jsc#PED-13331). * driver core/PM: Set power.no_callbacks along with power.no_pm (stable- fixes). * drivers/base/node: fix double free in register_one_node() (git-fixes). * drivers/base/node: handle error properly in register_one_node() (git-fixes). * drivers: base: handle module_kobject creation (git-fixes). * drm/amd : Update MES API header file for v11 & v12 (stable-fixes). * drm/amd/amdgpu: Declare isp firmware binary file (stable-fixes). * drm/amd/amdgpu: Fix missing error return on kzalloc failure (git-fixes). * drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112). * drm/amd/amdgpu: disable hwmon power1_cap* for gfx 11.0.3 on vf mode (stable- fixes). * drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112). * drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes). * drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session() (git-fixes). * drm/amd/display: Add primary plane to commits for correct VRR handling (stable-fixes). * drm/amd/display: Adjust DCE 8-10 clock, do not overclock by 15% (git-fixes). * drm/amd/display: Allow DCN301 to clear update flags (git-fixes). * drm/amd/display: Allow RX6xxx & RX7700 to invoke amdgpu_irq_get/put (git- fixes). * drm/amd/display: Avoid a NULL pointer dereference (stable-fixes). * drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported (stable-fixes). * drm/amd/display: Avoid trying AUX transactions on disconnected ports (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN314 w/out DPP PG (stable-fixes). * drm/amd/display: Default IPS to RCG_IN_ACTIVE_IPS2_IN_OFF (git-fixes). * drm/amd/display: Disable CRTC degamma LUT for DCN401 (stable-fixes). * drm/amd/display: Disable DPCD Probe Quirk (bsc#1248121). * drm/amd/display: Disable dsc_power_gate for dcn314 by default (stable- fixes). * drm/amd/display: Disable scaling on DCE6 for now (git-fixes). * drm/amd/display: Do not check for NULL divisor in fixpt code (git-fixes). * drm/amd/display: Do not overclock DCE 6 by 15% (git-fixes). * drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes). * drm/amd/display: Do not print errors for nonexistent connectors (git-fixes). * drm/amd/display: Do not warn when missing DCE encoder caps (stable-fixes). * drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112). * drm/amd/display: Fill display clock and vblank time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Find first CRTC and its line time in dce110_fill_display_configs (stable-fixes). * drm/amd/display: Fix 'failed to blank crtc!' (stable-fixes). * drm/amd/display: Fix DP audio DTO1 clock source on DCE 6 (stable-fixes). * drm/amd/display: Fix Xorg desktop unresponsive on Replay panel (stable- fixes). * drm/amd/display: Fix fractional fb divider in set_pixel_clock_v3 (git- fixes). * drm/amd/display: Fix mismatch type comparison (stable-fixes). * drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112). * drm/amd/display: Free memory allocation (stable-fixes). * drm/amd/display: Init DCN35 clocks from pre-os HW values (git-fixes). * drm/amd/display: Initialize mode_select to 0 (stable-fixes). * drm/amd/display: Only finalize atomic_obj if it was initialized (stable- fixes). * drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes). * drm/amd/display: Properly disable scaling on DCE6 (git-fixes). * drm/amd/display: Remove redundant semicolons (git-fixes). * drm/amd/display: Separate set_gsl from set_gsl_source_select (stable-fixes). * drm/amd/display: Update DMCUB loading sequence for DCN3.5 (stable-fixes). * drm/amd/display: add workaround flag to link to force FFE preset (stable- fixes). * drm/amd/display: fix a Null pointer dereference vulnerability (stable- fixes). * drm/amd/display: fix dmub access race condition (bsc#1243112). * drm/amd/display: fix initial backlight brightness calculation (git-fixes). * drm/amd/display: limit clear_update_flags to dcn32 and above (stable-fixes). * drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112). * drm/amd/display: remove output_tf_change flag (git-fixes). * drm/amd/display: use udelay rather than fsleep (git-fixes). * drm/amd/include : MES v11 and v12 API header update (stable-fixes). * drm/amd/include : Update MES v12 API for fence update (stable-fixes). * drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git- fixes). * drm/amd/pm: Adjust si_upload_smc_data register programming (v3) (git-fixes). * drm/amd/pm: Disable MCLK switching with non-DC at 120 Hz+ (v2) (git-fixes). * drm/amd/pm: Disable SCLK switching on Oland with high pixel clocks (v3) (git-fixes). * drm/amd/pm: Disable ULV even if unsupported (v3) (git-fixes). * drm/amd/pm: Fix si_upload_smc_data (v3) (git-fixes). * drm/amd/pm: Treat zero vblank time as too short in si_dpm (v3) (git-fixes). * drm/amd/pm: fix null pointer access (stable-fixes). * drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to manual (stable-fixes). * drm/amd: Avoid evicting resources at S5 (bsc#1243112). * drm/amd: Check whether secure display TA loaded successfully (bsc#1243112). * drm/amd: Fix hybrid sleep (bsc#1243112). * drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112). * drm/amd: Restore cached manual clock settings during resume (bsc#1243112). * drm/amd: Restore cached power limit during resume (stable-fixes). * drm/amdgpu/discovery: fix fw based ip discovery (git-fixes). * drm/amdgpu/discovery: optionally use fw based ip discovery (stable-fixes). * drm/amdgpu/gfx10: fix KGQ reset sequence (git-fixes). * drm/amdgpu/gfx10: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/gfx9: fix kiq locking in KCQ reset (git-fixes). * drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112). * drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112). * drm/amdgpu/mes: add missing locking in helper functions (stable-fixes). * drm/amdgpu/mes: enable compute pipes across all MEC (git-fixes). * drm/amdgpu/mes: optimize compute loop handling (stable-fixes). * drm/amdgpu/swm14: Update power limit logic (stable-fixes). * drm/amdgpu/vcn4: Fix IB parsing with multiple engine info packages (stable- fixes). * drm/amdgpu/vcn: Allow limiting ctx to instance 0 for AV1 at any time (stable-fixes). * drm/amdgpu/vcn: fix ref counting for ring based profile handling (git- fixes). * drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112). * drm/amdgpu: Add additional DCE6 SCL registers (git-fixes). * drm/amdgpu: Avoid extra evict-restore process (stable-fixes). * drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112). * drm/amdgpu: Enable MES lr_compute_wa by default (stable-fixes). * drm/amdgpu: Fix allocating extra dwords for rings (v2) (git-fixes). * drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112). * drm/amdgpu: Increase reset counter only on success (stable-fixes). * drm/amdgpu: Initialize data to NULL in imu_v12_0_program_rlc_ram() (git- fixes). * drm/amdgpu: Power up UVD 3 for FW validation (v2) (git-fixes). * drm/amdgpu: Remove nbiov7.9 replay count reporting (git-fixes). * drm/amdgpu: Report individual reset error (bsc#1243112). * drm/amdgpu: Reset the clear flag in buddy during resume (git-fixes). * drm/amdgpu: Update external revid for GC v9.5.0 (stable-fixes). * drm/amdgpu: VCN v5_0_1 to prevent FW checking RB during DPG pause (stable- fixes). * drm/amdgpu: add kicker fws loading for gfx11/smu13/psp13 (stable-fixes). * drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities (stable-fixes). * drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112). * drm/amdgpu: drop hw access in non-DC audio fini (stable-fixes). * drm/amdgpu: fix a memory leak in fence cleanup when unloading (git-fixes). * drm/amdgpu: fix incorrect vm flags to map bo (git-fixes). * drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112). * drm/amdgpu: fix task hang from failed job submission during process kill (git-fixes). * drm/amdgpu: fix vram reservation issue (git-fixes). * drm/amdgpu: remove the redeclaration of variable i (git-fixes). * drm/amdgpu: update mmhub 3.0.1 client id mappings (stable-fixes). * drm/amdgpu: update mmhub 4.1.0 client id mappings (stable-fixes). * drm/amdkfd: Destroy KFD debugfs after destroy KFD wq (stable-fixes). * drm/amdkfd: Fix error code sign for EINVAL in svm_ioctl() (git-fixes). * drm/amdkfd: Fix mmap write lock not release (bsc#1243112). * drm/ast: Use msleep instead of mdelay for edid read (git-fixes). * drm/bridge: fix OF node leak (git-fixes). * drm/bridge: it6505: select REGMAP_I2C (git-fixes). * drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe() (git-fixes). * drm/bridge: ti-sn65dsi86: fix REFCLK setting (git-fixes). * drm/cirrus-qemu: Fix pitch programming (git-fixes). * drm/connector: hdmi: Evaluate limited range after computing format (git- fixes). * drm/dp: Add an EDID quirk for the DPCD register access probe (bsc#1248121). * drm/dp: Change AUX DPCD probe address from DPCD_REV to LANE0_1_STATUS (stable-fixes). * drm/dp: Change AUX DPCD probe address from LANE0_1_STATUS to TRAINING_PATTERN_SET (bsc#1248121). * drm/edid: Add support for quirks visible to DRM core and drivers (bsc#1248121). * drm/edid: Define the quirks in an enum list (bsc#1248121). * drm/format-helper: Add conversion from XRGB8888 to BGR888 (stable-fixes). * drm/gem: Internally test import_attach for imported objects (git-fixes). * drm/gem: Test for imported GEM buffers with helper (stable-fixes). * drm/gma500: Fix null dereference in hdmi teardown (git-fixes). * drm/hisilicon/hibmc: fix the hibmc loaded failed bug (git-fixes). * drm/hisilicon/hibmc: fix the i2c device resource leak when vdac init failed (git-fixes). * drm/hisilicon/hibmc: refactored struct hibmc_drm_private (stable-fixes). * drm/i915/backlight: Return immediately when scale() finds invalid parameters (stable-fixes). * drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return type (stable-fixes). * drm/i915/ddi: gracefully handle errors from intel_ddi_init_hdmi_connector() (stable-fixes). * drm/i915/ddi: only call shutdown hooks for valid encoders (stable-fixes). * drm/i915/display: Fix dma_fence_wait_timeout() return value handling (git- fixes). * drm/i915/display: add intel_encoder_is_hdmi() (stable-fixes). * drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x (git-fixes). * drm/i915/dp_mst: Work around Thunderbolt sink disconnect after SINK_COUNT_ESI read (stable-fixes). * drm/i915/hdmi: add error handling in g4x_hdmi_init() (stable-fixes). * drm/i915/hdmi: propagate errors from intel_hdmi_init_connector() (stable- fixes). * drm/i915/icl+/tc: Cache the max lane count value (stable-fixes). * drm/i915/icl+/tc: Convert AUX powered WARN to a debug message (stable- fixes). * drm/i915/power: fix size for for_each_set_bit() in abox iteration (git- fixes). * drm/imagination: Clear runtime PM errors while resetting the GPU (stable- fixes). * drm/mediatek: Add error handling for old state CRTC in atomic_disable (git- fixes). * drm/mediatek: Fix device/node reference count leaks in mtk_drm_get_all_drm_priv (git-fixes). * drm/mediatek: fix potential OF node use-after-free (git-fixes). * drm/msm/dp: account for widebus and yuv420 during mode validation (git- fixes). * drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes). * drm/msm/dpu: fix incorrect type for ret (git-fixes). * drm/msm/kms: move snapshot init earlier in KMS init (git-fixes). * drm/msm: Add error handling for krealloc in metadata setup (stable-fixes). * drm/msm: Defer fd_install in SUBMIT ioctl (git-fixes). * drm/msm: update the high bitfield of certain DSI registers (git-fixes). * drm/msm: use trylock for debugfs (stable-fixes). * drm/nouveau/disp: Always accept linear modifier (git-fixes). * drm/nouveau/gsp: fix potential leak of memory used during acpi init (git- fixes). * drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor() (git-fixes). * drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes). * drm/nouveau: fix error path in nvkm_gsp_fwsec_v2 (git-fixes). * drm/nouveau: fix typos in comments (git-fixes). * drm/nouveau: remove unused increment in gm200_flcn_pio_imem_wr (git-fixes). * drm/nouveau: remove unused memory target test (git-fixes). * drm/panel: novatek-nt35560: Fix invalid return value (git-fixes). * drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes). * drm/panthor: Add missing explicit padding in drm_panthor_gpu_info (git- fixes). * drm/panthor: Defer scheduler entitiy destruction to queue release (git- fixes). * drm/panthor: Fix memory leak in panthor_ioctl_group_create() (git-fixes). * drm/panthor: validate group queue count (git-fixes). * drm/radeon/r600_cs: clean up of dead code in r600_cs (git-fixes). * drm/rcar-du: dsi: Fix 1/2/3 lane support (git-fixes). * drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes). * drm/sched: Remove optimization that causes hang when killing dependent jobs (git-fixes). * drm/simpledrm: Do not upcast in release helpers (git-fixes). * drm/tests: Fix endian warning (git-fixes). * drm/ttm: Respect the shrinker core free target (stable-fixes). * drm/ttm: Should to return the evict error (stable-fixes). * drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes). * drm/vmwgfx: Fix Use-after-free in validation (git-fixes). * drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes). * drm/vmwgfx: Fix copy-paste typo in validation (git-fixes). * drm/xe/bmg: Add new PCI IDs (stable-fixes). * drm/xe/bmg: Add one additional PCI ID (stable-fixes). * drm/xe/bmg: Update Wa_22019338487 (git-fixes). * drm/xe/gsc: do not flush the GSC worker from the reset path (git-fixes). * drm/xe/hw_engine_group: Fix double write lock release in error path (git- fixes). * drm/xe/mocs: Initialize MOCS index early (stable-fixes). * drm/xe/pf: Move VFs reprovisioning to worker (stable-fixes). * drm/xe/pf: Prepare to stop SR-IOV support prior GT reset (git-fixes). * drm/xe/pf: Sanitize VF scratch registers on FLR (stable-fixes). * drm/xe/tile: Release kobject for the failure path (git-fixes). * drm/xe/uapi: Correct sync type definition in comments (git-fixes). * drm/xe/uapi: loosen used tracking restriction (git-fixes). * drm/xe/vf: Disable CSC support on VF (git-fixes). * drm/xe/vm: Clear the scratch_pt pointer on error (git-fixes). * drm/xe/xe_query: Use separate iterator while filling GT list (stable-fixes). * drm/xe/xe_sync: avoid race during ufence signaling (git-fixes). * drm/xe: Allow dropping kunit dependency as built-in (git-fixes). * drm/xe: Attempt to bring bos back to VRAM after eviction (git-fixes). * drm/xe: Carve out wopcm portion from the stolen memory (git-fixes). * drm/xe: Do not trigger rebind on initial dma-buf validation (git-fixes). * drm/xe: Ensure fixed_slice_mode gets set after ccs_mode change (git-fixes). * drm/xe: Fix a NULL vs IS_ERR() in xe_vm_add_compute_exec_queue() (git- fixes). * drm/xe: Fix build without debugfs (git-fixes). * drm/xe: Make dma-fences compliant with the safe access rules (stable-fixes). * drm/xe: Move page fault init after topology init (git-fixes). * drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ (git- fixes). * drm: bridge: cdns-mhdp8546: Fix missing mutex unlock on error path (git- fixes). * drm: renesas: rz-du: mipi_dsi: Add min check for VCLK range (stable-fixes). * dt-bindings: dpll: Add DPLL device and pin (jsc#PED-13331). * dt-bindings: dpll: Add support for Microchip Azurite chip family (jsc#PED-13331). * e1000e: disregard NVM checksum on tgp when valid checksum bit is not set (git-fixes). * e1000e: ignore uninitialized checksum word on tgp (git-fixes). * efi: stmm: Fix incorrect buffer allocation method (git-fixes). * erofs: avoid reading more for fragment maps (git-fixes). * erofs: fix atomic context detection when !CONFIG_DEBUG_LOCK_ALLOC (git- fixes). * execmem: enforce allocation size aligment to PAGE_SIZE (git-fixes). * exfat: add cluster chain loop check for dir (git-fixes). * exfat: fdatasync flag should be same like generic_write_sync() (git-fixes). * ext4: fix checks for orphan inodes (bsc#1250119). * ext4: remove writable userspace mappings before truncating page cache (bsc#1247223). * fbcon: Fix OOB access in font allocation (git-fixes). * fbcon: Fix outdated registered_fb reference in comment (git-fixes). * fbcon: fix integer overflow in fbcon_do_set_font (git-fixes). * fbdev: Fix logic error in "offb" name match (git-fixes). * fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (stable-fixes). * fbdev: fix potential buffer overflow in do_register_framebuffer() (stable- fixes). * fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes). * fbdev: simplefb: Fix use after free in simplefb_detach_genpds() (git-fixes). * fgraph: Fix set_graph_notrace with setting TRACE_GRAPH_NOTRACE_BIT (git- fixes). * firewire: core: fix overlooked update of subsystem ABI version (git-fixes). * firewire: ohci: correct code comments about bus_reset tasklet (git-fixes). * firmware: arm_ffa: Change initcall level of ffa_init() to rootfs_initcall (stable-fixes). * firmware: arm_scmi: Convert to SYSTEM_SLEEP_PM_OPS (git-fixes). * firmware: arm_scmi: Fix up turbo frequencies selection (git-fixes). * firmware: arm_scmi: Mark VirtIO ready before registering scmi_virtio_driver (git-fixes). * firmware: arm_scmi: power_control: Ensure SCMI_SYSPOWER_IDLE is set early during resume (stable-fixes). * firmware: firmware: meson-sm: fix compile-test default (git-fixes). * firmware: meson_sm: fix device leak at probe (git-fixes). * firmware: tegra: Fix IVC dependency problems (stable-fixes). * flexfiles/pNFS: fix NULL checks on result of ff_layout_choose_ds_for_read (git-fixes). * fs/nfs/io: make nfs_start_io_*() killable (git-fixes). * fs/proc/task_mmu: check p->vec_buf for NULL (git-fixes). * fs/proc: Use inode_get_dev() for device numbers in procmap_query References: bsc#1246450 * ftrace: Fix function profiler's filtering functionality (git-fixes). * ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes). * gfs2: Call gfs2_queue_verify_delete from gfs2_evict_inode (bsc#1247220). * gfs2: Clean up delete work processing (bsc#1247220). * gfs2: Faster gfs2_upgrade_iopen_glock wakeups (bsc#1247220). * gfs2: Initialize gl_no_formal_ino earlier (bsc#1247220). * gfs2: Minor delete_work_func cleanup (bsc#1247220). * gfs2: Only defer deletes when we have an iopen glock (bsc#1247220). * gfs2: Prevent inode creation race (2) (bsc#1247220). * gfs2: Prevent inode creation race (bsc#1247220). * gfs2: Randomize GLF_VERIFY_DELETE work delay (bsc#1247220). * gfs2: Rename GIF_{DEFERRED -> DEFER}_DELETE (bsc#1247220). * gfs2: Rename dinode_demise to evict_behavior (bsc#1247220). * gfs2: Replace GIF_DEFER_DELETE with GLF_DEFER_DELETE (bsc#1247220). * gfs2: Return enum evict_behavior from gfs2_upgrade_iopen_glock (bsc#1247220). * gfs2: Simplify DLM_LKF_QUECVT use (bsc#1247220). * gfs2: Update to the evict / remote delete documentation (bsc#1247220). * gfs2: Use mod_delayed_work in gfs2_queue_try_to_evict (bsc#1247220). * gfs2: gfs2_evict_inode clarification (bsc#1247220). * gfs2: minor evict fix (bsc#1247220). * gfs2: skip if we cannot defer delete (bsc#1247220). * gpio: mlxbf2: use platform_get_irq_optional() (git-fixes). * gpio: mlxbf3: use platform_get_irq_optional() (git-fixes). * gpio: tps65912: check the return value of regmap_update_bits() (stable- fixes). * gpio: virtio: Fix config space reading (git-fixes). * gpio: wcd934x: check the return value of regmap_update_bits() (stable- fixes). * gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes). * gpiolib: Extend software-node support to support secondary software-nodes (git-fixes). * gve: Fix stuck TX queue for DQ queue format (git-fixes). * gve: prevent ethtool ops after shutdown (git-fixes). * habanalabs: fix UAF in export_dmabuf() (git-fixes). * hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes). * hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111). * hv_netvsc: Link queues to NAPIs (git-fixes). * hwmon: (emc2305) Set initial PWM minimum value during probe based on thermal state (stable-fixes). * hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes). * hwmon: (mlxreg-fan) Separate methods of fan setting coming from different subsystems (git-fixes). * hwmon: mlxreg-fan: Prevent fans from getting stuck at 0 RPM (git-fixes). * hwrng: ks-sa - fix division by zero in ks_sa_rng_init (git-fixes). * hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes). * hwrng: nomadik - add ARM_AMBA dependency (git-fixes). * i2c: Force DLL0945 touchpad i2c freq to 100khz (stable-fixes). * i2c: designware: Add disabling clocks when probe fails (git-fixes). * i2c: designware: Add quirk for Intel Xe (stable-fixes). * i2c: designware: Fix clock issue when PM is disabled (git-fixes). * i2c: designware: Use temporary variable for struct device (stable-fixes). * i2c: i801: Hide Intel Birch Stream SoC TCO WDT (git-fixes). * i2c: mediatek: fix potential incorrect use of I2C_MASTER_WRRD (git-fixes). * i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe() (git- fixes). * i2c: omap: Add support for setting mux (stable-fixes). * i2c: omap: Fix an error handling path in omap_i2c_probe() (git-fixes). * i2c: omap: Handle omap_i2c_init() errors in omap_i2c_probe() (git-fixes). * i2c: omap: fix deprecated of_property_read_bool() use (git-fixes). * i2c: qup: jump out of the loop in case of timeout (git-fixes). * i2c: riic: Allow setting frequencies lower than 50KHz (git-fixes). * i2c: tegra: Fix reset error handling with ACPI (git-fixes). * i2c: tegra: Use internal reset when reset property is not available (bsc#1249143) * i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes). * i3c: Fix default I2C adapter timeout value (git-fixes). * i3c: add missing include to internal header (stable-fixes). * i3c: do not fail if GETHDRCAP is unsupported (stable-fixes). * i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes). * i3c: master: Initialize ret in i3c_i2c_notifier_call() (stable-fixes). * i3c: master: svc: Recycle unused IBI slot (git-fixes). * i3c: master: svc: Use manual response for IBI events (git-fixes). * i40e: When removing VF MAC filters, only check PF-set MAC (git-fixes). * i40e: report VF tx_dropped with tx_errors instead of tx_discards (git- fixes). * ibmvnic: Fix hardcoded NUM_RX_STATS/NUM_TX_STATS with dynamic sizeof (git- fixes). * ice, irdma: fix an off by one in error handling code (bsc#1247712). * ice, irdma: move interrupts code to irdma (bsc#1247712). * ice/ptp: fix crosstimestamp reporting (git-fixes). * ice: Fix signedness bug in ice_init_interrupt_scheme() (bsc#1247712). * ice: Replace ice specific DSCP mapping num with a kernel define (jsc#PED-13728 jsc#PED-13762). * ice: check correct pointer in fwlog debugfs (git-fixes). * ice: count combined queues using Rx/Tx count (bsc#1247712). * ice: devlink PF MSI-X max and min parameter (bsc#1247712). * ice: do not leave device non-functional if Tx scheduler config fails (git- fixes). * ice: enable_rdma devlink param (bsc#1247712). * ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset (jsc#PED-13728). * ice: fix incorrect counter for buffer allocation failures (git-fixes). * ice: get rid of num_lan_msix field (bsc#1247712). * ice: init flow director before RDMA (bsc#1247712). * ice: remove splitting MSI-X between features (bsc#1247712). * ice: simplify VF MSI-X managing (bsc#1247712). * ice: treat dyn_allowed only as suggestion (bsc#1247712). * ice: use fixed adapter index for E825C embedded devices (git-fixes). * idpf: add PTP clock configuration (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp capabilities negotiation (jsc#PED-13728 jsc#PED-13762). * idpf: add Tx timestamp flows (jsc#PED-13728 jsc#PED-13762). * idpf: add cross timestamping (jsc#PED-13728). * idpf: add flow steering support (jsc#PED-13728). * idpf: add initial PTP support (jsc#PED-13728 jsc#PED-13762). * idpf: add mailbox access to read PTP clock time (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Rx timestamping (jsc#PED-13728 jsc#PED-13762). * idpf: add support for Tx refillqs in flow scheduling mode (jsc#PED-13728). * idpf: assign extracted ptype to struct libeth_rqe_info field (jsc#PED-13728 jsc#PED-13762). * idpf: change the method for mailbox workqueue allocation (jsc#PED-13728 jsc#PED-13762). * idpf: fix UAF in RDMA core aux dev deinitialization (jsc#PED-13728). * idpf: implement IDC vport aux driver MTU change handler (jsc#PED-13728 jsc#PED-13762). * idpf: implement RDMA vport auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement core RDMA auxiliary dev create, init, and destroy (jsc#PED-13728 jsc#PED-13762). * idpf: implement get LAN MMIO memory regions (jsc#PED-13728 jsc#PED-13762). * idpf: implement remaining IDC RDMA core callbacks and handlers (jsc#PED-13728 jsc#PED-13762). * idpf: improve when to set RE bit logic (jsc#PED-13728). * idpf: move virtchnl structures to the header file (jsc#PED-13728 jsc#PED-13762). * idpf: negotiate PTP capabilities and get PTP clock (jsc#PED-13728 jsc#PED-13762). * idpf: preserve coalescing settings across resets (jsc#PED-13728). * idpf: remove obsolete stashing code (jsc#PED-13728). * idpf: remove unreachable code from setting mailbox (jsc#PED-13728 jsc#PED-13762). * idpf: replace flow scheduling buffer ring with buffer pool (jsc#PED-13728). * idpf: set mac type when adding and removing MAC filters (jsc#PED-13728). * idpf: simplify and fix splitq Tx packet rollback error path (jsc#PED-13728). * idpf: stop Tx if there are insufficient buffer resources (jsc#PED-13728). * idpf: use reserved RDMA vectors from control plane (jsc#PED-13728 jsc#PED-13762). * igb: xsk: solve negative overflow of nb_pkts in zerocopy mode (git-fixes). * igc: disable L1.2 PCI-E link substate to avoid performance issue (git- fixes). * igc: fix disabling L1.2 PCI-E link substate on I226 on init (git-fixes). * iidc/ice/irdma: Break iidc.h into two headers (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename IDC header file (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Rename to iidc_* convention (jsc#PED-13728 jsc#PED-13762). * iidc/ice/irdma: Update IDC to support multiple consumers (jsc#PED-13728 jsc#PED-13762). * iio/adc/pac1934: fix channel disable configuration (git-fixes). * iio: accel: adxl355: Make timestamp 64-bit aligned using aligned_s64 (git- fixes). * iio: accel: fxls8962af: Fix temperature calculation (git-fixes). * iio: adc: ad7173: fix setting ODR in probe (git-fixes). * iio: adc: ad7266: Fix potential timestamp alignment issue (git-fixes). * iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement (stable- fixes). * iio: adc: ad7768-1: Fix insufficient alignment of timestamp (git-fixes). * iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes). * iio: adc: ad_sigma_delta: do not overallocate scan buffer (stable-fixes). * iio: adc: dln2: Use aligned_s64 for timestamp (git-fixes). * iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes). * iio: adc: max1363: Reorder mode_list[] entries (stable-fixes). * iio: chemical: pms7003: use aligned_s64 for timestamp (git-fixes). * iio: chemical: sps30: use aligned_s64 for timestamp (git-fixes). * iio: common: st_sensors: Fix use of uninitialize device structs (stable- fixes). * iio: consumers: Fix handling of negative channel scale in iio_convert_raw_to_processed() (git-fixes). * iio: consumers: Fix offset handling in iio_convert_raw_to_processed() (git- fixes). * iio: dac: ad5360: use int type to store negative error codes (git-fixes). * iio: dac: ad5421: use int type to store negative error codes (git-fixes). * iio: frequency: adf4350: Fix ADF4350_REG3_12BIT_CLKDIV_MODE (git-fixes). * iio: frequency: adf4350: Fix prescaler usage (git-fixes). * iio: hid-sensor-prox: Fix incorrect OFFSET calculation (git-fixes). * iio: hid-sensor-prox: Restore lost scale assignments (git-fixes). * iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes). * iio: imu: inv_icm42600: Convert to uXX and sXX integer types (stable-fixes). * iio: imu: inv_icm42600: Drop redundant pm_runtime reinitialization in resume (git-fixes). * iio: imu: inv_icm42600: change invalid data error to -EBUSY (git-fixes). * iio: imu: inv_icm42600: fix spi burst write not supported (git-fixes). * iio: imu: inv_icm42600: switch timestamp type from int64_t __aligned(8) to aligned_s64 (stable-fixes). * iio: imu: inv_icm42600: use = { } instead of memset() (stable-fixes). * iio: light: Use aligned_s64 instead of open coding alignment (stable-fixes). * iio: light: as73211: Ensure buffer holes are zeroed (git-fixes). * iio: pressure: bmp280: Use IS_ERR() in bmp280_common_probe() (git-fixes). * iio: pressure: mprls0025pa: use aligned_s64 for timestamp (git-fixes). * iio: proximity: isl29501: fix buffered read on big-endian systems (git- fixes). * iio: temperature: maxim_thermocouple: use DMA-safe buffer for spi_read() (git-fixes). * iio: xilinx-ams: Fix AMS_ALARM_THR_DIRECT_MASK (git-fixes). * iio: xilinx-ams: Unmask interrupts after updating alarms (git-fixes). * integrity/platform_certs: Allow loading of keys in the static key management mode (jsc#PED-13345 jsc#PED-13343). * intel_idle: Provide the default enter_dead() handler (jsc#PED-13815). * intel_idle: Rescan "dead" SMT siblings during initialization (jsc#PED-13815). * intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815). * interconnect: qcom: sc8180x: specify num_nodes (git-fixes). * interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg (git- fixes). * io_uring/rw: do not mask in f_iocb_flags (jsc#PED-12882 bsc#1237542). Drop blacklisting. * io_uring: expose read/write attribute capability (jsc#PED-12882 bsc#1237542). * io_uring: fix potential page leak in io_sqe_buffer_register() (git-fixes). * iommu/amd: Enable PASID and ATS capabilities in the correct order (git- fixes). * iommu/amd: Fix alias device DTE setting (git-fixes). * iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes). * iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes). * iommu/arm-smmu-v3: Fix smmu_domain->nr_ats_masters decrement (git-fixes). * iommu/tegra241-cmdqv: Read SMMU IDR1.CMDQS instead of hardcoding (git- fixes). * iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes). * iommu/vt-d: Fix __domain_mapping()'s usage of switch_to_super_page() (git- fixes). * iommu/vt-d: Fix missing PASID in dev TLB flush with cache_tag_flush_all (git-fixes). * iommu/vt-d: Fix possible circular locking dependency (git-fixes). * iommu/vt-d: Fix system hang on reboot -f (git-fixes). * iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes). * iommu: Handle race with default domain setup (git-fixes). * iosys-map: Fix undefined behavior in iosys_map_clear() (git-fixes). * ipmi: Fix strcpy source and destination the same (stable-fixes). * ipmi: Use dev_warn_ratelimited() for incorrect message warnings (stable- fixes). * ipv6: annotate data-races around rt->fib6_nsiblings (git-fixes). * ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes). * ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes). * ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes). * ipvs: Fix clamp() of ip_vs_conn_tab on small memory systems (git-fixes). * irdma: free iwdev->rf after removing MSI-X (bsc#1247712). * isolcpus: add missing hunk back (bsc#1236897 bsc#1249206). * iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes). * ixgbe: fix ixgbe_orom_civd_info struct layout (bsc#1245410). * ixgbe: prevent from unwanted interface name changes (git-fixes). * ixgbe: xsk: resolve the negative overflow of budget in ixgbe_xmit_zc (git- fixes). * kABI fix after Add TDX support for vSphere (jsc#PED-13302). * kABI fix after KVM: SVM: Fix SNP AP destroy race with VMRUN (git-fixes). * kABI fix after KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * kABI fix after KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * kABI fix after vhost: Reintroduce kthread API and add mode selection (git- fixes). * kABI workaround for "drm/dp: Add an EDID quirk for the DPCD register access probe" (bsc#1248121). * kABI workaround for amd_sfh (git-fixes). * kABI workaround for drm_gem.h (git-fixes). * kABI workaround for struct mtk_base_afe changes (git-fixes). * kABI: Fix the module::name type in audit_context (git-fixes). * kABI: PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports (git- fixes). * kABI: arm64: ftrace: Restore struct mod_arch_specific layout (git-fixes). * kABI: fix for struct devlink_port_attrs: move new member to the end (git- fixes). * kABI: netfilter: supress warnings for nft_set_ops (git-fixes). * kABI: x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation (git- fixes). * kabi/severities: ignore kABI compatibility in iio inv_icm42600 drivers They are used only locally * kabi/severities: ignore two unused/dropped symbols from MEI * kabi: Hide adding of u64 to devlink_param_type (jsc#PED-12745). * kabi: Restore layout of parallel_data (bsc1248343). * kabi: restore layout of struct cgroup_rstat_cpu (bsc#1247963). * kasan: use vmalloc_dump_obj() for vmalloc error reports (git-fixes). * kbuild/modpost: Continue processing all unresolved symbols when KLP_SYM_RELA is found (bsc#1218644, bsc#1250655). * kbuild: rust: add rustc-min-version support function (git-fixes) * kernel-binary: Another installation ordering fix (bsc#1241353). * kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346) * kernel: globalize lookup_or_create_module_kobject() (stable-fixes). * kernel: param: rename locate_module_kobject (stable-fixes). * leds: flash: leds-qcom-flash: Fix registry access after re-bind (git-fixes). * leds: flash: leds-qcom-flash: Update torch current clamp setting (git- fixes). * leds: leds-lp50xx: Handle reg to get correct multi_index (stable-fixes). * leds: leds-lp55xx: Use correct address for memory programming (git-fixes). * lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly() (bsc#1236897). * libbpf: Add identical pointer detection to btf_dedup_is_equiv() (git-fixes). * libeth: move idpf_rx_csum_decoded and idpf_rx_extracted (jsc#PED-13728 jsc#PED-13762). * livepatch: Add stack_order sysfs attribute (poo#187320). * loop: use kiocb helpers to fix lockdep warning (git-fixes). * lpfc: do not use file->f_path.dentry for comparisons (bsc#1250519). * mISDN: Fix memory leak in dsp_hwec_enable() (git-fixes). * mISDN: hfcpci: Fix warning when deleting uninitialized timer (git-fixes). * mailbox: Not protect module_put with spin_lock_irqsave (stable-fixes). * mailbox: mtk-cmdq: Remove pm_runtime APIs from cmdq_mbox_send_data() (git- fixes). * mailbox: pcc: Always clear the platform ack interrupt first (stable-fixes). * mailbox: pcc: Fix the possible race in updation of chan_in_use flag (stable- fixes). * mailbox: pcc: Use acpi_os_ioremap() instead of ioremap() (stable-fixes). * mailbox: zynqmp-ipi: Fix SGI cleanup on unbind (git-fixes). * mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git- fixes). * mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git- fixes). * mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes). * maple_tree: fix MAPLE_PARENT_RANGE32 and parent pointer docs (git-fixes). * maple_tree: fix status setup on restore to active (git-fixes). * maple_tree: fix testing for 32 bit builds (git-fixes). * mctp: no longer rely on net->dev_index_head (git-fixes). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * md: allow removing faulty rdev during resync (git-fixes). * md: dm-zoned-target: Initialize return variable r to avoid uninitialized use (git-fixes). * md: make rdev_addable usable for rcu mode (git-fixes). * media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove (git-fixes). * media: cec: extron-da-hd-4k-plus: drop external-module make commands (git- fixes). * media: cx18: Add missing check after DMA map (git-fixes). * media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb() (stable-fixes). * media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar (stable-fixes). * media: gspca: Add bounds checking to firmware parser (git-fixes). * media: hi556: Fix reset GPIO timings (stable-fixes). * media: hi556: correct the test pattern configuration (git-fixes). * media: i2c: mt9v111: fix incorrect type for ret (git-fixes). * media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes). * media: imx: fix a potential memory leak in imx_media_csc_scaler_device_init() (git-fixes). * media: ipu-bridge: Add _HID for OV5670 (stable-fixes). * media: ipu6: isys: Use correct pads for xlate_streams() (git-fixes). * media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls (git-fixes). * media: lirc: Fix error handling in lirc_register() (git-fixes). * media: mc: Fix MUST_CONNECT handling for pads with no links (git-fixes). * media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval (git- fixes). * media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes). * media: pci: ivtv: Add missing check after DMA map (git-fixes). * media: pci: mg4b: fix uninitialized iio scan data (git-fixes). * media: pisp_be: Fix pm_runtime underrun in probe (git-fixes). * media: qcom: camss: cleanup media device allocated resource on error path (git-fixes). * media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git- fixes). * media: rc: fix races with imon_disconnect() (git-fixes). * media: rj54n1cb0c: Fix memleak in rj54n1_probe() (git-fixes). * media: s5p-mfc: remove an unused/uninitialized variable (git-fixes). * media: st-delta: avoid excessive stack usage (git-fixes). * media: tc358743: Check I2C succeeded during probe (stable-fixes). * media: tc358743: Increase FIFO trigger level to 374 (stable-fixes). * media: tc358743: Return an appropriate colorspace from tc358743_set_fmt (stable-fixes). * media: ti: j721e-csi2rx: Fix source subdev link creation (git-fixes). * media: ti: j721e-csi2rx: Use devm_of_platform_populate (git-fixes). * media: ti: j721e-csi2rx: fix list_del corruption (git-fixes). * media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes). * media: usb: hdpvr: disable zero-length read messages (stable-fixes). * media: usbtv: Lock resolution while streaming (git-fixes). * media: uvcvideo: Add quirk for HP Webcam HD 2300 (stable-fixes). * media: uvcvideo: Do not mark valid metadata as invalid (git-fixes). * media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git- fixes). * media: uvcvideo: Fix bandwidth issue for Alcor camera (stable-fixes). * media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID (git- fixes). * media: uvcvideo: Rollback non processed entities on error (git-fixes). * media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ control (stable-fixes). * media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free() (git-fixes). * media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes). * media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() (git-fixes). * media: v4l2: Add support for NV12M tiled variants to v4l2_format_info() (git-fixes). * media: venus: Add a check for packet size after reading from shared memory (git-fixes). * media: venus: Fix MSM8998 frequency table (git-fixes). * media: venus: Fix OOB read due to missing payload bound check (git-fixes). * media: venus: firmware: Use correct reset sequence for IRIS2 (git-fixes). * media: venus: hfi: explicitly release IRQ during teardown (git-fixes). * media: venus: protect against spurious interrupts during probe (git-fixes). * media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git- fixes). * media: verisilicon: Fix AV1 decoder clock frequency (git-fixes). * media: vivid: fix wrong pixel_array control size (git-fixes). * media: zoran: Remove zoran_fh structure (git-fixes). * mei: bus: Check for still connected devices in mei_cl_bus_dev_release() (stable-fixes). * mei: vsc: Destroy mutex after freeing the IRQ (git-fixes). * mei: vsc: Do not re-init VSC from mei_vsc_hw_reset() on stop (git-fixes). * mei: vsc: Drop unused vsc_tp_request_irq() and vsc_tp_free_irq() (stable- fixes). * mei: vsc: Event notifier fixes (git-fixes). * mei: vsc: Fix "BUG: Invalid wait context" lockdep error (git-fixes). * mei: vsc: Run event callback from a workqueue (git-fixes). * mei: vsc: Unset the event callback on remove and probe errors (git-fixes). * memory: mtk-smi: Add ostd setting for mt8186 (git-fixes). * memory: samsung: exynos-srom: Fix of_iomap leak in exynos_srom_probe (git- fixes). * memstick: Fix deadlock by moving removing flag earlier (git-fixes). * mfd: axp20x: Set explicit ID for AXP313 regulator (stable-fixes). * mfd: cros_ec: Separate charge-control probing from USB-PD (git-fixes). * mfd: exynos-lpass: Fix another error handling path in exynos_lpass_probe() (git-fixes). * mfd: rz-mtu3: Fix MTU5 NFCR register offset (git-fixes). * mfd: vexpress-sysreg: Check the return value of devm_gpiochip_add_data() (git-fixes). * microchip: lan865x: Fix LAN8651 autoloading (git-fixes). * microchip: lan865x: Fix module autoloading (git-fixes). * microchip: lan865x: fix missing Timer Increment config for Rev.B0/B1 (git- fixes). * microchip: lan865x: fix missing netif_start_queue() call on device open (git-fixes). * misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes). * misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes). * misc: fastrpc: Skip reference for DMA handles (git-fixes). * misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes). * misc: genwqe: Fix incorrect cmd field being reported in error (git-fixes). * misc: pci_endpoint_test: Fix 'irq_type' to convey the correct type (git- fixes). * misc: pci_endpoint_test: Give disabled BARs a distinct error code (stable- fixes). * misc: rtsx: usb: Ensure mmc child device is active when card is present (git-fixes). * mm/damon/core: avoid destroyed target reference from DAMOS quota (git- fixes). * mm/damon/core: prevent unnecessary overflow in damos_set_effective_quota() (git-fixes). * mm/damon/core: set quota->charged_from to jiffies at first charge window (git-fixes). * mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters() (git-fixes). * mm/damon/ops-common: ignore migration request to invalid nodes (git-fixes). * mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters() (git-fixes). * mm/damon/sysfs: fix use-after-free in state_show() (git-fixes). * mm/memory-failure: fix redundant updates for already poisoned pages (bsc#1250087). * mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd() (git-fixes) * mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE (git-fixes). * mm: close theoretical race where stale TLB entries could linger (git-fixes). * mm: fault in complete folios instead of individual pages for tmpfs (git- fixes). * mm: fix the inaccurate memory statistics issue for users (bsc#1244723). * mm: introduce and use {pgd,p4d}_populate_kernel() (git-fixes). * mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma (git- fixes). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting (bsc#1245630). * mm: memory-tiering: fix PGPROMOTE_CANDIDATE counting - kabi (bsc#1245630). * mm: move page table sync declarations to linux/pgtable.h (git-fixes). * mm: swap: fix potential buffer overflow in setup_clusters() (git-fixes). * mmc: core: Fix variable shadowing in mmc_route_rpmb_frames() (git-fixes). * mmc: mvsdio: Fix dma_unmap_sg() nents value (git-fixes). * mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode() (stable-fixes). * mmc: sdhci-cadence: add Mobileye eyeQ support (stable-fixes). * mmc: sdhci-msm: Ensure SD card power isn't ON when card removed (stable- fixes). * mmc: sdhci-of-arasan: Ensure CD logic stabilization before power-up (stable- fixes). * mmc: sdhci-of-arasan: Support for emmc hardware reset (stable-fixes). * mmc: sdhci-pci-gli: Add a new function to simplify the code (git-fixes). * mmc: sdhci-pci-gli: GL9763e: Mask the replay timer timeout of AER (git- fixes). * mmc: sdhci-pci-gli: GL9763e: Rename the gli_set_gl9763e() for consistency (git-fixes). * mmc: sdhci_am654: Disable HS400 for AM62P SR1.0 and SR1.1 (git-fixes). * module: Fix memory deallocation on error path in move_module() (git-fixes). * module: Prevent silent truncation of module name in delete_module(2) (git- fixes). * module: Remove unnecessary +1 from last_unloaded_module::name size (git- fixes). * module: Restore the moduleparam prefix length check (git-fixes). * most: core: Drop device reference after usage in get_channel() (git-fixes). * mptcp: fix spurious wake-up on under memory pressure (git-fixes). * mtd: fix possible integer overflow in erase_xfer() (git-fixes). * mtd: nand: raw: atmel: Respect tAR, tCLR in read setup timing (git-fixes). * mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes). * mtd: rawnand: atmel: Fix error handling path in atmel_nand_controller_add_nands (git-fixes). * mtd: rawnand: atmel: set pmecc data setup time (git-fixes). * mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes). * mtd: rawnand: omap2: fix device leak on probe failure (git-fixes). * mtd: rawnand: qcom: Fix last codeword read in qcom_param_page_type_exec() (git-fixes). * mtd: rawnand: renesas: Add missing check after DMA map (git-fixes). * mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes). * mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer (git- fixes). * mtd: rawnand: stm32_fmc2: fix ECC overwrite (git-fixes). * mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes). * mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER (git- fixes). * mtd: spinand: propagate spinand_wait() errors from spinand_write_page() (git-fixes). * mwl8k: Add missing check after DMA map (git-fixes). * neighbour: Fix null-ptr-deref in neigh_flush_dev() (git-fixes). * net/mlx5: Base ECVF devlink port attrs from 0 (git-fixes). * net/mlx5: CT: Use the correct counter offset (git-fixes). * net/mlx5: Check device memory pointer before usage (git-fixes). * net/mlx5: Correctly set gso_segs when LRO is used (git-fixes). * net/mlx5: Correctly set gso_size when LRO is used (git-fixes). * net/mlx5: E-Switch, Fix peer miss rules to use peer eswitch (git-fixes). * net/mlx5: Fix lockdep assertion on sync reset unload event (git-fixes). * net/mlx5: Fix memory leak in cmd_exec() (git-fixes). * net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow (git-fixes). * net/mlx5: HWS, Fix pattern destruction in mlx5hws_pat_get_pattern error path (git-fixes). * net/mlx5: HWS, fix bad parameter in CQ creation (git-fixes). * net/mlx5: Nack sync reset when SFs are present (git-fixes). * net/mlx5: Prevent flow steering mode changes in switchdev mode (git-fixes). * net/mlx5: Reload auxiliary drivers on fw_activate (git-fixes). * net/mlx5e: Add new prio for promiscuous mode (git-fixes). * net/mlx5e: Clear Read-Only port buffer size in PBMC before update (git- fixes). * net/mlx5e: Preserve shared buffer capacity during headroom updates (git- fixes). * net/mlx5e: Remove skb secpath if xfrm state is not found (git-fixes). * net/mlx5e: Set local Xoff after FW update (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon MTU set (git-fixes). * net/mlx5e: Update and set Xon/Xoff upon port speed set (git-fixes). * net/packet: fix a race in packet_set_ring() and packet_notifier() (git- fixes). * net/sched: Restrict conditions for adding duplicating netems to qdisc tree (git-fixes). * net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git- fixes). * net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in qfq_delete_class (git-fixes). * net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes). * net/smc: check sndbuf_space again after NOSPACE flag is set in smc_poll (git-fixes). * net: 802: LLC+SNAP OID:PID lookup on start of skb data (git-fixes). * net: dsa: restore dsa_software_vlan_untag() ability to operate on VLAN- untagged traffic (git-fixes). * net: dsa: tag_ocelot_8021q: fix broken reception (git-fixes). * net: hsr: fix fill_frame_info() regression vs VLAN packets (git-fixes). * net: hsr: fix hsr_init_sk() vs network/transport headers (git-fixes). * net: hv_netvsc: fix loss of early receive events from host during channel open (git-fixes). * net: ieee8021q: fix insufficient table-size assertion (stable-fixes). * net: llc: reset skb->transport_header (git-fixes). * net: mana: Add handler for hardware servicing events (bsc#1245730). * net: mana: Add speed support in mana_get_link_ksettings (bsc#1245726). * net: mana: Add support for net_shaper_ops (bsc#1245726). * net: mana: Allocate MSI-X vectors dynamically (bsc#1245457). * net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457). * net: mana: Expose additional hardware counters for drop and TC via ethtool (bsc#1245729). * net: mana: Fix build errors when CONFIG_NET_SHAPER is disabled (gix-fixes). * net: mana: Fix potential deadlocks in mana napi ops (bsc#1245726). * net: mana: Handle Reset Request from MANA NIC (bsc#1245728). * net: mana: Handle unsupported HWC commands (bsc#1245726). * net: mana: Set tx_packets to post gso processing packet count (bsc#1245731). * net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754). * net: mana: explain irq_setup() algorithm (bsc#1245457). * net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes). * net: mctp: handle skb cleanup on sock_queue failures (git-fixes). * net: mdio: mdio-bcm-unimac: Correct rate fallback logic (git-fixes). * net: nfc: nci: Add parameter validation for packet data (git-fixes). * net: page_pool: allow enabling recycling late, fix false positive warning (git-fixes). * net: phy: bcm54811: PHY initialization (stable-fixes). * net: phy: fix phy_uses_state_machine() (git-fixes). * net: phy: micrel: Add ksz9131_resume() (stable-fixes). * net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes). * net: phy: smsc: add proper reset flags for LAN8710A (stable-fixes). * net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer (git-fixes). * net: rose: convert 'use' field to refcount_t (git-fixes). * net: rose: fix a typo in rose_clear_routes() (git-fixes). * net: rose: include node references in rose_neigh refcount (git-fixes). * net: rose: split remove and free operations in rose_remove_neigh() (stable- fixes). * net: thunderbolt: Enable end-to-end flow control also in transmit (stable- fixes). * net: thunderbolt: Fix the parameter passing of tb_xdomain_enable_paths()/tb_xdomain_disable_paths() (stable-fixes). * net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast (git- fixes). * net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git- fixes). * net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization (git-fixes). * net: usb: asix_devices: add phy_mask for ax88772 mdio bus (git-fixes). * net: usb: cdc-ncm: check for filtering capability (git-fixes). * net: usb: qmi_wwan: add Telit Cinterion FN990A w/audio composition (stable- fixes). * net: usb: qmi_wwan: add Telit Cinterion LE910C4-WWX new compositions (git- fixes). * net: usb: qmi_wwan: fix Telit Cinterion FE990A name (stable-fixes). * net: usb: qmi_wwan: fix Telit Cinterion FN990A name (stable-fixes). * net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes). * net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes). * netfilter: ctnetlink: fix refcount leak on table dump (git-fixes). * netfilter: ctnetlink: remove refcounting in expectation dumpers (git-fixes). * netfilter: nf_conncount: garbage collection is not skipped when jiffies wrap around (git-fixes). * netfilter: nf_nat: also check reverse tuple to obtain clashing entry (git- fixes). * netfilter: nf_reject: do not leak dst refcount for loopback packets (git- fixes). * netfilter: nf_tables: Drop dead code from fill_*_info routines (git-fixes). * netfilter: nf_tables: adjust lockdep assertions handling (git-fixes). * netfilter: nf_tables: fix set size with rbtree backend (git-fixes). * netfilter: nf_tables: imbalance in flowtable binding (git-fixes). * netfilter: nft_ct: Use __refcount_inc() for per-CPU nft_ct_pcpu_template (git-fixes). * netfilter: nft_flow_offload: update tcp state flags under lock (git-fixes). * netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237). * netfilter: nft_set_hash: skip duplicated elements pending gc run (git- fixes). * netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext (git- fixes). * netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps (git-fixes). * netfilter: nft_tunnel: fix geneve_opt dump (git-fixes). * netfilter: xtables: support arpt_mark and ipv6 optstrip for iptables-nft only builds (git-fixes). * netlink: fix policy dump for int with validation callback (jsc#PED-13331). * netlink: specs: devlink: replace underscores with dashes in names (jsc#PED-13331). * netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes). * nfs/localio: add direct IO enablement with sync and async IO support (git- fixes). * nfs/localio: remove extra indirect nfs_to call to check {read,write}_iter (git-fixes). * nfsd: Fix NFSD_MAY_BYPASS_GSS and NFSD_MAY_BYPASS_GSS_ON_ROOT (git-fixes). * nfsd: fix access checking for NLM under XPRTSEC policies (git-fixes). * nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm() (git-fixes). * nouveau: fix disabling the nonstall irq due to storm code (git-fixes). * nvme-auth: update bi_directional flag (git-fixes). * nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500). * nvme-pci: try function level reset on init failure (git-fixes). * nvme-tcp: log TLS handshake failures at error level (git-fixes). * nvme-tcp: send only permitted commands for secure concat (git-fixes). * nvme: fix PI insert on write (git-fixes). * nvme: fix endianness of command word prints in nvme_log_err_passthru() (git- fixes). * nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list() (git-fixes). * nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes). * nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500). * nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500). * nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500). * nvmet-tcp: fix callback lock for TLS handshake (git-fixes). * nvmet: exit debugfs after discovery subsystem exits (git-fixes). * nvmet: initialize discovery subsys after debugfs is initialized (git-fixes). * nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails (git-fixes). * objtool, ASoC: codecs: wcd934x: Remove potential undefined behavior in wcd934x_slim_irq_handler() (stable-fixes). * objtool, lkdtm: Obfuscate the do_nothing() pointer (stable-fixes). * objtool, regulator: rk808: Remove potential undefined behavior in rk806_set_mode_dcdc() (stable-fixes). * of: dynamic: Fix memleak when of_pci_add_properties() failed (git-fixes). * of: dynamic: Fix use after free in of_changeset_add_prop_helper() (git- fixes). * of: resolver: Fix device node refcount leakage in of_resolve_phandles() (git-fixes). * of: resolver: Simplify of_resolve_phandles() using __free() (stable-fixes). * of: unittest: Fix device reference count leak in of_unittest_pci_node_verify (git-fixes). * of: unittest: Unlock on error in unittest_data_add() (git-fixes). * pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes). * pNFS: Fix disk addr range check in block/scsi layout (git-fixes). * pNFS: Fix stripe mapping in block/scsi layout (git-fixes). * pNFS: Fix uninited ptr deref in block/scsi layout (git-fixes). * pNFS: Handle RPC size limit for layoutcommits (git-fixes). * percpu: fix race on alloc failed warning limit (git-fixes). * perf bpf-event: Fix use-after-free in synthesis (git-fixes). * perf bpf-utils: Constify bpil_array_desc (git-fixes). * perf bpf-utils: Harden get_bpf_prog_info_linear (git-fixes). * perf dso: Add missed dso__put to dso__load_kcore (git-fixes). * perf hwmon_pmu: Avoid shortening hwmon PMU name (git-fixes). * perf parse-events: Set default GH modifier properly (git-fixes). * perf record: Cache build-ID of hit DSOs only (git-fixes). * perf sched: Fix memory leaks for evsel->priv in timehist (git-fixes). * perf sched: Fix memory leaks in 'perf sched latency' (git-fixes). * perf sched: Fix memory leaks in 'perf sched map' (git-fixes). * perf sched: Fix thread leaks in 'perf sched timehist' (git-fixes). * perf sched: Free thread->priv using priv_destructor (git-fixes). * perf sched: Make sure it frees the usage string (git-fixes). * perf sched: Use RC_CHK_EQUAL() to compare pointers (git-fixes). * perf symbol-minimal: Fix ehdr reading in filename__read_build_id (git- fixes). * perf test: Fix a build error in x86 topdown test (git-fixes). * perf tests bp_account: Fix leaked file descriptor (git-fixes). * perf tools: Remove libtraceevent in .gitignore (git-fixes). * perf topdown: Use attribute to see an event is a topdown metic or slots (git-fixes). * perf trace: Remove --map-dump documentation (git-fixes). * phy: fsl-imx8mq-usb: fix phy_tx_vboost_level_from_property() (git-fixes). * phy: mscc: Fix parsing of unicast frames (git-fixes). * phy: mscc: Fix timestamping for vsc8584 (git-fixes). * phy: qcom: phy-qcom-m31: Update IPQ5332 M31 USB phy initialization sequence (git-fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: Do not zero-out registers (git- fixes). * phy: qualcomm: phy-qcom-eusb2-repeater: fix override properties (git-fixes). * phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal (stable- fixes). * phy: rockchip: naneng-combphy: Enable U3 OTG port for RK3568 (git-fixes). * phy: rockchip: samsung-hdptx: Do no set rk_hdptx_phy->rate in case of errors (git-fixes). * phy: rockchip: samsung-hdptx: Fix clock ratio setup (git-fixes). * phy: tegra: xusb: fix device and OF node leak at probe (git-fixes). * phy: ti-pipe3: fix device leak at unbind (git-fixes). * phy: ti: omap-usb2: fix device leak at unbind (git-fixes). * pidfs: Fix memory leak in pidfd_info() (jsc#PED-13113). * pidfs: raise SB_I_NODEV and SB_I_NOEXEC (bsc#1249562). * pinctrl: STMFX: add missing HAS_IOMEM dependency (git-fixes). * pinctrl: berlin: fix memory leak in berlin_pinctrl_build_state() (git- fixes). * pinctrl: equilibrium: Remove redundant semicolons (git-fixes). * pinctrl: meson-gxl: add missing i2c_d pinmux (git-fixes). * pinctrl: renesas: Use int type to store negative error codes (git-fixes). * pinctrl: renesas: rzg2l: Fix invalid unsigned return in rzg3s_oen_read() (git-fixes). * pinctrl: samsung: Drop unused S3C24xx driver data (git-fixes). * pinctrl: stm32: Manage irq affinity settings (stable-fixes). * pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes). * pinmux: fix race causing mux_owner NULL with active mux_usecount (git- fixes). * platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git- fixes). * platform/chrome: cros_ec_sensorhub: Retries when a sensor is not ready (stable-fixes). * platform/chrome: cros_ec_typec: Defer probe on missing EC parent (stable- fixes). * platform/mellanox: mlxbf-pmc: Remove newline char from event name input (git-fixes). * platform/mellanox: mlxbf-pmc: Use kstrtobool() to check 0/1 input (git- fixes). * platform/mellanox: mlxbf-pmc: Validate event/enable input (git-fixes). * platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL (git-fixes). * platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes). * platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmc: Add TUXEDO IB Pro Gen10 AMD to spurious 8042 quirks list (stable-fixes). * platform/x86/amd/pmf: Support new ACPI ID AMDI0108 (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list (stable- fixes). * platform/x86/intel-uncore-freq: Check write blocked for ELC (git-fixes). * platform/x86/intel: power-domains: Use topology_logical_package_id() for package ID (git-fixes). * platform/x86: Fix initialization order for firmware_attributes_class (git- fixes). * platform/x86: asus-nb-wmi: add DMI quirk for ASUS Zenbook Duo UX8406CA (stable-fixes). * platform/x86: asus-wmi: Fix ROG button mapping, tablet mode on ASUS ROG Z13 (stable-fixes). * platform/x86: asus-wmi: Re-add extra keys to ignore_key_wlan quirk (git- fixes). * platform/x86: asus-wmi: Remove extra keys from ignore_key_wlan quirk (git- fixes). * platform/x86: ideapad-laptop: Fix FnLock not remembered among boots (git- fixes). * platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots (git-fixes). * platform/x86: lg-laptop: Fix WMAB call in fan_mode_store() (git-fixes). * pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop() (stable-fixes). * pm: cpupower: bench: Prevent NULL dereference on malloc failure (stable- fixes). * power: supply: bq27xxx: fix error return in case of no bq27000 hdq battery (git-fixes). * power: supply: bq27xxx: restrict no-battery detection to bq27000 (git- fixes). * power: supply: cpcap-charger: Fix null check for power_supply_get_by_name (git-fixes). * power: supply: cw2015: Fix a alignment coding style issue (git-fixes). * power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git- fixes). * power: supply: max77976_charger: fix constant current reporting (git-fixes). * power: supply: qcom_battmgr: Add lithium-polymer entry (stable-fixes). * powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git- fixes). * powerpc/eeh: Export eeh_unfreeze_pe() (bsc#1215199). * powerpc/eeh: Make EEH driver device hotplug safe (bsc#1215199). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (git- fixes). * powerpc/ftrace: ensure ftrace record ops are always set for NOPs (jsc#PED-10909 git-fixes). * powerpc/kernel: Fix ppc_save_regs inclusion in build (bsc#1215199). * powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199). * powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199). * powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199). * powerpc/pseries: Correct secvar format representation for static key management (jsc#PED-13345 jsc#PED-13343). * powerpc/secvar: Expose secvars relevant to the key management mode (jsc#PED-13345 jsc#PED-13343). * powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (jsc#PED-10909 git-fixes). * powerpc: do not build ppc_save_regs.o always (bsc#1215199). * powerpc: floppy: Add missing checks after DMA map (bsc#1215199). * pptp: fix pptp_xmit() error path (git-fixes). * printk: nbcon: Allow reacquire during panic (bsc#1246688). * psample: adjust size if rate_as_probability is set (git-fixes). * ptp: fix breakage after ptp_vclock_in_use() rework (git-fixes). * pwm: berlin: Fix wrong register in suspend/resume (git-fixes). * pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes). * pwm: mediatek: Fix duty and period setting (git-fixes). * pwm: mediatek: Handle hardware enable and clock enable separately (stable- fixes). * pwm: rockchip: Round period/duty down on apply, up on get (git-fixes). * pwm: tiehrpwm: Do not drop runtime PM reference in .free() (git-fixes). * pwm: tiehrpwm: Fix corner case in clock divisor calculation (git-fixes). * pwm: tiehrpwm: Fix various off-by-one errors in duty-cycle calculation (git- fixes). * pwm: tiehrpwm: Make code comment in .free() more useful (git-fixes). * r8169: add support for RTL8125D (stable-fixes). * r8169: disable RTL8126 ZRX-DC timeout (stable-fixes). * r8169: do not scan PHY addresses > 0 (stable-fixes). * rcu: Fix racy re-initialization of irq_work causing hangs (git-fixes) * regmap: Remove superfluous check for !config in __regmap_init() (git-fixes). * regulator: core: fix NULL dereference on unbind due to stale coupling data (stable-fixes). * regulator: scmi: Use int type to store negative error codes (git-fixes). * regulator: sy7636a: fix lifecycle of power good gpio (git-fixes). * reset: brcmstb: Enable reset drivers for ARCH_BCM2835 (stable-fixes). * reset: eyeq: fix OF node leak (git-fixes). * resource: Add resource set range and size helpers (jsc#PED-13728 jsc#PED-13762). * resource: fix false warning in __request_region() (git-fixes). * ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg() (git-fixes). * ring-buffer: Make reading page consistent with the code logic (git-fixes). * rpm/config.sh: SLFO 1.2 is now synced to OBS as well * rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes). * rtc: ds1307: handle oscillator stop flag (OSF) for ds1341 (stable-fixes). * rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe (stable- fixes). * rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes). * rtc: optee: fix memory leak on driver removal (git-fixes). * rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes). * rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes). * rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes). * rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes). * s390/ap: Unmask SLCF bit in card and queue ap functions sysfs (git-fixes bsc#1247837). * s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes bsc#1246868). * s390/cpum_cf: Deny all sampling events by counter PMU (git-fixes bsc#1249477). * s390/early: Copy last breaking event address to pt_regs (git-fixes bsc#1249061). * s390/hypfs: Avoid unnecessary ioctl registration in debugfs (bsc#1248727 git-fixes). * s390/hypfs: Enable limited access during lockdown (bsc#1248727 git-fixes). * s390/ism: fix concurrency management in ism_cmd() (git-fixes bsc#1247372). * s390/mm: Allocate page table with PAGE_SIZE granularity (git-fixes bsc#1247838). * s390/mm: Do not map lowcore with identity mapping (git-fixes bsc#1249066). * s390/mm: Remove possible false-positive warning in pte_free_defer() (git- fixes bsc#1247366). * s390/pai: Deny all events not handled by this PMU (git-fixes bsc#1249478). * s390/pci: Allow automatic recovery with minimal driver support (bsc#1248728 git-fixes). * s390/sclp: Fix SCCB present check (git-fixes bsc#1249065). * s390/stp: Remove udelay from stp_sync_clock() (git-fixes bsc#1249062). * s390/time: Use monotonic clock in get_cycles() (git-fixes bsc#1249064). * samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes). * samples: mei: Fix building on musl libc (git-fixes). * sched/deadline: Always stop dl-server before changing parameters (bsc#1247936). * sched/deadline: Do not count nr_running for dl_server proxy tasks (git- fixes, bsc#1247936). * sched/deadline: Fix RT task potential starvation when expiry time passed (git-fixes, bsc#1247936). * sched/deadline: Fix dl_server_stopped() (bsc#1247936). * sched/deadline: Initialize dl_servers after SMP (git-fixes) * sched_ext, sched/core: Do not call scx_group_set_weight() (git-fixes) * scsi: Revert "scsi: iscsi: Fix HW conn removal use after free" (git-fixes). * scsi: core: Fix kernel doc for scsi_track_queue_full() (git-fixes). * scsi: elx: efct: Fix dma_unmap_sg() nents value (git-fixes). * scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519). * scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value (git-fixes). * scsi: isci: Fix dma_unmap_sg() nents value (git-fixes). * scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519). * scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519). * scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519). * scsi: lpfc: Clean up extraneous phba dentries (bsc#1250519). * scsi: lpfc: Convert debugfs directory counts from atomic to unsigned int (bsc#1250519). * scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519). * scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519). * scsi: lpfc: Define size of debugfs entry for xri rebalancing (bsc#1250519). * scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519). * scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519). * scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519). * scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519). * scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519). * scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519). * scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519). * scsi: lpfc: Use int type to store negative error codes (bsc#1250519). * scsi: lpfc: Use switch case statements in DIF debugfs handlers (bsc#1250519). * scsi: lpfc: use min() to improve code (bsc#1250519). * scsi: mpi3mr: Event processing debug improvement (bsc#1251186). * scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251186). * scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251186). * scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251186). * scsi: mpi3mr: Fix kernel-doc issues in mpi3mr_app.c (git-fixes). * scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251186). * scsi: mpi3mr: Fix race between config read submit and interrupt completion (git-fixes). * scsi: mpi3mr: Serialize admin queue BAR writes on 32-bit systems (git- fixes). * scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251186). * scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251186). * scsi: mpt3sas: Fix a fw_event memory leak (git-fixes). * scsi: mvsas: Fix dma_unmap_sg() nents value (git-fixes). * scsi: qla2xxx: Avoid stack frame size warning in qla_dfs (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in START_SP_W_RETRIES() (git-fixes). * scsi: qla2xxx: Fix incorrect sign of error code in qla_nvme_xmt_ls_rsp() (git-fixes). * scsi: qla2xxx: Remove firmware URL (git-fixes). * scsi: qla2xxx: Use secs_to_jiffies() instead of msecs_to_jiffies() (git- fixes). * scsi: qla2xxx: edif: Fix incorrect sign of error code (git-fixes). * scsi: sd: Make sd shutdown issue START STOP UNIT appropriately (git-fixes). * scsi: smartpqi: Enhance WWID logging logic (bsc#1246631). * scsi: smartpqi: Take drives offline when controller is offline (bsc#1246631). * scsi: smartpqi: Update driver version to 2.1.34-035 (bsc#1246631). * scsi: ufs: Fix toggling of clk_gating.state when clock gating is not allowed (git-fixes). * scsi: ufs: Introduce quirk to extend PA_HIBERN8TIME for UFS devices (git- fixes). * scsi: ufs: bsg: Delete bsg_dev when setting up bsg fails (git-fixes). * scsi: ufs: core: Add missing post notify for power mode change (git-fixes). * scsi: ufs: core: Add ufshcd_send_bsg_uic_cmd() for UFS BSG (git-fixes). * scsi: ufs: core: Always initialize the UIC done completion (git-fixes). * scsi: ufs: core: Do not perform UFS clkscaling during host async scan (git- fixes). * scsi: ufs: core: Fix clk scaling to be conditional in reset and restore (git-fixes). * scsi: ufs: core: Fix error return with query response (git-fixes). * scsi: ufs: core: Fix spelling of a sysfs attribute name (git-fixes). * scsi: ufs: core: Fix ufshcd_is_ufs_dev_busy() and ufshcd_eh_timed_out() (git-fixes). * scsi: ufs: core: Honor runtime/system PM levels if set by host controller drivers (git-fixes). * scsi: ufs: core: Improve ufshcd_mcq_sq_cleanup() (git-fixes). * scsi: ufs: core: Introduce ufshcd_has_pending_tasks() (git-fixes). * scsi: ufs: core: Prepare to introduce a new clock_gating lock (git-fixes). * scsi: ufs: core: Remove redundant query_complete trace (git-fixes). * scsi: ufs: core: Set default runtime/system PM levels before ufshcd_hba_init() (git-fixes). * scsi: ufs: core: Update compl_time_stamp_local_clock after completing a cqe (git-fixes). * scsi: ufs: core: Use link recovery when h8 exit fails during runtime resume (git-fixes). * scsi: ufs: exynos: Add check inside exynos_ufs_config_smu() (git-fixes). * scsi: ufs: exynos: Add gs101_ufs_drv_init() hook and enable WriteBooster (git-fixes). * scsi: ufs: exynos: Enable PRDT pre-fetching with UFSHCD_CAP_CRYPTO (git- fixes). * scsi: ufs: exynos: Ensure consistent phy reference counts (git-fixes). * scsi: ufs: exynos: Ensure pre_link() executes before exynos_ufs_phy_init() (git-fixes). * scsi: ufs: exynos: Fix hibern8 notify callbacks (git-fixes). * scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (git-fixes). * scsi: ufs: exynos: Move UFS shareability value to drvdata (git-fixes). * scsi: ufs: exynos: Move phy calls to .exit() callback (git-fixes). * scsi: ufs: exynos: Remove empty drv_init method (git-fixes). * scsi: ufs: exynos: Remove superfluous function parameter (git-fixes). * scsi: ufs: exynos: gs101: Put UFS device in reset on .suspend() (git-fixes). * scsi: ufs: mcq: Delete ufshcd_release_scsi_cmd() in ufshcd_mcq_abort() (git- fixes). * scsi: ufs: pltfrm: Disable runtime PM during removal of glue drivers (git- fixes). * scsi: ufs: pltfrm: Drop PM runtime reference count after ufshcd_remove() (git-fixes). * scsi: ufs: qcom: Fix crypto key eviction (git-fixes). * scsi: ufs: qcom: fix dev reference leaked through of_qcom_ice_get (git- fixes). * scsi: ufs: ufs-pci: Fix default runtime and system PM levels (git-fixes). * scsi: ufs: ufs-pci: Fix hibernate state transition for Intel MTL-like host controllers (git-fixes). * seccomp: Fix a race with WAIT_KILLABLE_RECV if the tracer replies too fast (git-fixes bsc#1250671). * selftest/livepatch: Only run test-kprobe with CONFIG_KPROBES_ON_FTRACE (poo#187320). * selftests/cpufreq: Fix cpufreq basic read and update testcases (bsc#1250344). * selftests/livepatch: Ignore NO_SUPPORT line in dmesg (poo#187320). * selftests/livepatch: Replace hardcoded module name with variable in test- callbacks.sh (poo#187320). * selftests/run_kselftest.sh: Fix help string for --per-test-log (poo#187320). * selftests/run_kselftest.sh: Use readlink if realpath is not available (poo#187320). * selftests/tracing: Fix false failure of subsystem event test (git-fixes). * selftests: ALSA: fix memory leak in utimer test (git-fixes). * selftests: livepatch: add new ftrace helpers functions (poo#187320). * selftests: livepatch: add test cases of stack_order sysfs interface (poo#187320). * selftests: livepatch: handle PRINTK_CALLER in check_result() (poo#187320). * selftests: livepatch: rename KLP_SYSFS_DIR to SYSFS_KLP_DIR (poo#187320). * selftests: livepatch: save and restore kprobe state (poo#187320). * selftests: livepatch: test if ftrace can trace a livepatched function (poo#187320). * selftests: livepatch: test livepatching a kprobed function (poo#187320). * selftests: ncdevmem: Move ncdevmem under drivers/net/hw (poo#187443). * selinux: change security_compute_sid to return the ssid or tsid on match (git-fixes). * selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (stable- fixes). * serial: 8250: Touch watchdogs in write_atomic() (bsc#1246688). * serial: 8250: fix panic due to PSLVERR (git-fixes). * serial: max310x: Add error checking in probe() (git-fixes). * serial: sc16is7xx: fix bug in flow control levels init (git-fixes). * skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650). * slab: Decouple slab_debug and no_hash_pointers (bsc#1249022). * smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206). * smb: client: fix netns refcount leak after net_passive changes (git-fixes). * soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes). * soc/tegra: pmc: Ensure power-domains are in a known state (git-fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8183 probe failure (git- fixes). * soc: mediatek: mtk-svs: fix device leaks on mt8192 probe failure (git- fixes). * soc: qcom: QMI encoding/decoding for big endian (git-fixes). * soc: qcom: fix endianness for QMI header (git-fixes). * soc: qcom: mdt_loader: Actually use the e_phoff (stable-fixes). * soc: qcom: mdt_loader: Deal with zero e_shentsize (git-fixes). * soc: qcom: mdt_loader: Ensure we do not read past the ELF header (git- fixes). * soc: qcom: mdt_loader: Fix error return values in mdt_header_valid() (git- fixes). * soc: qcom: pmic_glink: fix OF node leak (git-fixes). * soc: qcom: rpmh-rsc: Add RSC version 4 support (stable-fixes). * soc: qcom: rpmh-rsc: Unconditionally clear _TRIGGER bit for TCS (git-fixes). * soundwire: Move handle_nested_irq outside of sdw_dev_lock (stable-fixes). * soundwire: amd: cancel pending slave status handling workqueue during remove sequence (stable-fixes). * soundwire: amd: fix for handling slave alerts after link is down (git- fixes). * soundwire: amd: serialize amd manager resume sequence during pm_prepare (stable-fixes). * soundwire: stream: restore params when prepare ports fail (git-fixes). * spi: bcm2835: Remove redundant semicolons (git-fixes). * spi: cadence-quadspi: Fix cqspi_setup_flash() (git-fixes). * spi: cadence-quadspi: Flush posted register writes before DAC access (git- fixes). * spi: cadence-quadspi: Flush posted register writes before INDAC access (git- fixes). * spi: cadence-quadspi: fix cleanup of rx_chan on failure paths (stable- fixes). * spi: cs42l43: Property entry should be a null-terminated array (bsc#1246979). * spi: fix return code when spi device has too many chipselects (git-fixes). * spi: mtk-snfi: Remove redundant semicolons (git-fixes). * spi: spi-fsl-lpspi: Clamp too high speed_hz (git-fixes). * spi: spi-fsl-lpspi: Clear status register after disabling the module (git- fixes). * spi: spi-fsl-lpspi: Fix transmissions when using CONT (git-fixes). * spi: spi-fsl-lpspi: Reset FIFO and disable module on transfer abort (git- fixes). * spi: spi-fsl-lpspi: Set correct chip-select polarity bit (git-fixes). * spi: stm32: Check for cfg availability in stm32_spi_probe (git-fixes). * sprintf.h requires stdarg.h (git-fixes). * sprintf.h: mask additional include (git-fixes). * squashfs: fix memory leak in squashfs_fill_super (git-fixes). * staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes). * staging: axis-fifo: fix maximum TX packet length check (git-fixes). * staging: axis-fifo: flush RX FIFO on read errors (git-fixes). * staging: axis-fifo: remove sysfs interface (git-fixes). * staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git- fixes). * staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int() (git-fixes). * staging: nvec: Fix incorrect null termination of battery manufacturer (git- fixes). * staging: vchiq_arm: Make vchiq_shutdown never fail (git-fixes). * struct cdc_ncm_ctx: move new member to end (git-fixes). * sunrpc: fix client side handling of tls alerts (git-fixes). * sunrpc: fix handling of server side tls alerts (git-fixes). * sunrpc: fix null pointer dereference on zero-length checksum (git-fixes). * sunvdc: Balance device refcount in vdc_port_mpgroup_check (git-fixes). * supported.conf: Mark ZL3073X modules supported * supported.conf: mark hyperv_drm as external * tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes). * tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650). * thermal/drivers/mediatek/lvts_thermal: Add lvts commands and their sizes to driver data (stable-fixes). * thermal/drivers/mediatek/lvts_thermal: Add mt7988 lvts commands (stable- fixes). * thermal/drivers/mediatek/lvts_thermal: Change lvts commands array to static const (stable-fixes). * thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when required (stable-fixes). * thermal/drivers/qcom/lmh: Add missing IRQ includes (git-fixes). * thermal: sysfs: Return ENODATA instead of EAGAIN for reads (stable-fixes). * thunderbolt: Compare HMAC values in constant time (git-fixes). * thunderbolt: Fix copy+paste error in match_service_id() (git-fixes). * tools/power turbostat: Clustered Uncore MHz counters should honor show/hide options (stable-fixes). * tools/power turbostat: Fix bogus SysWatt for forked program (git-fixes). * tools/power turbostat: Fix build with musl (stable-fixes). * tools/power turbostat: Handle cap_get_proc() ENOSYS (stable-fixes). * tools/power turbostat: Handle non-root legacy-uncore sysfs permissions (stable-fixes). * tools/resolve_btfids: Fix build when cross compiling kernel with clang (git- fixes). * tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes). * trace/fgraph: Fix error handling (git-fixes). * trace/ring-buffer: Do not use TP_printk() formatting for boot mapped buffers (git-fixes). * tracepoint: Print the function symbol when tracepoint_debug is set (jsc#PED-13631). * tracing/kprobe: Make trace_kprobe's module callback called after jump_label update (git-fixes). * tracing/kprobes: Fix to free objects when failed to copy a symbol (git- fixes). * tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes). * tracing: Fix filter string testing (git-fixes). * tracing: Fix using ret variable in tracing_set_tracer() (git-fixes). * tracing: Remove unneeded goto out logic (bsc#1249286). * tracing: Switch trace.c code over to use guard() (git-fixes). * tracing: Switch trace_events_hist.c code over to use guard() (git-fixes). * tracing: fprobe events: Fix possible UAF on modules (git-fixes). * tracing: tprobe-events: Fix leakage of module refcount (git-fixes). * tty: hvc_console: Call hvc_kick in hvc_write unconditionally (bsc#1230062). * tty: n_gsm: Do not block input queue by waiting MSC (git-fixes). * tty: serial: fix print format specifiers (stable-fixes). * ublk: sanity check add_dev input for underflow (git-fixes). * ublk: use vmalloc for ublk_device's __queues (git-fixes). * ucount: fix atomic_long_inc_below() argument type (git-fixes). * uio: uio_pdrv_genirq: Remove MODULE_DEVICE_TABLE (git-fixes). * usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init() (git-fixes). * usb: cdns3: cdnsp-pci: remove redundant pci_disable_device() call (git- fixes). * usb: core: Add 0x prefix to quirks debug output (stable-fixes). * usb: core: config: Prevent OOB read in SS endpoint companion parsing (stable-fixes). * usb: core: hcd: fix accessing unmapped memory in SINGLE_STEP_SET_FEATURE test (git-fixes). * usb: core: usb_submit_urb: downgrade type check (stable-fixes). * usb: dwc3: Ignore late xferNotReady event to prevent halt timeout (git- fixes). * usb: dwc3: Remove WARN_ON for device endpoint command timeouts (stable- fixes). * usb: dwc3: imx8mp: fix device leak at unbind (git-fixes). * usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes). * usb: dwc3: pci: add support for the Intel Wildcat Lake (stable-fixes). * usb: dwc3: qcom: Do not leave BCR asserted (git-fixes). * usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes). * usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: midi2: Fix MIDI2 IN EP max packet size (git-fixes). * usb: gadget: midi2: Fix missing UMP group attributes initialization (git- fixes). * usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes). * usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup (git- fixes). * usb: host: xhci-plat: fix incorrect type for of_match variable in xhci_plat_probe() (git-fixes). * usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes). * usb: misc: qcom_eud: Access EUD_MODE_MANAGER2 through secure calls (git- fixes). * usb: musb: omap2430: fix device leak at unbind (git-fixes). * usb: phy: twl6030: Fix incorrect type for ret (git-fixes). * usb: quirks: Add DELAY_INIT quick for another SanDisk 3.2Gen1 Flash Drive (stable-fixes). * usb: renesas-xhci: Fix External ROM access timeouts (git-fixes). * usb: storage: realtek_cr: Use correct byte order for bcs->Residue (git- fixes). * usb: typec: fusb302: cache PD RX state (git-fixes). * usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present (stable- fixes). * usb: typec: maxim_contaminant: disable low power mode when reading comparator values (git-fixes). * usb: typec: maxim_contaminant: re-enable cc toggle if cc is open and port is clean (git-fixes). * usb: typec: tcpm/tcpci_maxim: fix irq wake usage (stable-fixes). * usb: typec: tcpm: allow switching to mode accessory to mux properly (stable- fixes). * usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes). * usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git- fixes). * usb: typec: tcpm: properly deliver cable vdms to altmode drivers (git- fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: Update power_supply on power role change (git-fixes). * usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default (stable-fixes). * usb: typec: ucsi: yoga-c630: fix error and remove paths (git-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: Avoid showing errors during surprise removal (stable-fixes). * usb: xhci: Avoid showing warnings for dying controller (stable-fixes). * usb: xhci: Fix slot_id resource race conflict (git-fixes). * usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command (stable-fixes). * usb: xhci: print xhci->xhc_state when queue_command failed (stable-fixes). * use uniform permission checks for all mount propagation changes (git-fixes). * vdpa/mlx5: Fix needs_teardown flag calculation (git-fixes). * vdpa: Fix IDR memory leak in VDUSE module exit (git-fixes). * vhost-scsi: Fix log flooding with target does not exist errors (git-fixes). * vhost/net: Protect ubufs with rcu read lock in vhost_net_ubuf_put() (git- fixes). * vhost/vsock: Avoid allocating arbitrarily-sized SKBs (git-fixes). * vhost: Fix ioctl # for VHOST_[GS]ET_FORK_FROM_OWNER (git-fixes). * vhost: Reintroduce kthread API and add mode selection (git-fixes). * vhost: fail early when __vhost_add_used() fails (git-fixes). * virtchnl2: add flow steering support (jsc#PED-13728). * virtchnl2: rename enum virtchnl2_cap_rss (jsc#PED-13728). * virtchnl: add PTP virtchnl definitions (jsc#PED-13728 jsc#PED-13762). * virtio_net: Enforce minimum TX ring size for reliability (git-fixes). * virtio_ring: Fix error reporting in virtqueue_resize (git-fixes). * vmci: Prevent the dispatching of uninitialized payloads (git-fixes). * vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page (git-fixes). * vsock/virtio: Validate length in packet header before skb_put() (git-fixes). * vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes). * vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes). * watchdog: dw_wdt: Fix default timeout (stable-fixes). * watchdog: iTCO_wdt: Report error if timeout configuration fails (stable- fixes). * watchdog: mpc8xxx_wdt: Reload the watchdog timer when enabling the watchdog (git-fixes). * watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race condition (stable-fixes). * watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git- fixes). * wifi: ath10k: avoid unnecessary wait for service ready message (git-fixes). * wifi: ath10k: shutdown driver when hardware is unreliable (stable-fixes). * wifi: ath11k: HAL SRNG: do not deinitialize and re-initialize again (git- fixes). * wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes). * wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load() (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption (git-fixes). * wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath11k: fix group data packet drops during rekey (git-fixes). * wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask() (git-fixes). * wifi: ath11k: fix source ring-buffer corruption (git-fixes). * wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes). * wifi: ath12k: Add MODULE_FIRMWARE() entries (bsc#1250952). * wifi: ath12k: Add memset and update default rate value in wmi tx completion (stable-fixes). * wifi: ath12k: Correct tid cleanup when tid setup fails (stable-fixes). * wifi: ath12k: Decrement TID on RX peer frag setup error handling (stable- fixes). * wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0 (stable-fixes). * wifi: ath12k: Fix station association with MBSSID Non-TX BSS (stable-fixes). * wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type() (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption (git-fixes). * wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes). * wifi: ath12k: fix endianness handling while accessing wmi service bit (git- fixes). * wifi: ath12k: fix memory leak in ath12k_pci_remove() (stable-fixes). * wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (git-fixes). * wifi: ath12k: fix source ring-buffer corruption (git-fixes). * wifi: ath12k: fix the fetching of combined rssi (git-fixes). * wifi: ath12k: fix wrong handling of CCMP256 and GCMP ciphers (git-fixes). * wifi: ath12k: fix wrong logging ID used for CE (git-fixes). * wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE (git-fixes). * wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work (git-fixes). * wifi: brcmsmac: Remove const from tbl_ptr parameter in wlc_lcnphy_common_read_table() (git-fixes). * wifi: cfg80211: Fix interface type validation (stable-fixes). * wifi: cfg80211: fix use-after-free in cmp_bss() (git-fixes). * wifi: cfg80211: reject HTC bit for management frames (stable-fixes). * wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result() (git- fixes). * wifi: cw1200: cap SSID length in cw1200_do_join() (git-fixes). * wifi: iwlegacy: Check rate_idx range after addition (stable-fixes). * wifi: iwlwifi: Add missing firmware info for bz-b0-* models (bsc#1252084). * wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes). * wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes). * wifi: iwlwifi: Remove redundant header files (git-fixes). * wifi: iwlwifi: config: unify fw/pnvm MODULE_FIRMWARE (bsc#1252084). * wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd() (stable- fixes). * wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect (stable- fixes). * wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn (stable-fixes). * wifi: iwlwifi: mvm: fix scan request validation (stable-fixes). * wifi: iwlwifi: mvm: set gtk id also in older FWs (stable-fixes). * wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes). * wifi: iwlwifi: uefi: check DSM item validity (git-fixes). * wifi: libertas: cap SSID len in lbs_associate() (git-fixes). * wifi: mac80211: Check 802.11 encaps offloading in ieee80211_tx_h_select_key() (git-fixes). * wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes). * wifi: mac80211: Do not schedule stopped TXQs (git-fixes). * wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon() (git-fixes). * wifi: mac80211: avoid weird state in error path (stable-fixes). * wifi: mac80211: do not complete management TX on SAE commit (stable-fixes). * wifi: mac80211: do not unreserve never reserved chanctx (stable-fixes). * wifi: mac80211: fix Rx packet handling when pubsta information is not available (git-fixes). * wifi: mac80211: fix incorrect type for ret (stable-fixes). * wifi: mac80211: fix rx link assignment for non-MLO stations (stable-fixes). * wifi: mac80211: increase scan_ies_len for S1G (stable-fixes). * wifi: mac80211: reject TDLS operations when station is not associated (git- fixes). * wifi: mac80211: update radar_required in channel context after channel switch (stable-fixes). * wifi: mt76: fix linked list corruption (git-fixes). * wifi: mt76: fix potential memory leak in mt76_wmac_probe() (git-fixes). * wifi: mt76: free pending offchannel tx frames on wcid cleanup (git-fixes). * wifi: mt76: mt7915: fix mt7981 pre-calibration (git-fixes). * wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch (stable-fixes). * wifi: mt76: mt7925: adjust rm BSS flow to prevent next connection failure (git-fixes). * wifi: mt76: mt7925: fix locking in mt7925_change_vif_links() (git-fixes). * wifi: mt76: mt7925: fix the wrong bss cleanup for SAP (git-fixes). * wifi: mt76: mt7925u: use connac3 tx aggr check in tx complete (git-fixes). * wifi: mt76: mt7996: Convert mt7996_wed_rro_addr to LE (git-fixes). * wifi: mt76: mt7996: Fix RX packets configuration for primary WED device (git-fixes). * wifi: mt76: mt7996: Initialize hdr before passing to skb_put_data() (git- fixes). * wifi: mt76: prevent non-offchannel mgmt tx during scan/roc (git-fixes). * wifi: mwifiex: Initialize the chan_stats array to zero (git-fixes). * wifi: mwifiex: send world regulatory domain to driver (git-fixes). * wifi: nl80211: Set num_sub_specs before looping through sub_specs (git- fixes). * wifi: plfxlc: Fix error handling in usb driver probe (git-fixes). * wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes). * wifi: rtl8xxxu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtl8xxxu: Fix RX skb size for aggregation disabled (git-fixes). * wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc() (stable-fixes). * wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()` (stable-fixes). * wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes). * wifi: rtw88: Fix macid assigned to TDLS station (git-fixes). * wifi: rtw89: Fix rtw89_mac_power_switch() for USB (stable-fixes). * wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB (stable- fixes). * wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band (git-fixes). * wifi: rtw89: avoid circular locking dependency in ser_state_run() (git- fixes). * wifi: rtw89: scan abort when assign/unassign_vif (stable-fixes). * wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan mode (stable-fixes). * wifi: virt_wifi: Fix page fault on connect (stable-fixes). * wifi: wilc1000: avoid buffer overflow in WID string configuration (stable- fixes). * writeback: Avoid contention on wb->list_lock when switching inodes (bsc#1237776). * writeback: Avoid contention on wb->list_lock when switching inodes (kABI fixup) (bsc#1237776). * writeback: Avoid excessively long inode switching times (bsc#1237776). * writeback: Avoid softlockup when switching many inodes (bsc#1237776). * x86/CPU/AMD: Add CPUID faulting support (jsc#PED-13704). * x86/Kconfig: Add arch attack vector support (git-fixes). * x86/Kconfig: Always enable ARCH_SPARSEMEM_ENABLE (git-fixes). * x86/boot: Sanitize boot params before parsing command line (git-fixes). * x86/bugs: Add SRSO_MITIGATION_NOSMT (git-fixes). * x86/bugs: Add attack vector controls for BHI (git-fixes). * x86/bugs: Add attack vector controls for GDS (git-fixes). * x86/bugs: Add attack vector controls for ITS (git-fixes). * x86/bugs: Add attack vector controls for L1TF (git-fixes). * x86/bugs: Add attack vector controls for MDS (git-fixes). * x86/bugs: Add attack vector controls for MMIO (git-fixes). * x86/bugs: Add attack vector controls for RFDS (git-fixes). * x86/bugs: Add attack vector controls for SRBDS (git-fixes). * x86/bugs: Add attack vector controls for SRSO (git-fixes). * x86/bugs: Add attack vector controls for SSB (git-fixes). * x86/bugs: Add attack vector controls for TAA (git-fixes). * x86/bugs: Add attack vector controls for TSA (git-fixes). * x86/bugs: Add attack vector controls for retbleed (git-fixes). * x86/bugs: Add attack vector controls for spectre_v1 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2 (git-fixes). * x86/bugs: Add attack vector controls for spectre_v2_user (git-fixes). * x86/bugs: Allow ITS stuffing in eIBRS+retpoline mode also (git-fixes). * x86/bugs: Avoid AUTO after the select step in the retbleed mitigation (git- fixes). * x86/bugs: Avoid warning when overriding return thunk (git-fixes). * x86/bugs: Clean up SRSO microcode handling (git-fixes). * x86/bugs: Define attack vectors relevant for each bug (git-fixes). * x86/bugs: Fix GDS mitigation selecting when mitigation is off (git-fixes). * x86/bugs: Introduce cdt_possible() (git-fixes). * x86/bugs: Print enabled attack vectors (git-fixes). * x86/bugs: Remove its=stuff dependency on retbleed (git-fixes). * x86/bugs: Select best SRSO mitigation (git-fixes). * x86/bugs: Simplify the retbleed=stuff checks (git-fixes). * x86/bugs: Use IBPB for retbleed if used by SRSO (git-fixes). * x86/bugs: Use switch/case in its_apply_mitigation() (git-fixes). * x86/cacheinfo: Properly parse CPUID(0x80000005) L1d/L1i associativity (git- fixes). * x86/cacheinfo: Properly parse CPUID(0x80000006) L2/L3 associativity (git- fixes). * x86/cpu: Sanitize CPUID(0x80000000) output (git-fixes). * x86/entry: Fix ORC unwinder for PUSH_REGS with save_ret=1 (git-fixes). * x86/fpu/xstate: Fix inconsistencies in guest FPU xfeatures (git-fixes). * x86/fpu: Avoid copying dynamic FP state from init_task in arch_dup_task_struct() (git-fixes). * x86/fpu: Delay instruction pointer fixup until after warning (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/fpu: Fully optimize out WARN_ON_FPU() (git-fixes). * x86/fpu: Refactor xfeature bitmask update code for sigframe XSAVE (git- fixes). * x86/fred/signal: Prevent immediate repeat of single step trap on return from SIGTRAP handler (git-fixes). * x86/headers: Replace **ASSEMBLY** with **ASSEMBLER** in UAPI headers (git- fixes). * x86/locking: Use ALT_OUTPUT_SP() for percpu_{,try_}cmpxchg{64,128}_op() (git-fixes). * x86/mce/amd: Add default names for MCA banks and blocks (git-fixes). * x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes). * x86/mce: Ensure user polling settings are honored when restarting timer (git-fixes). * x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git- fixes). * x86/microcode/AMD: Handle the case of no BIOS microcode (git-fixes). * x86/microcode: Consolidate the loader enablement checking (git-fixes). * x86/microcode: Update the Intel processor flag scan check (git-fixes). * x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() (git-fixes). * x86/mm/pat: do not collapse pages without PSE set (git-fixes). * x86/nmi: Add an emergency handler in nmi_desc & use it in nmi_shootdown_cpus() (git-fixes). * x86/percpu: Disable named address spaces for UBSAN_BOOL with KASAN for GCC < 14.2 (git-fixes). * x86/pkeys: Simplify PKRU update in signal frame (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/pti: Add attack vector controls for PTI (git-fixes). * x86/rdrand: Disable RDSEED on AMD Cyan Skillfish (git-fixes). * x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815). * x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815). * x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815). * x86/smpboot: Fix INIT delay assignment for extended Intel Families (git- fixes). * x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815). * x86/traps: Initialize DR6 by writing its architectural reset value (git- fixes). * xen/gntdev: remove struct gntdev_copy_batch from stack (git-fixes). * xen/netfront: Fix TX response spurious interrupts (git-fixes). * xen: fix UAF in dmabuf_exp_from_pages() (git-fixes). * xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO (git-fixes). * xfs: change xfs_xattr_class from a TRACE_EVENT() to DECLARE_EVENT_CLASS() (git-fixes). * xfs: do not propagate ENODATA disk errors into xattr code (git-fixes). * xfs: fix scrub trace with null pointer in quotacheck (git-fixes). * xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure (git-fixes). * xfs: remove unused event xfs_alloc_near_error (git-fixes). * xfs: remove unused event xfs_alloc_near_nominleft (git-fixes). * xfs: remove unused event xfs_attr_node_removename (git-fixes). * xfs: remove unused event xfs_ioctl_clone (git-fixes). * xfs: remove unused event xfs_pagecache_inval (git-fixes). * xfs: remove unused event xlog_iclog_want_sync (git-fixes). * xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes). * xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes). * xfs: remove unused trace event xfs_discard_rtrelax (git-fixes). * xfs: remove unused trace event xfs_log_cil_return (git-fixes). * xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes). * xfs: remove unused xfs_attr events (git-fixes). * xfs: remove unused xfs_reflink_compare_extents events (git-fixes). * xfs: remove usused xfs_end_io_direct events (git-fixes). * xhci: dbc: Fix full DbC transfer ring after several reconnects (git-fixes). * xhci: dbc: decouple endpoint allocation from initialization (git-fixes). * xhci: fix memory leak regression when freeing xhci vdev devices depth first (git-fixes). * xirc2ps_cs: fix register access when enabling FullDuplex (git-fixes). * zram: permit only one post-processing operation at a time (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-50=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.12.0-160000.6.1 * kernel-syms-6.12.0-160000.6.1 * kernel-obs-build-debugsource-6.12.0-160000.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53164.html * https://www.suse.com/security/cve/CVE-2024-57891.html * https://www.suse.com/security/cve/CVE-2024-57951.html * https://www.suse.com/security/cve/CVE-2024-57952.html * https://www.suse.com/security/cve/CVE-2024-58090.html * https://www.suse.com/security/cve/CVE-2025-22034.html * https://www.suse.com/security/cve/CVE-2025-22077.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37821.html * https://www.suse.com/security/cve/CVE-2025-37849.html * https://www.suse.com/security/cve/CVE-2025-37856.html * https://www.suse.com/security/cve/CVE-2025-37861.html * https://www.suse.com/security/cve/CVE-2025-37864.html * https://www.suse.com/security/cve/CVE-2025-38006.html * https://www.suse.com/security/cve/CVE-2025-38008.html * https://www.suse.com/security/cve/CVE-2025-38019.html * https://www.suse.com/security/cve/CVE-2025-38034.html * https://www.suse.com/security/cve/CVE-2025-38038.html * https://www.suse.com/security/cve/CVE-2025-38052.html * https://www.suse.com/security/cve/CVE-2025-38058.html * https://www.suse.com/security/cve/CVE-2025-38062.html * https://www.suse.com/security/cve/CVE-2025-38075.html * https://www.suse.com/security/cve/CVE-2025-38087.html * https://www.suse.com/security/cve/CVE-2025-38088.html * https://www.suse.com/security/cve/CVE-2025-38089.html * https://www.suse.com/security/cve/CVE-2025-38090.html * https://www.suse.com/security/cve/CVE-2025-38091.html * https://www.suse.com/security/cve/CVE-2025-38095.html * https://www.suse.com/security/cve/CVE-2025-38096.html * https://www.suse.com/security/cve/CVE-2025-38098.html * https://www.suse.com/security/cve/CVE-2025-38099.html * https://www.suse.com/security/cve/CVE-2025-38101.html * https://www.suse.com/security/cve/CVE-2025-38102.html * https://www.suse.com/security/cve/CVE-2025-38103.html * https://www.suse.com/security/cve/CVE-2025-38106.html * https://www.suse.com/security/cve/CVE-2025-38107.html * https://www.suse.com/security/cve/CVE-2025-38108.html * https://www.suse.com/security/cve/CVE-2025-38109.html * https://www.suse.com/security/cve/CVE-2025-38110.html * https://www.suse.com/security/cve/CVE-2025-38111.html * https://www.suse.com/security/cve/CVE-2025-38112.html * https://www.suse.com/security/cve/CVE-2025-38113.html * https://www.suse.com/security/cve/CVE-2025-38114.html * https://www.suse.com/security/cve/CVE-2025-38117.html * https://www.suse.com/security/cve/CVE-2025-38118.html * https://www.suse.com/security/cve/CVE-2025-38119.html * https://www.suse.com/security/cve/CVE-2025-38120.html * https://www.suse.com/security/cve/CVE-2025-38122.html * https://www.suse.com/security/cve/CVE-2025-38123.html * https://www.suse.com/security/cve/CVE-2025-38124.html * https://www.suse.com/security/cve/CVE-2025-38125.html * https://www.suse.com/security/cve/CVE-2025-38127.html * https://www.suse.com/security/cve/CVE-2025-38128.html * https://www.suse.com/security/cve/CVE-2025-38129.html * https://www.suse.com/security/cve/CVE-2025-38134.html * https://www.suse.com/security/cve/CVE-2025-38135.html * https://www.suse.com/security/cve/CVE-2025-38136.html * https://www.suse.com/security/cve/CVE-2025-38137.html * https://www.suse.com/security/cve/CVE-2025-38138.html * https://www.suse.com/security/cve/CVE-2025-38140.html * https://www.suse.com/security/cve/CVE-2025-38141.html * https://www.suse.com/security/cve/CVE-2025-38142.html * https://www.suse.com/security/cve/CVE-2025-38143.html * https://www.suse.com/security/cve/CVE-2025-38145.html * https://www.suse.com/security/cve/CVE-2025-38146.html * https://www.suse.com/security/cve/CVE-2025-38148.html * https://www.suse.com/security/cve/CVE-2025-38149.html * https://www.suse.com/security/cve/CVE-2025-38151.html * https://www.suse.com/security/cve/CVE-2025-38153.html * https://www.suse.com/security/cve/CVE-2025-38154.html * https://www.suse.com/security/cve/CVE-2025-38155.html * https://www.suse.com/security/cve/CVE-2025-38156.html * https://www.suse.com/security/cve/CVE-2025-38157.html * https://www.suse.com/security/cve/CVE-2025-38159.html * https://www.suse.com/security/cve/CVE-2025-38160.html * https://www.suse.com/security/cve/CVE-2025-38161.html * https://www.suse.com/security/cve/CVE-2025-38165.html * https://www.suse.com/security/cve/CVE-2025-38168.html * https://www.suse.com/security/cve/CVE-2025-38169.html * https://www.suse.com/security/cve/CVE-2025-38170.html * https://www.suse.com/security/cve/CVE-2025-38172.html * https://www.suse.com/security/cve/CVE-2025-38173.html * https://www.suse.com/security/cve/CVE-2025-38174.html * https://www.suse.com/security/cve/CVE-2025-38177.html * https://www.suse.com/security/cve/CVE-2025-38180.html * https://www.suse.com/security/cve/CVE-2025-38181.html * https://www.suse.com/security/cve/CVE-2025-38182.html * https://www.suse.com/security/cve/CVE-2025-38184.html * https://www.suse.com/security/cve/CVE-2025-38185.html * https://www.suse.com/security/cve/CVE-2025-38186.html * https://www.suse.com/security/cve/CVE-2025-38188.html * https://www.suse.com/security/cve/CVE-2025-38189.html * https://www.suse.com/security/cve/CVE-2025-38190.html * https://www.suse.com/security/cve/CVE-2025-38193.html * https://www.suse.com/security/cve/CVE-2025-38197.html * https://www.suse.com/security/cve/CVE-2025-38198.html * https://www.suse.com/security/cve/CVE-2025-38201.html * https://www.suse.com/security/cve/CVE-2025-38205.html * https://www.suse.com/security/cve/CVE-2025-38208.html * https://www.suse.com/security/cve/CVE-2025-38209.html * https://www.suse.com/security/cve/CVE-2025-38211.html * https://www.suse.com/security/cve/CVE-2025-38213.html * https://www.suse.com/security/cve/CVE-2025-38214.html * https://www.suse.com/security/cve/CVE-2025-38215.html * https://www.suse.com/security/cve/CVE-2025-38216.html * https://www.suse.com/security/cve/CVE-2025-38217.html * https://www.suse.com/security/cve/CVE-2025-38220.html * https://www.suse.com/security/cve/CVE-2025-38222.html * https://www.suse.com/security/cve/CVE-2025-38224.html * https://www.suse.com/security/cve/CVE-2025-38225.html * https://www.suse.com/security/cve/CVE-2025-38226.html * https://www.suse.com/security/cve/CVE-2025-38227.html * https://www.suse.com/security/cve/CVE-2025-38228.html * https://www.suse.com/security/cve/CVE-2025-38229.html * https://www.suse.com/security/cve/CVE-2025-38231.html * https://www.suse.com/security/cve/CVE-2025-38232.html * https://www.suse.com/security/cve/CVE-2025-38233.html * https://www.suse.com/security/cve/CVE-2025-38234.html * https://www.suse.com/security/cve/CVE-2025-38242.html * https://www.suse.com/security/cve/CVE-2025-38244.html * https://www.suse.com/security/cve/CVE-2025-38245.html * https://www.suse.com/security/cve/CVE-2025-38246.html * https://www.suse.com/security/cve/CVE-2025-38249.html * https://www.suse.com/security/cve/CVE-2025-38251.html * https://www.suse.com/security/cve/CVE-2025-38253.html * https://www.suse.com/security/cve/CVE-2025-38255.html * https://www.suse.com/security/cve/CVE-2025-38256.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://www.suse.com/security/cve/CVE-2025-38258.html * https://www.suse.com/security/cve/CVE-2025-38259.html * https://www.suse.com/security/cve/CVE-2025-38263.html * https://www.suse.com/security/cve/CVE-2025-38265.html * https://www.suse.com/security/cve/CVE-2025-38267.html * https://www.suse.com/security/cve/CVE-2025-38268.html * https://www.suse.com/security/cve/CVE-2025-38270.html * https://www.suse.com/security/cve/CVE-2025-38272.html * https://www.suse.com/security/cve/CVE-2025-38273.html * https://www.suse.com/security/cve/CVE-2025-38274.html * https://www.suse.com/security/cve/CVE-2025-38275.html * https://www.suse.com/security/cve/CVE-2025-38277.html * https://www.suse.com/security/cve/CVE-2025-38278.html * https://www.suse.com/security/cve/CVE-2025-38286.html * https://www.suse.com/security/cve/CVE-2025-38287.html * https://www.suse.com/security/cve/CVE-2025-38288.html * https://www.suse.com/security/cve/CVE-2025-38289.html * https://www.suse.com/security/cve/CVE-2025-38290.html * https://www.suse.com/security/cve/CVE-2025-38291.html * https://www.suse.com/security/cve/CVE-2025-38292.html * https://www.suse.com/security/cve/CVE-2025-38293.html * https://www.suse.com/security/cve/CVE-2025-38299.html * https://www.suse.com/security/cve/CVE-2025-38300.html * https://www.suse.com/security/cve/CVE-2025-38301.html * https://www.suse.com/security/cve/CVE-2025-38302.html * https://www.suse.com/security/cve/CVE-2025-38303.html * https://www.suse.com/security/cve/CVE-2025-38304.html * https://www.suse.com/security/cve/CVE-2025-38305.html * https://www.suse.com/security/cve/CVE-2025-38306.html * https://www.suse.com/security/cve/CVE-2025-38307.html * https://www.suse.com/security/cve/CVE-2025-38311.html * https://www.suse.com/security/cve/CVE-2025-38312.html * https://www.suse.com/security/cve/CVE-2025-38313.html * https://www.suse.com/security/cve/CVE-2025-38315.html * https://www.suse.com/security/cve/CVE-2025-38317.html * https://www.suse.com/security/cve/CVE-2025-38318.html * https://www.suse.com/security/cve/CVE-2025-38319.html * https://www.suse.com/security/cve/CVE-2025-38322.html * https://www.suse.com/security/cve/CVE-2025-38323.html * https://www.suse.com/security/cve/CVE-2025-38326.html * https://www.suse.com/security/cve/CVE-2025-38332.html * https://www.suse.com/security/cve/CVE-2025-38335.html * https://www.suse.com/security/cve/CVE-2025-38336.html * https://www.suse.com/security/cve/CVE-2025-38337.html * https://www.suse.com/security/cve/CVE-2025-38338.html * https://www.suse.com/security/cve/CVE-2025-38339.html * https://www.suse.com/security/cve/CVE-2025-38341.html * https://www.suse.com/security/cve/CVE-2025-38342.html * https://www.suse.com/security/cve/CVE-2025-38343.html * https://www.suse.com/security/cve/CVE-2025-38344.html * https://www.suse.com/security/cve/CVE-2025-38345.html * https://www.suse.com/security/cve/CVE-2025-38348.html * https://www.suse.com/security/cve/CVE-2025-38349.html * https://www.suse.com/security/cve/CVE-2025-38350.html * https://www.suse.com/security/cve/CVE-2025-38351.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38353.html * https://www.suse.com/security/cve/CVE-2025-38354.html * https://www.suse.com/security/cve/CVE-2025-38355.html * https://www.suse.com/security/cve/CVE-2025-38356.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38360.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-38362.html * https://www.suse.com/security/cve/CVE-2025-38363.html * https://www.suse.com/security/cve/CVE-2025-38364.html * https://www.suse.com/security/cve/CVE-2025-38365.html * https://www.suse.com/security/cve/CVE-2025-38368.html * https://www.suse.com/security/cve/CVE-2025-38369.html * https://www.suse.com/security/cve/CVE-2025-38371.html * https://www.suse.com/security/cve/CVE-2025-38372.html * https://www.suse.com/security/cve/CVE-2025-38373.html * https://www.suse.com/security/cve/CVE-2025-38374.html * https://www.suse.com/security/cve/CVE-2025-38375.html * https://www.suse.com/security/cve/CVE-2025-38376.html * https://www.suse.com/security/cve/CVE-2025-38377.html * https://www.suse.com/security/cve/CVE-2025-38380.html * https://www.suse.com/security/cve/CVE-2025-38381.html * https://www.suse.com/security/cve/CVE-2025-38382.html * https://www.suse.com/security/cve/CVE-2025-38383.html * https://www.suse.com/security/cve/CVE-2025-38384.html * https://www.suse.com/security/cve/CVE-2025-38385.html * https://www.suse.com/security/cve/CVE-2025-38386.html * https://www.suse.com/security/cve/CVE-2025-38387.html * https://www.suse.com/security/cve/CVE-2025-38389.html * https://www.suse.com/security/cve/CVE-2025-38390.html * https://www.suse.com/security/cve/CVE-2025-38391.html * https://www.suse.com/security/cve/CVE-2025-38392.html * https://www.suse.com/security/cve/CVE-2025-38393.html * https://www.suse.com/security/cve/CVE-2025-38395.html * https://www.suse.com/security/cve/CVE-2025-38396.html * https://www.suse.com/security/cve/CVE-2025-38397.html * https://www.suse.com/security/cve/CVE-2025-38399.html * https://www.suse.com/security/cve/CVE-2025-38400.html * https://www.suse.com/security/cve/CVE-2025-38401.html * https://www.suse.com/security/cve/CVE-2025-38402.html * https://www.suse.com/security/cve/CVE-2025-38403.html * https://www.suse.com/security/cve/CVE-2025-38404.html * https://www.suse.com/security/cve/CVE-2025-38405.html * https://www.suse.com/security/cve/CVE-2025-38406.html * https://www.suse.com/security/cve/CVE-2025-38408.html * https://www.suse.com/security/cve/CVE-2025-38409.html * https://www.suse.com/security/cve/CVE-2025-38410.html * https://www.suse.com/security/cve/CVE-2025-38412.html * https://www.suse.com/security/cve/CVE-2025-38413.html * https://www.suse.com/security/cve/CVE-2025-38414.html * https://www.suse.com/security/cve/CVE-2025-38415.html * https://www.suse.com/security/cve/CVE-2025-38416.html * https://www.suse.com/security/cve/CVE-2025-38417.html * https://www.suse.com/security/cve/CVE-2025-38418.html * https://www.suse.com/security/cve/CVE-2025-38419.html * https://www.suse.com/security/cve/CVE-2025-38420.html * https://www.suse.com/security/cve/CVE-2025-38421.html * https://www.suse.com/security/cve/CVE-2025-38424.html * https://www.suse.com/security/cve/CVE-2025-38425.html * https://www.suse.com/security/cve/CVE-2025-38426.html * https://www.suse.com/security/cve/CVE-2025-38427.html * https://www.suse.com/security/cve/CVE-2025-38428.html * https://www.suse.com/security/cve/CVE-2025-38429.html * https://www.suse.com/security/cve/CVE-2025-38430.html * https://www.suse.com/security/cve/CVE-2025-38436.html * https://www.suse.com/security/cve/CVE-2025-38438.html * https://www.suse.com/security/cve/CVE-2025-38439.html * https://www.suse.com/security/cve/CVE-2025-38440.html * https://www.suse.com/security/cve/CVE-2025-38441.html * https://www.suse.com/security/cve/CVE-2025-38443.html * https://www.suse.com/security/cve/CVE-2025-38444.html * https://www.suse.com/security/cve/CVE-2025-38445.html * https://www.suse.com/security/cve/CVE-2025-38446.html * https://www.suse.com/security/cve/CVE-2025-38448.html * https://www.suse.com/security/cve/CVE-2025-38449.html * https://www.suse.com/security/cve/CVE-2025-38450.html * https://www.suse.com/security/cve/CVE-2025-38451.html * https://www.suse.com/security/cve/CVE-2025-38453.html * https://www.suse.com/security/cve/CVE-2025-38454.html * https://www.suse.com/security/cve/CVE-2025-38455.html * https://www.suse.com/security/cve/CVE-2025-38456.html * https://www.suse.com/security/cve/CVE-2025-38457.html * https://www.suse.com/security/cve/CVE-2025-38458.html * https://www.suse.com/security/cve/CVE-2025-38459.html * https://www.suse.com/security/cve/CVE-2025-38460.html * https://www.suse.com/security/cve/CVE-2025-38461.html * https://www.suse.com/security/cve/CVE-2025-38462.html * https://www.suse.com/security/cve/CVE-2025-38463.html * https://www.suse.com/security/cve/CVE-2025-38464.html * https://www.suse.com/security/cve/CVE-2025-38465.html * https://www.suse.com/security/cve/CVE-2025-38466.html * https://www.suse.com/security/cve/CVE-2025-38467.html * https://www.suse.com/security/cve/CVE-2025-38468.html * https://www.suse.com/security/cve/CVE-2025-38470.html * https://www.suse.com/security/cve/CVE-2025-38472.html * https://www.suse.com/security/cve/CVE-2025-38473.html * https://www.suse.com/security/cve/CVE-2025-38474.html * https://www.suse.com/security/cve/CVE-2025-38475.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38477.html * https://www.suse.com/security/cve/CVE-2025-38478.html * https://www.suse.com/security/cve/CVE-2025-38480.html * https://www.suse.com/security/cve/CVE-2025-38481.html * https://www.suse.com/security/cve/CVE-2025-38482.html * https://www.suse.com/security/cve/CVE-2025-38483.html * https://www.suse.com/security/cve/CVE-2025-38484.html * https://www.suse.com/security/cve/CVE-2025-38485.html * https://www.suse.com/security/cve/CVE-2025-38487.html * https://www.suse.com/security/cve/CVE-2025-38488.html * https://www.suse.com/security/cve/CVE-2025-38489.html * https://www.suse.com/security/cve/CVE-2025-38490.html * https://www.suse.com/security/cve/CVE-2025-38491.html * https://www.suse.com/security/cve/CVE-2025-38493.html * https://www.suse.com/security/cve/CVE-2025-38494.html * https://www.suse.com/security/cve/CVE-2025-38495.html * https://www.suse.com/security/cve/CVE-2025-38496.html * https://www.suse.com/security/cve/CVE-2025-38497.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38500.html * https://www.suse.com/security/cve/CVE-2025-38503.html * https://www.suse.com/security/cve/CVE-2025-38506.html * https://www.suse.com/security/cve/CVE-2025-38508.html * https://www.suse.com/security/cve/CVE-2025-38514.html * https://www.suse.com/security/cve/CVE-2025-38524.html * https://www.suse.com/security/cve/CVE-2025-38526.html * https://www.suse.com/security/cve/CVE-2025-38527.html * https://www.suse.com/security/cve/CVE-2025-38528.html * https://www.suse.com/security/cve/CVE-2025-38531.html * https://www.suse.com/security/cve/CVE-2025-38533.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38544.html * https://www.suse.com/security/cve/CVE-2025-38545.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38549.html * https://www.suse.com/security/cve/CVE-2025-38552.html * https://www.suse.com/security/cve/CVE-2025-38553.html * https://www.suse.com/security/cve/CVE-2025-38554.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38556.html * https://www.suse.com/security/cve/CVE-2025-38557.html * https://www.suse.com/security/cve/CVE-2025-38559.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38564.html * https://www.suse.com/security/cve/CVE-2025-38565.html * https://www.suse.com/security/cve/CVE-2025-38566.html * https://www.suse.com/security/cve/CVE-2025-38568.html * https://www.suse.com/security/cve/CVE-2025-38571.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38573.html * https://www.suse.com/security/cve/CVE-2025-38574.html * https://www.suse.com/security/cve/CVE-2025-38576.html * https://www.suse.com/security/cve/CVE-2025-38581.html * https://www.suse.com/security/cve/CVE-2025-38582.html * https://www.suse.com/security/cve/CVE-2025-38583.html * https://www.suse.com/security/cve/CVE-2025-38584.html * https://www.suse.com/security/cve/CVE-2025-38585.html * https://www.suse.com/security/cve/CVE-2025-38586.html * https://www.suse.com/security/cve/CVE-2025-38587.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38591.html * https://www.suse.com/security/cve/CVE-2025-38593.html * https://www.suse.com/security/cve/CVE-2025-38595.html * https://www.suse.com/security/cve/CVE-2025-38597.html * https://www.suse.com/security/cve/CVE-2025-38601.html * https://www.suse.com/security/cve/CVE-2025-38602.html * https://www.suse.com/security/cve/CVE-2025-38604.html * https://www.suse.com/security/cve/CVE-2025-38605.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38609.html * https://www.suse.com/security/cve/CVE-2025-38610.html * https://www.suse.com/security/cve/CVE-2025-38612.html * https://www.suse.com/security/cve/CVE-2025-38614.html * https://www.suse.com/security/cve/CVE-2025-38616.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38619.html * https://www.suse.com/security/cve/CVE-2025-38621.html * https://www.suse.com/security/cve/CVE-2025-38622.html * https://www.suse.com/security/cve/CVE-2025-38623.html * https://www.suse.com/security/cve/CVE-2025-38624.html * https://www.suse.com/security/cve/CVE-2025-38628.html * https://www.suse.com/security/cve/CVE-2025-38630.html * https://www.suse.com/security/cve/CVE-2025-38631.html * https://www.suse.com/security/cve/CVE-2025-38632.html * https://www.suse.com/security/cve/CVE-2025-38634.html * https://www.suse.com/security/cve/CVE-2025-38635.html * https://www.suse.com/security/cve/CVE-2025-38639.html * https://www.suse.com/security/cve/CVE-2025-38640.html * https://www.suse.com/security/cve/CVE-2025-38643.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://www.suse.com/security/cve/CVE-2025-38646.html * https://www.suse.com/security/cve/CVE-2025-38648.html * https://www.suse.com/security/cve/CVE-2025-38656.html * https://www.suse.com/security/cve/CVE-2025-38658.html * https://www.suse.com/security/cve/CVE-2025-38659.html * https://www.suse.com/security/cve/CVE-2025-38660.html * https://www.suse.com/security/cve/CVE-2025-38662.html * https://www.suse.com/security/cve/CVE-2025-38664.html * https://www.suse.com/security/cve/CVE-2025-38665.html * https://www.suse.com/security/cve/CVE-2025-38668.html * https://www.suse.com/security/cve/CVE-2025-38670.html * https://www.suse.com/security/cve/CVE-2025-38671.html * https://www.suse.com/security/cve/CVE-2025-38676.html * https://www.suse.com/security/cve/CVE-2025-38678.html * https://www.suse.com/security/cve/CVE-2025-38679.html * https://www.suse.com/security/cve/CVE-2025-38680.html * https://www.suse.com/security/cve/CVE-2025-38681.html * https://www.suse.com/security/cve/CVE-2025-38683.html * https://www.suse.com/security/cve/CVE-2025-38684.html * https://www.suse.com/security/cve/CVE-2025-38685.html * https://www.suse.com/security/cve/CVE-2025-38686.html * https://www.suse.com/security/cve/CVE-2025-38687.html * https://www.suse.com/security/cve/CVE-2025-38691.html * https://www.suse.com/security/cve/CVE-2025-38692.html * https://www.suse.com/security/cve/CVE-2025-38693.html * https://www.suse.com/security/cve/CVE-2025-38694.html * https://www.suse.com/security/cve/CVE-2025-38695.html * https://www.suse.com/security/cve/CVE-2025-38700.html * https://www.suse.com/security/cve/CVE-2025-38701.html * https://www.suse.com/security/cve/CVE-2025-38702.html * https://www.suse.com/security/cve/CVE-2025-38703.html * https://www.suse.com/security/cve/CVE-2025-38705.html * https://www.suse.com/security/cve/CVE-2025-38706.html * https://www.suse.com/security/cve/CVE-2025-38709.html * https://www.suse.com/security/cve/CVE-2025-38710.html * https://www.suse.com/security/cve/CVE-2025-38717.html * https://www.suse.com/security/cve/CVE-2025-38721.html * https://www.suse.com/security/cve/CVE-2025-38722.html * https://www.suse.com/security/cve/CVE-2025-38724.html * https://www.suse.com/security/cve/CVE-2025-38725.html * https://www.suse.com/security/cve/CVE-2025-38727.html * https://www.suse.com/security/cve/CVE-2025-38729.html * https://www.suse.com/security/cve/CVE-2025-38730.html * https://www.suse.com/security/cve/CVE-2025-38732.html * https://www.suse.com/security/cve/CVE-2025-38733.html * https://www.suse.com/security/cve/CVE-2025-38734.html * https://www.suse.com/security/cve/CVE-2025-38735.html * https://www.suse.com/security/cve/CVE-2025-38736.html * https://www.suse.com/security/cve/CVE-2025-39673.html * https://www.suse.com/security/cve/CVE-2025-39675.html * https://www.suse.com/security/cve/CVE-2025-39677.html * https://www.suse.com/security/cve/CVE-2025-39678.html * https://www.suse.com/security/cve/CVE-2025-39679.html * https://www.suse.com/security/cve/CVE-2025-39681.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-39683.html * https://www.suse.com/security/cve/CVE-2025-39684.html * https://www.suse.com/security/cve/CVE-2025-39685.html * https://www.suse.com/security/cve/CVE-2025-39686.html * https://www.suse.com/security/cve/CVE-2025-39687.html * https://www.suse.com/security/cve/CVE-2025-39691.html * https://www.suse.com/security/cve/CVE-2025-39693.html * https://www.suse.com/security/cve/CVE-2025-39694.html * https://www.suse.com/security/cve/CVE-2025-39695.html * https://www.suse.com/security/cve/CVE-2025-39697.html * https://www.suse.com/security/cve/CVE-2025-39698.html * https://www.suse.com/security/cve/CVE-2025-39700.html * https://www.suse.com/security/cve/CVE-2025-39701.html * https://www.suse.com/security/cve/CVE-2025-39703.html * https://www.suse.com/security/cve/CVE-2025-39705.html * https://www.suse.com/security/cve/CVE-2025-39706.html * https://www.suse.com/security/cve/CVE-2025-39707.html * https://www.suse.com/security/cve/CVE-2025-39709.html * https://www.suse.com/security/cve/CVE-2025-39710.html * https://www.suse.com/security/cve/CVE-2025-39711.html * https://www.suse.com/security/cve/CVE-2025-39712.html * https://www.suse.com/security/cve/CVE-2025-39713.html * https://www.suse.com/security/cve/CVE-2025-39714.html * https://www.suse.com/security/cve/CVE-2025-39718.html * https://www.suse.com/security/cve/CVE-2025-39719.html * https://www.suse.com/security/cve/CVE-2025-39721.html * https://www.suse.com/security/cve/CVE-2025-39722.html * https://www.suse.com/security/cve/CVE-2025-39723.html * https://www.suse.com/security/cve/CVE-2025-39724.html * https://www.suse.com/security/cve/CVE-2025-39726.html * https://www.suse.com/security/cve/CVE-2025-39727.html * https://www.suse.com/security/cve/CVE-2025-39730.html * https://www.suse.com/security/cve/CVE-2025-39732.html * https://www.suse.com/security/cve/CVE-2025-39738.html * https://www.suse.com/security/cve/CVE-2025-39739.html * https://www.suse.com/security/cve/CVE-2025-39742.html * https://www.suse.com/security/cve/CVE-2025-39744.html * https://www.suse.com/security/cve/CVE-2025-39746.html * https://www.suse.com/security/cve/CVE-2025-39747.html * https://www.suse.com/security/cve/CVE-2025-39748.html * https://www.suse.com/security/cve/CVE-2025-39749.html * https://www.suse.com/security/cve/CVE-2025-39750.html * https://www.suse.com/security/cve/CVE-2025-39751.html * https://www.suse.com/security/cve/CVE-2025-39754.html * https://www.suse.com/security/cve/CVE-2025-39757.html * https://www.suse.com/security/cve/CVE-2025-39758.html * https://www.suse.com/security/cve/CVE-2025-39759.html * https://www.suse.com/security/cve/CVE-2025-39760.html * https://www.suse.com/security/cve/CVE-2025-39761.html * https://www.suse.com/security/cve/CVE-2025-39763.html * https://www.suse.com/security/cve/CVE-2025-39764.html * https://www.suse.com/security/cve/CVE-2025-39765.html * https://www.suse.com/security/cve/CVE-2025-39766.html * https://www.suse.com/security/cve/CVE-2025-39770.html * https://www.suse.com/security/cve/CVE-2025-39772.html * https://www.suse.com/security/cve/CVE-2025-39773.html * https://www.suse.com/security/cve/CVE-2025-39775.html * https://www.suse.com/security/cve/CVE-2025-39782.html * https://www.suse.com/security/cve/CVE-2025-39783.html * https://www.suse.com/security/cve/CVE-2025-39787.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39790.html * https://www.suse.com/security/cve/CVE-2025-39791.html * https://www.suse.com/security/cve/CVE-2025-39792.html * https://www.suse.com/security/cve/CVE-2025-39797.html * https://www.suse.com/security/cve/CVE-2025-39798.html * https://www.suse.com/security/cve/CVE-2025-39800.html * https://www.suse.com/security/cve/CVE-2025-39801.html * https://www.suse.com/security/cve/CVE-2025-39806.html * https://www.suse.com/security/cve/CVE-2025-39807.html * https://www.suse.com/security/cve/CVE-2025-39808.html * https://www.suse.com/security/cve/CVE-2025-39810.html * https://www.suse.com/security/cve/CVE-2025-39811.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39816.html * https://www.suse.com/security/cve/CVE-2025-39823.html * https://www.suse.com/security/cve/CVE-2025-39824.html * https://www.suse.com/security/cve/CVE-2025-39825.html * https://www.suse.com/security/cve/CVE-2025-39826.html * https://www.suse.com/security/cve/CVE-2025-39827.html * https://www.suse.com/security/cve/CVE-2025-39828.html * https://www.suse.com/security/cve/CVE-2025-39830.html * https://www.suse.com/security/cve/CVE-2025-39832.html * https://www.suse.com/security/cve/CVE-2025-39833.html * https://www.suse.com/security/cve/CVE-2025-39834.html * https://www.suse.com/security/cve/CVE-2025-39835.html * https://www.suse.com/security/cve/CVE-2025-39836.html * https://www.suse.com/security/cve/CVE-2025-39838.html * https://www.suse.com/security/cve/CVE-2025-39839.html * https://www.suse.com/security/cve/CVE-2025-39841.html * https://www.suse.com/security/cve/CVE-2025-39842.html * https://www.suse.com/security/cve/CVE-2025-39844.html * https://www.suse.com/security/cve/CVE-2025-39845.html * https://www.suse.com/security/cve/CVE-2025-39847.html * https://www.suse.com/security/cve/CVE-2025-39848.html * https://www.suse.com/security/cve/CVE-2025-39849.html * https://www.suse.com/security/cve/CVE-2025-39850.html * https://www.suse.com/security/cve/CVE-2025-39851.html * https://www.suse.com/security/cve/CVE-2025-39852.html * https://www.suse.com/security/cve/CVE-2025-39853.html * https://www.suse.com/security/cve/CVE-2025-39854.html * https://www.suse.com/security/cve/CVE-2025-39857.html * https://www.suse.com/security/cve/CVE-2025-39860.html * https://www.suse.com/security/cve/CVE-2025-39861.html * https://www.suse.com/security/cve/CVE-2025-39863.html * https://www.suse.com/security/cve/CVE-2025-39864.html * https://www.suse.com/security/cve/CVE-2025-39865.html * https://www.suse.com/security/cve/CVE-2025-39869.html * https://www.suse.com/security/cve/CVE-2025-39870.html * https://www.suse.com/security/cve/CVE-2025-39871.html * https://www.suse.com/security/cve/CVE-2025-39873.html * https://www.suse.com/security/cve/CVE-2025-39875.html * https://www.suse.com/security/cve/CVE-2025-39877.html * https://www.suse.com/security/cve/CVE-2025-39882.html * https://www.suse.com/security/cve/CVE-2025-39884.html * https://www.suse.com/security/cve/CVE-2025-39885.html * https://www.suse.com/security/cve/CVE-2025-39889.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39891.html * https://www.suse.com/security/cve/CVE-2025-39896.html * https://www.suse.com/security/cve/CVE-2025-39898.html * https://www.suse.com/security/cve/CVE-2025-39899.html * https://www.suse.com/security/cve/CVE-2025-39900.html * https://www.suse.com/security/cve/CVE-2025-39902.html * https://www.suse.com/security/cve/CVE-2025-39907.html * https://www.suse.com/security/cve/CVE-2025-39909.html * https://www.suse.com/security/cve/CVE-2025-39916.html * https://www.suse.com/security/cve/CVE-2025-39918.html * https://www.suse.com/security/cve/CVE-2025-39922.html * https://www.suse.com/security/cve/CVE-2025-39923.html * https://www.suse.com/security/cve/CVE-2025-39925.html * https://www.suse.com/security/cve/CVE-2025-39926.html * https://www.suse.com/security/cve/CVE-2025-39931.html * https://www.suse.com/security/cve/CVE-2025-39934.html * https://www.suse.com/security/cve/CVE-2025-39937.html * https://www.suse.com/security/cve/CVE-2025-39938.html * https://www.suse.com/security/cve/CVE-2025-39945.html * https://www.suse.com/security/cve/CVE-2025-39946.html * https://www.suse.com/security/cve/CVE-2025-39952.html * https://www.suse.com/security/cve/CVE-2025-39957.html * https://www.suse.com/security/cve/CVE-2025-40300.html * https://www.suse.com/security/cve/CVE-2026-38264.html * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1218644 * https://bugzilla.suse.com/show_bug.cgi?id=1230062 * https://bugzilla.suse.com/show_bug.cgi?id=1234634 * https://bugzilla.suse.com/show_bug.cgi?id=1234693 * https://bugzilla.suse.com/show_bug.cgi?id=1234863 * https://bugzilla.suse.com/show_bug.cgi?id=1235953 * https://bugzilla.suse.com/show_bug.cgi?id=1236897 * https://bugzilla.suse.com/show_bug.cgi?id=1237108 * https://bugzilla.suse.com/show_bug.cgi?id=1237131 * https://bugzilla.suse.com/show_bug.cgi?id=1237542 * https://bugzilla.suse.com/show_bug.cgi?id=1237776 * https://bugzilla.suse.com/show_bug.cgi?id=1238972 * https://bugzilla.suse.com/show_bug.cgi?id=1239206 * https://bugzilla.suse.com/show_bug.cgi?id=1240324 * https://bugzilla.suse.com/show_bug.cgi?id=1240696 * https://bugzilla.suse.com/show_bug.cgi?id=1240966 * https://bugzilla.suse.com/show_bug.cgi?id=1240998 * https://bugzilla.suse.com/show_bug.cgi?id=1241166 * https://bugzilla.suse.com/show_bug.cgi?id=1241353 * https://bugzilla.suse.com/show_bug.cgi?id=1241403 * https://bugzilla.suse.com/show_bug.cgi?id=1241435 * https://bugzilla.suse.com/show_bug.cgi?id=1242034 * https://bugzilla.suse.com/show_bug.cgi?id=1242086 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242864 * https://bugzilla.suse.com/show_bug.cgi?id=1242965 * https://bugzilla.suse.com/show_bug.cgi?id=1242995 * https://bugzilla.suse.com/show_bug.cgi?id=1243000 * https://bugzilla.suse.com/show_bug.cgi?id=1243055 * https://bugzilla.suse.com/show_bug.cgi?id=1243068 * https://bugzilla.suse.com/show_bug.cgi?id=1243100 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1243774 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244723 * https://bugzilla.suse.com/show_bug.cgi?id=1244734 * https://bugzilla.suse.com/show_bug.cgi?id=1244749 * https://bugzilla.suse.com/show_bug.cgi?id=1244792 * https://bugzilla.suse.com/show_bug.cgi?id=1244812 * https://bugzilla.suse.com/show_bug.cgi?id=1244930 * https://bugzilla.suse.com/show_bug.cgi?id=1244939 * https://bugzilla.suse.com/show_bug.cgi?id=1245000 * https://bugzilla.suse.com/show_bug.cgi?id=1245151 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245206 * https://bugzilla.suse.com/show_bug.cgi?id=1245216 * https://bugzilla.suse.com/show_bug.cgi?id=1245260 * https://bugzilla.suse.com/show_bug.cgi?id=1245410 * https://bugzilla.suse.com/show_bug.cgi?id=1245457 * https://bugzilla.suse.com/show_bug.cgi?id=1245504 * https://bugzilla.suse.com/show_bug.cgi?id=1245506 * https://bugzilla.suse.com/show_bug.cgi?id=1245508 * https://bugzilla.suse.com/show_bug.cgi?id=1245510 * https://bugzilla.suse.com/show_bug.cgi?id=1245596 * https://bugzilla.suse.com/show_bug.cgi?id=1245621 * https://bugzilla.suse.com/show_bug.cgi?id=1245630 * https://bugzilla.suse.com/show_bug.cgi?id=1245654 * https://bugzilla.suse.com/show_bug.cgi?id=1245657 * https://bugzilla.suse.com/show_bug.cgi?id=1245658 * https://bugzilla.suse.com/show_bug.cgi?id=1245659 * https://bugzilla.suse.com/show_bug.cgi?id=1245663 * https://bugzilla.suse.com/show_bug.cgi?id=1245664 * https://bugzilla.suse.com/show_bug.cgi?id=1245665 * https://bugzilla.suse.com/show_bug.cgi?id=1245666 * https://bugzilla.suse.com/show_bug.cgi?id=1245668 * https://bugzilla.suse.com/show_bug.cgi?id=1245669 * https://bugzilla.suse.com/show_bug.cgi?id=1245670 * https://bugzilla.suse.com/show_bug.cgi?id=1245671 * https://bugzilla.suse.com/show_bug.cgi?id=1245675 * https://bugzilla.suse.com/show_bug.cgi?id=1245676 * https://bugzilla.suse.com/show_bug.cgi?id=1245678 * https://bugzilla.suse.com/show_bug.cgi?id=1245683 * https://bugzilla.suse.com/show_bug.cgi?id=1245684 * https://bugzilla.suse.com/show_bug.cgi?id=1245686 * https://bugzilla.suse.com/show_bug.cgi?id=1245688 * https://bugzilla.suse.com/show_bug.cgi?id=1245690 * https://bugzilla.suse.com/show_bug.cgi?id=1245691 * https://bugzilla.suse.com/show_bug.cgi?id=1245695 * https://bugzilla.suse.com/show_bug.cgi?id=1245700 * https://bugzilla.suse.com/show_bug.cgi?id=1245703 * https://bugzilla.suse.com/show_bug.cgi?id=1245705 * https://bugzilla.suse.com/show_bug.cgi?id=1245710 * https://bugzilla.suse.com/show_bug.cgi?id=1245711 * https://bugzilla.suse.com/show_bug.cgi?id=1245713 * https://bugzilla.suse.com/show_bug.cgi?id=1245714 * https://bugzilla.suse.com/show_bug.cgi?id=1245715 * https://bugzilla.suse.com/show_bug.cgi?id=1245717 * https://bugzilla.suse.com/show_bug.cgi?id=1245719 * https://bugzilla.suse.com/show_bug.cgi?id=1245721 * https://bugzilla.suse.com/show_bug.cgi?id=1245723 * https://bugzilla.suse.com/show_bug.cgi?id=1245726 * https://bugzilla.suse.com/show_bug.cgi?id=1245728 * https://bugzilla.suse.com/show_bug.cgi?id=1245729 * https://bugzilla.suse.com/show_bug.cgi?id=1245730 * https://bugzilla.suse.com/show_bug.cgi?id=1245731 * https://bugzilla.suse.com/show_bug.cgi?id=1245735 * https://bugzilla.suse.com/show_bug.cgi?id=1245737 * https://bugzilla.suse.com/show_bug.cgi?id=1245744 * https://bugzilla.suse.com/show_bug.cgi?id=1245745 * https://bugzilla.suse.com/show_bug.cgi?id=1245746 * https://bugzilla.suse.com/show_bug.cgi?id=1245747 * https://bugzilla.suse.com/show_bug.cgi?id=1245748 * https://bugzilla.suse.com/show_bug.cgi?id=1245749 * https://bugzilla.suse.com/show_bug.cgi?id=1245751 * https://bugzilla.suse.com/show_bug.cgi?id=1245757 * https://bugzilla.suse.com/show_bug.cgi?id=1245763 * https://bugzilla.suse.com/show_bug.cgi?id=1245765 * https://bugzilla.suse.com/show_bug.cgi?id=1245767 * https://bugzilla.suse.com/show_bug.cgi?id=1245769 * https://bugzilla.suse.com/show_bug.cgi?id=1245777 * https://bugzilla.suse.com/show_bug.cgi?id=1245780 * https://bugzilla.suse.com/show_bug.cgi?id=1245781 * https://bugzilla.suse.com/show_bug.cgi?id=1245784 * https://bugzilla.suse.com/show_bug.cgi?id=1245785 * https://bugzilla.suse.com/show_bug.cgi?id=1245787 * https://bugzilla.suse.com/show_bug.cgi?id=1245812 * https://bugzilla.suse.com/show_bug.cgi?id=1245814 * https://bugzilla.suse.com/show_bug.cgi?id=1245815 * https://bugzilla.suse.com/show_bug.cgi?id=1245937 * https://bugzilla.suse.com/show_bug.cgi?id=1245945 * https://bugzilla.suse.com/show_bug.cgi?id=1245952 * https://bugzilla.suse.com/show_bug.cgi?id=1245955 * https://bugzilla.suse.com/show_bug.cgi?id=1245956 * https://bugzilla.suse.com/show_bug.cgi?id=1245963 * https://bugzilla.suse.com/show_bug.cgi?id=1245966 * https://bugzilla.suse.com/show_bug.cgi?id=1245970 * https://bugzilla.suse.com/show_bug.cgi?id=1245973 * https://bugzilla.suse.com/show_bug.cgi?id=1245976 * https://bugzilla.suse.com/show_bug.cgi?id=1245977 * https://bugzilla.suse.com/show_bug.cgi?id=1245986 * https://bugzilla.suse.com/show_bug.cgi?id=1246000 * https://bugzilla.suse.com/show_bug.cgi?id=1246002 * https://bugzilla.suse.com/show_bug.cgi?id=1246005 * https://bugzilla.suse.com/show_bug.cgi?id=1246008 * https://bugzilla.suse.com/show_bug.cgi?id=1246012 * https://bugzilla.suse.com/show_bug.cgi?id=1246022 * https://bugzilla.suse.com/show_bug.cgi?id=1246023 * https://bugzilla.suse.com/show_bug.cgi?id=1246031 * https://bugzilla.suse.com/show_bug.cgi?id=1246034 * https://bugzilla.suse.com/show_bug.cgi?id=1246037 * https://bugzilla.suse.com/show_bug.cgi?id=1246041 * https://bugzilla.suse.com/show_bug.cgi?id=1246042 * https://bugzilla.suse.com/show_bug.cgi?id=1246047 * https://bugzilla.suse.com/show_bug.cgi?id=1246049 * https://bugzilla.suse.com/show_bug.cgi?id=1246050 * https://bugzilla.suse.com/show_bug.cgi?id=1246053 * https://bugzilla.suse.com/show_bug.cgi?id=1246054 * https://bugzilla.suse.com/show_bug.cgi?id=1246055 * https://bugzilla.suse.com/show_bug.cgi?id=1246057 * https://bugzilla.suse.com/show_bug.cgi?id=1246098 * https://bugzilla.suse.com/show_bug.cgi?id=1246109 * https://bugzilla.suse.com/show_bug.cgi?id=1246125 * https://bugzilla.suse.com/show_bug.cgi?id=1246166 * https://bugzilla.suse.com/show_bug.cgi?id=1246171 * https://bugzilla.suse.com/show_bug.cgi?id=1246176 * https://bugzilla.suse.com/show_bug.cgi?id=1246181 * https://bugzilla.suse.com/show_bug.cgi?id=1246183 * https://bugzilla.suse.com/show_bug.cgi?id=1246185 * https://bugzilla.suse.com/show_bug.cgi?id=1246186 * https://bugzilla.suse.com/show_bug.cgi?id=1246188 * https://bugzilla.suse.com/show_bug.cgi?id=1246190 * https://bugzilla.suse.com/show_bug.cgi?id=1246192 * https://bugzilla.suse.com/show_bug.cgi?id=1246193 * https://bugzilla.suse.com/show_bug.cgi?id=1246195 * https://bugzilla.suse.com/show_bug.cgi?id=1246220 * https://bugzilla.suse.com/show_bug.cgi?id=1246234 * https://bugzilla.suse.com/show_bug.cgi?id=1246236 * https://bugzilla.suse.com/show_bug.cgi?id=1246240 * https://bugzilla.suse.com/show_bug.cgi?id=1246243 * https://bugzilla.suse.com/show_bug.cgi?id=1246244 * https://bugzilla.suse.com/show_bug.cgi?id=1246245 * https://bugzilla.suse.com/show_bug.cgi?id=1246246 * https://bugzilla.suse.com/show_bug.cgi?id=1246248 * https://bugzilla.suse.com/show_bug.cgi?id=1246250 * https://bugzilla.suse.com/show_bug.cgi?id=1246252 * https://bugzilla.suse.com/show_bug.cgi?id=1246253 * https://bugzilla.suse.com/show_bug.cgi?id=1246255 * https://bugzilla.suse.com/show_bug.cgi?id=1246258 * https://bugzilla.suse.com/show_bug.cgi?id=1246259 * https://bugzilla.suse.com/show_bug.cgi?id=1246260 * https://bugzilla.suse.com/show_bug.cgi?id=1246262 * https://bugzilla.suse.com/show_bug.cgi?id=1246266 * https://bugzilla.suse.com/show_bug.cgi?id=1246268 * https://bugzilla.suse.com/show_bug.cgi?id=1246283 * https://bugzilla.suse.com/show_bug.cgi?id=1246285 * https://bugzilla.suse.com/show_bug.cgi?id=1246286 * https://bugzilla.suse.com/show_bug.cgi?id=1246287 * https://bugzilla.suse.com/show_bug.cgi?id=1246290 * https://bugzilla.suse.com/show_bug.cgi?id=1246292 * https://bugzilla.suse.com/show_bug.cgi?id=1246293 * https://bugzilla.suse.com/show_bug.cgi?id=1246295 * https://bugzilla.suse.com/show_bug.cgi?id=1246297 * https://bugzilla.suse.com/show_bug.cgi?id=1246333 * https://bugzilla.suse.com/show_bug.cgi?id=1246334 * https://bugzilla.suse.com/show_bug.cgi?id=1246337 * https://bugzilla.suse.com/show_bug.cgi?id=1246342 * https://bugzilla.suse.com/show_bug.cgi?id=1246349 * https://bugzilla.suse.com/show_bug.cgi?id=1246351 * https://bugzilla.suse.com/show_bug.cgi?id=1246353 * https://bugzilla.suse.com/show_bug.cgi?id=1246354 * https://bugzilla.suse.com/show_bug.cgi?id=1246358 * https://bugzilla.suse.com/show_bug.cgi?id=1246364 * https://bugzilla.suse.com/show_bug.cgi?id=1246366 * https://bugzilla.suse.com/show_bug.cgi?id=1246370 * https://bugzilla.suse.com/show_bug.cgi?id=1246375 * https://bugzilla.suse.com/show_bug.cgi?id=1246376 * https://bugzilla.suse.com/show_bug.cgi?id=1246385 * https://bugzilla.suse.com/show_bug.cgi?id=1246386 * https://bugzilla.suse.com/show_bug.cgi?id=1246387 * https://bugzilla.suse.com/show_bug.cgi?id=1246438 * https://bugzilla.suse.com/show_bug.cgi?id=1246443 * https://bugzilla.suse.com/show_bug.cgi?id=1246444 * https://bugzilla.suse.com/show_bug.cgi?id=1246447 * https://bugzilla.suse.com/show_bug.cgi?id=1246450 * https://bugzilla.suse.com/show_bug.cgi?id=1246453 * https://bugzilla.suse.com/show_bug.cgi?id=1246473 * https://bugzilla.suse.com/show_bug.cgi?id=1246490 * https://bugzilla.suse.com/show_bug.cgi?id=1246509 * https://bugzilla.suse.com/show_bug.cgi?id=1246547 * https://bugzilla.suse.com/show_bug.cgi?id=1246631 * https://bugzilla.suse.com/show_bug.cgi?id=1246651 * https://bugzilla.suse.com/show_bug.cgi?id=1246688 * https://bugzilla.suse.com/show_bug.cgi?id=1246777 * https://bugzilla.suse.com/show_bug.cgi?id=1246781 * https://bugzilla.suse.com/show_bug.cgi?id=1246782 * https://bugzilla.suse.com/show_bug.cgi?id=1246868 * https://bugzilla.suse.com/show_bug.cgi?id=1246896 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1246979 * https://bugzilla.suse.com/show_bug.cgi?id=1247018 * https://bugzilla.suse.com/show_bug.cgi?id=1247020 * https://bugzilla.suse.com/show_bug.cgi?id=1247022 * https://bugzilla.suse.com/show_bug.cgi?id=1247023 * https://bugzilla.suse.com/show_bug.cgi?id=1247024 * https://bugzilla.suse.com/show_bug.cgi?id=1247027 * https://bugzilla.suse.com/show_bug.cgi?id=1247028 * https://bugzilla.suse.com/show_bug.cgi?id=1247031 * https://bugzilla.suse.com/show_bug.cgi?id=1247033 * https://bugzilla.suse.com/show_bug.cgi?id=1247035 * https://bugzilla.suse.com/show_bug.cgi?id=1247061 * https://bugzilla.suse.com/show_bug.cgi?id=1247062 * https://bugzilla.suse.com/show_bug.cgi?id=1247064 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247078 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247088 * https://bugzilla.suse.com/show_bug.cgi?id=1247089 * https://bugzilla.suse.com/show_bug.cgi?id=1247091 * https://bugzilla.suse.com/show_bug.cgi?id=1247097 * https://bugzilla.suse.com/show_bug.cgi?id=1247098 * https://bugzilla.suse.com/show_bug.cgi?id=1247099 * https://bugzilla.suse.com/show_bug.cgi?id=1247101 * https://bugzilla.suse.com/show_bug.cgi?id=1247102 * https://bugzilla.suse.com/show_bug.cgi?id=1247103 * https://bugzilla.suse.com/show_bug.cgi?id=1247104 * https://bugzilla.suse.com/show_bug.cgi?id=1247112 * https://bugzilla.suse.com/show_bug.cgi?id=1247113 * https://bugzilla.suse.com/show_bug.cgi?id=1247116 * https://bugzilla.suse.com/show_bug.cgi?id=1247118 * https://bugzilla.suse.com/show_bug.cgi?id=1247119 * https://bugzilla.suse.com/show_bug.cgi?id=1247123 * https://bugzilla.suse.com/show_bug.cgi?id=1247125 * https://bugzilla.suse.com/show_bug.cgi?id=1247126 * https://bugzilla.suse.com/show_bug.cgi?id=1247128 * https://bugzilla.suse.com/show_bug.cgi?id=1247130 * https://bugzilla.suse.com/show_bug.cgi?id=1247131 * https://bugzilla.suse.com/show_bug.cgi?id=1247132 * https://bugzilla.suse.com/show_bug.cgi?id=1247136 * https://bugzilla.suse.com/show_bug.cgi?id=1247137 * https://bugzilla.suse.com/show_bug.cgi?id=1247138 * https://bugzilla.suse.com/show_bug.cgi?id=1247141 * https://bugzilla.suse.com/show_bug.cgi?id=1247143 * https://bugzilla.suse.com/show_bug.cgi?id=1247145 * https://bugzilla.suse.com/show_bug.cgi?id=1247146 * https://bugzilla.suse.com/show_bug.cgi?id=1247147 * https://bugzilla.suse.com/show_bug.cgi?id=1247149 * https://bugzilla.suse.com/show_bug.cgi?id=1247150 * https://bugzilla.suse.com/show_bug.cgi?id=1247151 * https://bugzilla.suse.com/show_bug.cgi?id=1247152 * https://bugzilla.suse.com/show_bug.cgi?id=1247153 * https://bugzilla.suse.com/show_bug.cgi?id=1247154 * https://bugzilla.suse.com/show_bug.cgi?id=1247155 * https://bugzilla.suse.com/show_bug.cgi?id=1247156 * https://bugzilla.suse.com/show_bug.cgi?id=1247157 * https://bugzilla.suse.com/show_bug.cgi?id=1247160 * https://bugzilla.suse.com/show_bug.cgi?id=1247162 * https://bugzilla.suse.com/show_bug.cgi?id=1247163 * https://bugzilla.suse.com/show_bug.cgi?id=1247164 * https://bugzilla.suse.com/show_bug.cgi?id=1247167 * https://bugzilla.suse.com/show_bug.cgi?id=1247169 * https://bugzilla.suse.com/show_bug.cgi?id=1247170 * https://bugzilla.suse.com/show_bug.cgi?id=1247171 * https://bugzilla.suse.com/show_bug.cgi?id=1247174 * https://bugzilla.suse.com/show_bug.cgi?id=1247176 * https://bugzilla.suse.com/show_bug.cgi?id=1247177 * https://bugzilla.suse.com/show_bug.cgi?id=1247178 * https://bugzilla.suse.com/show_bug.cgi?id=1247181 * https://bugzilla.suse.com/show_bug.cgi?id=1247209 * https://bugzilla.suse.com/show_bug.cgi?id=1247210 * https://bugzilla.suse.com/show_bug.cgi?id=1247220 * https://bugzilla.suse.com/show_bug.cgi?id=1247223 * https://bugzilla.suse.com/show_bug.cgi?id=1247227 * https://bugzilla.suse.com/show_bug.cgi?id=1247229 * https://bugzilla.suse.com/show_bug.cgi?id=1247231 * https://bugzilla.suse.com/show_bug.cgi?id=1247233 * https://bugzilla.suse.com/show_bug.cgi?id=1247234 * https://bugzilla.suse.com/show_bug.cgi?id=1247235 * https://bugzilla.suse.com/show_bug.cgi?id=1247236 * https://bugzilla.suse.com/show_bug.cgi?id=1247238 * https://bugzilla.suse.com/show_bug.cgi?id=1247239 * https://bugzilla.suse.com/show_bug.cgi?id=1247241 * https://bugzilla.suse.com/show_bug.cgi?id=1247243 * https://bugzilla.suse.com/show_bug.cgi?id=1247250 * https://bugzilla.suse.com/show_bug.cgi?id=1247251 * https://bugzilla.suse.com/show_bug.cgi?id=1247252 * https://bugzilla.suse.com/show_bug.cgi?id=1247253 * https://bugzilla.suse.com/show_bug.cgi?id=1247255 * https://bugzilla.suse.com/show_bug.cgi?id=1247262 * https://bugzilla.suse.com/show_bug.cgi?id=1247265 * https://bugzilla.suse.com/show_bug.cgi?id=1247270 * https://bugzilla.suse.com/show_bug.cgi?id=1247271 * https://bugzilla.suse.com/show_bug.cgi?id=1247273 * https://bugzilla.suse.com/show_bug.cgi?id=1247274 * https://bugzilla.suse.com/show_bug.cgi?id=1247276 * https://bugzilla.suse.com/show_bug.cgi?id=1247277 * https://bugzilla.suse.com/show_bug.cgi?id=1247278 * https://bugzilla.suse.com/show_bug.cgi?id=1247279 * https://bugzilla.suse.com/show_bug.cgi?id=1247280 * https://bugzilla.suse.com/show_bug.cgi?id=1247282 * https://bugzilla.suse.com/show_bug.cgi?id=1247283 * https://bugzilla.suse.com/show_bug.cgi?id=1247284 * https://bugzilla.suse.com/show_bug.cgi?id=1247285 * https://bugzilla.suse.com/show_bug.cgi?id=1247288 * https://bugzilla.suse.com/show_bug.cgi?id=1247289 * https://bugzilla.suse.com/show_bug.cgi?id=1247290 * https://bugzilla.suse.com/show_bug.cgi?id=1247293 * https://bugzilla.suse.com/show_bug.cgi?id=1247308 * https://bugzilla.suse.com/show_bug.cgi?id=1247311 * https://bugzilla.suse.com/show_bug.cgi?id=1247313 * https://bugzilla.suse.com/show_bug.cgi?id=1247314 * https://bugzilla.suse.com/show_bug.cgi?id=1247317 * https://bugzilla.suse.com/show_bug.cgi?id=1247325 * https://bugzilla.suse.com/show_bug.cgi?id=1247347 * https://bugzilla.suse.com/show_bug.cgi?id=1247348 * https://bugzilla.suse.com/show_bug.cgi?id=1247349 * https://bugzilla.suse.com/show_bug.cgi?id=1247366 * https://bugzilla.suse.com/show_bug.cgi?id=1247372 * https://bugzilla.suse.com/show_bug.cgi?id=1247376 * https://bugzilla.suse.com/show_bug.cgi?id=1247426 * https://bugzilla.suse.com/show_bug.cgi?id=1247437 * https://bugzilla.suse.com/show_bug.cgi?id=1247442 * https://bugzilla.suse.com/show_bug.cgi?id=1247483 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1247837 * https://bugzilla.suse.com/show_bug.cgi?id=1247838 * https://bugzilla.suse.com/show_bug.cgi?id=1247935 * https://bugzilla.suse.com/show_bug.cgi?id=1247936 * https://bugzilla.suse.com/show_bug.cgi?id=1247949 * https://bugzilla.suse.com/show_bug.cgi?id=1247950 * https://bugzilla.suse.com/show_bug.cgi?id=1247963 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248088 * https://bugzilla.suse.com/show_bug.cgi?id=1248111 * https://bugzilla.suse.com/show_bug.cgi?id=1248121 * https://bugzilla.suse.com/show_bug.cgi?id=1248183 * https://bugzilla.suse.com/show_bug.cgi?id=1248186 * https://bugzilla.suse.com/show_bug.cgi?id=1248190 * https://bugzilla.suse.com/show_bug.cgi?id=1248192 * https://bugzilla.suse.com/show_bug.cgi?id=1248194 * https://bugzilla.suse.com/show_bug.cgi?id=1248198 * https://bugzilla.suse.com/show_bug.cgi?id=1248199 * https://bugzilla.suse.com/show_bug.cgi?id=1248200 * https://bugzilla.suse.com/show_bug.cgi?id=1248202 * https://bugzilla.suse.com/show_bug.cgi?id=1248205 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248224 * https://bugzilla.suse.com/show_bug.cgi?id=1248225 * https://bugzilla.suse.com/show_bug.cgi?id=1248230 * https://bugzilla.suse.com/show_bug.cgi?id=1248235 * https://bugzilla.suse.com/show_bug.cgi?id=1248255 * https://bugzilla.suse.com/show_bug.cgi?id=1248296 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248299 * https://bugzilla.suse.com/show_bug.cgi?id=1248302 * https://bugzilla.suse.com/show_bug.cgi?id=1248304 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248333 * https://bugzilla.suse.com/show_bug.cgi?id=1248334 * https://bugzilla.suse.com/show_bug.cgi?id=1248337 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248340 * https://bugzilla.suse.com/show_bug.cgi?id=1248341 * https://bugzilla.suse.com/show_bug.cgi?id=1248343 * https://bugzilla.suse.com/show_bug.cgi?id=1248345 * https://bugzilla.suse.com/show_bug.cgi?id=1248349 * https://bugzilla.suse.com/show_bug.cgi?id=1248350 * https://bugzilla.suse.com/show_bug.cgi?id=1248354 * https://bugzilla.suse.com/show_bug.cgi?id=1248355 * https://bugzilla.suse.com/show_bug.cgi?id=1248357 * https://bugzilla.suse.com/show_bug.cgi?id=1248359 * https://bugzilla.suse.com/show_bug.cgi?id=1248361 * https://bugzilla.suse.com/show_bug.cgi?id=1248363 * https://bugzilla.suse.com/show_bug.cgi?id=1248365 * https://bugzilla.suse.com/show_bug.cgi?id=1248367 * https://bugzilla.suse.com/show_bug.cgi?id=1248368 * https://bugzilla.suse.com/show_bug.cgi?id=1248374 * https://bugzilla.suse.com/show_bug.cgi?id=1248377 * https://bugzilla.suse.com/show_bug.cgi?id=1248378 * https://bugzilla.suse.com/show_bug.cgi?id=1248380 * https://bugzilla.suse.com/show_bug.cgi?id=1248386 * https://bugzilla.suse.com/show_bug.cgi?id=1248390 * https://bugzilla.suse.com/show_bug.cgi?id=1248392 * https://bugzilla.suse.com/show_bug.cgi?id=1248395 * https://bugzilla.suse.com/show_bug.cgi?id=1248396 * https://bugzilla.suse.com/show_bug.cgi?id=1248399 * https://bugzilla.suse.com/show_bug.cgi?id=1248401 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248512 * https://bugzilla.suse.com/show_bug.cgi?id=1248573 * https://bugzilla.suse.com/show_bug.cgi?id=1248575 * https://bugzilla.suse.com/show_bug.cgi?id=1248577 * https://bugzilla.suse.com/show_bug.cgi?id=1248609 * https://bugzilla.suse.com/show_bug.cgi?id=1248610 * https://bugzilla.suse.com/show_bug.cgi?id=1248616 * https://bugzilla.suse.com/show_bug.cgi?id=1248617 * https://bugzilla.suse.com/show_bug.cgi?id=1248619 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248622 * https://bugzilla.suse.com/show_bug.cgi?id=1248624 * https://bugzilla.suse.com/show_bug.cgi?id=1248627 * https://bugzilla.suse.com/show_bug.cgi?id=1248628 * https://bugzilla.suse.com/show_bug.cgi?id=1248634 * https://bugzilla.suse.com/show_bug.cgi?id=1248635 * https://bugzilla.suse.com/show_bug.cgi?id=1248639 * https://bugzilla.suse.com/show_bug.cgi?id=1248643 * https://bugzilla.suse.com/show_bug.cgi?id=1248647 * https://bugzilla.suse.com/show_bug.cgi?id=1248648 * https://bugzilla.suse.com/show_bug.cgi?id=1248652 * https://bugzilla.suse.com/show_bug.cgi?id=1248655 * https://bugzilla.suse.com/show_bug.cgi?id=1248662 * https://bugzilla.suse.com/show_bug.cgi?id=1248664 * https://bugzilla.suse.com/show_bug.cgi?id=1248666 * https://bugzilla.suse.com/show_bug.cgi?id=1248669 * https://bugzilla.suse.com/show_bug.cgi?id=1248674 * https://bugzilla.suse.com/show_bug.cgi?id=1248681 * https://bugzilla.suse.com/show_bug.cgi?id=1248727 * https://bugzilla.suse.com/show_bug.cgi?id=1248728 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://bugzilla.suse.com/show_bug.cgi?id=1248754 * https://bugzilla.suse.com/show_bug.cgi?id=1248775 * https://bugzilla.suse.com/show_bug.cgi?id=1249022 * https://bugzilla.suse.com/show_bug.cgi?id=1249038 * https://bugzilla.suse.com/show_bug.cgi?id=1249060 * https://bugzilla.suse.com/show_bug.cgi?id=1249061 * https://bugzilla.suse.com/show_bug.cgi?id=1249062 * https://bugzilla.suse.com/show_bug.cgi?id=1249064 * https://bugzilla.suse.com/show_bug.cgi?id=1249065 * https://bugzilla.suse.com/show_bug.cgi?id=1249066 * https://bugzilla.suse.com/show_bug.cgi?id=1249126 * https://bugzilla.suse.com/show_bug.cgi?id=1249143 * https://bugzilla.suse.com/show_bug.cgi?id=1249156 * https://bugzilla.suse.com/show_bug.cgi?id=1249159 * https://bugzilla.suse.com/show_bug.cgi?id=1249160 * https://bugzilla.suse.com/show_bug.cgi?id=1249163 * https://bugzilla.suse.com/show_bug.cgi?id=1249164 * https://bugzilla.suse.com/show_bug.cgi?id=1249166 * https://bugzilla.suse.com/show_bug.cgi?id=1249167 * https://bugzilla.suse.com/show_bug.cgi?id=1249169 * https://bugzilla.suse.com/show_bug.cgi?id=1249170 * https://bugzilla.suse.com/show_bug.cgi?id=1249172 * https://bugzilla.suse.com/show_bug.cgi?id=1249176 * https://bugzilla.suse.com/show_bug.cgi?id=1249177 * https://bugzilla.suse.com/show_bug.cgi?id=1249182 * https://bugzilla.suse.com/show_bug.cgi?id=1249186 * https://bugzilla.suse.com/show_bug.cgi?id=1249190 * https://bugzilla.suse.com/show_bug.cgi?id=1249193 * https://bugzilla.suse.com/show_bug.cgi?id=1249195 * https://bugzilla.suse.com/show_bug.cgi?id=1249199 * https://bugzilla.suse.com/show_bug.cgi?id=1249201 * https://bugzilla.suse.com/show_bug.cgi?id=1249202 * https://bugzilla.suse.com/show_bug.cgi?id=1249203 * https://bugzilla.suse.com/show_bug.cgi?id=1249204 * https://bugzilla.suse.com/show_bug.cgi?id=1249206 * https://bugzilla.suse.com/show_bug.cgi?id=1249215 * https://bugzilla.suse.com/show_bug.cgi?id=1249220 * https://bugzilla.suse.com/show_bug.cgi?id=1249221 * https://bugzilla.suse.com/show_bug.cgi?id=1249254 * https://bugzilla.suse.com/show_bug.cgi?id=1249258 * https://bugzilla.suse.com/show_bug.cgi?id=1249262 * https://bugzilla.suse.com/show_bug.cgi?id=1249263 * https://bugzilla.suse.com/show_bug.cgi?id=1249265 * https://bugzilla.suse.com/show_bug.cgi?id=1249266 * https://bugzilla.suse.com/show_bug.cgi?id=1249269 * https://bugzilla.suse.com/show_bug.cgi?id=1249271 * https://bugzilla.suse.com/show_bug.cgi?id=1249272 * https://bugzilla.suse.com/show_bug.cgi?id=1249273 * https://bugzilla.suse.com/show_bug.cgi?id=1249274 * https://bugzilla.suse.com/show_bug.cgi?id=1249278 * https://bugzilla.suse.com/show_bug.cgi?id=1249279 * https://bugzilla.suse.com/show_bug.cgi?id=1249281 * https://bugzilla.suse.com/show_bug.cgi?id=1249282 * https://bugzilla.suse.com/show_bug.cgi?id=1249284 * https://bugzilla.suse.com/show_bug.cgi?id=1249285 * https://bugzilla.suse.com/show_bug.cgi?id=1249286 * https://bugzilla.suse.com/show_bug.cgi?id=1249288 * https://bugzilla.suse.com/show_bug.cgi?id=1249290 * https://bugzilla.suse.com/show_bug.cgi?id=1249292 * https://bugzilla.suse.com/show_bug.cgi?id=1249295 * https://bugzilla.suse.com/show_bug.cgi?id=1249296 * https://bugzilla.suse.com/show_bug.cgi?id=1249297 * https://bugzilla.suse.com/show_bug.cgi?id=1249299 * https://bugzilla.suse.com/show_bug.cgi?id=1249300 * https://bugzilla.suse.com/show_bug.cgi?id=1249301 * https://bugzilla.suse.com/show_bug.cgi?id=1249303 * https://bugzilla.suse.com/show_bug.cgi?id=1249304 * https://bugzilla.suse.com/show_bug.cgi?id=1249305 * https://bugzilla.suse.com/show_bug.cgi?id=1249306 * https://bugzilla.suse.com/show_bug.cgi?id=1249308 * https://bugzilla.suse.com/show_bug.cgi?id=1249309 * https://bugzilla.suse.com/show_bug.cgi?id=1249312 * https://bugzilla.suse.com/show_bug.cgi?id=1249313 * https://bugzilla.suse.com/show_bug.cgi?id=1249314 * https://bugzilla.suse.com/show_bug.cgi?id=1249315 * https://bugzilla.suse.com/show_bug.cgi?id=1249316 * https://bugzilla.suse.com/show_bug.cgi?id=1249318 * https://bugzilla.suse.com/show_bug.cgi?id=1249319 * https://bugzilla.suse.com/show_bug.cgi?id=1249320 * https://bugzilla.suse.com/show_bug.cgi?id=1249321 * https://bugzilla.suse.com/show_bug.cgi?id=1249322 * https://bugzilla.suse.com/show_bug.cgi?id=1249323 * https://bugzilla.suse.com/show_bug.cgi?id=1249324 * https://bugzilla.suse.com/show_bug.cgi?id=1249333 * https://bugzilla.suse.com/show_bug.cgi?id=1249334 * https://bugzilla.suse.com/show_bug.cgi?id=1249338 * https://bugzilla.suse.com/show_bug.cgi?id=1249346 * https://bugzilla.suse.com/show_bug.cgi?id=1249374 * https://bugzilla.suse.com/show_bug.cgi?id=1249413 * https://bugzilla.suse.com/show_bug.cgi?id=1249477 * https://bugzilla.suse.com/show_bug.cgi?id=1249478 * https://bugzilla.suse.com/show_bug.cgi?id=1249479 * https://bugzilla.suse.com/show_bug.cgi?id=1249486 * https://bugzilla.suse.com/show_bug.cgi?id=1249490 * https://bugzilla.suse.com/show_bug.cgi?id=1249494 * https://bugzilla.suse.com/show_bug.cgi?id=1249500 * https://bugzilla.suse.com/show_bug.cgi?id=1249504 * https://bugzilla.suse.com/show_bug.cgi?id=1249506 * https://bugzilla.suse.com/show_bug.cgi?id=1249508 * https://bugzilla.suse.com/show_bug.cgi?id=1249509 * https://bugzilla.suse.com/show_bug.cgi?id=1249510 * https://bugzilla.suse.com/show_bug.cgi?id=1249513 * https://bugzilla.suse.com/show_bug.cgi?id=1249515 * https://bugzilla.suse.com/show_bug.cgi?id=1249516 * https://bugzilla.suse.com/show_bug.cgi?id=1249522 * https://bugzilla.suse.com/show_bug.cgi?id=1249523 * https://bugzilla.suse.com/show_bug.cgi?id=1249524 * https://bugzilla.suse.com/show_bug.cgi?id=1249526 * https://bugzilla.suse.com/show_bug.cgi?id=1249533 * https://bugzilla.suse.com/show_bug.cgi?id=1249538 * https://bugzilla.suse.com/show_bug.cgi?id=1249540 * https://bugzilla.suse.com/show_bug.cgi?id=1249542 * https://bugzilla.suse.com/show_bug.cgi?id=1249545 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249548 * https://bugzilla.suse.com/show_bug.cgi?id=1249550 * https://bugzilla.suse.com/show_bug.cgi?id=1249552 * https://bugzilla.suse.com/show_bug.cgi?id=1249554 * https://bugzilla.suse.com/show_bug.cgi?id=1249562 * https://bugzilla.suse.com/show_bug.cgi?id=1249566 * https://bugzilla.suse.com/show_bug.cgi?id=1249587 * https://bugzilla.suse.com/show_bug.cgi?id=1249598 * https://bugzilla.suse.com/show_bug.cgi?id=1249604 * https://bugzilla.suse.com/show_bug.cgi?id=1249608 * https://bugzilla.suse.com/show_bug.cgi?id=1249615 * https://bugzilla.suse.com/show_bug.cgi?id=1249618 * https://bugzilla.suse.com/show_bug.cgi?id=1249774 * https://bugzilla.suse.com/show_bug.cgi?id=1249833 * https://bugzilla.suse.com/show_bug.cgi?id=1249887 * https://bugzilla.suse.com/show_bug.cgi?id=1249888 * https://bugzilla.suse.com/show_bug.cgi?id=1249901 * https://bugzilla.suse.com/show_bug.cgi?id=1249904 * https://bugzilla.suse.com/show_bug.cgi?id=1249906 * https://bugzilla.suse.com/show_bug.cgi?id=1249915 * https://bugzilla.suse.com/show_bug.cgi?id=1249974 * https://bugzilla.suse.com/show_bug.cgi?id=1249975 * https://bugzilla.suse.com/show_bug.cgi?id=1250002 * https://bugzilla.suse.com/show_bug.cgi?id=1250007 * https://bugzilla.suse.com/show_bug.cgi?id=1250021 * https://bugzilla.suse.com/show_bug.cgi?id=1250025 * https://bugzilla.suse.com/show_bug.cgi?id=1250028 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250087 * https://bugzilla.suse.com/show_bug.cgi?id=1250088 * https://bugzilla.suse.com/show_bug.cgi?id=1250119 * https://bugzilla.suse.com/show_bug.cgi?id=1250123 * https://bugzilla.suse.com/show_bug.cgi?id=1250124 * https://bugzilla.suse.com/show_bug.cgi?id=1250177 * https://bugzilla.suse.com/show_bug.cgi?id=1250179 * https://bugzilla.suse.com/show_bug.cgi?id=1250203 * https://bugzilla.suse.com/show_bug.cgi?id=1250204 * https://bugzilla.suse.com/show_bug.cgi?id=1250205 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250242 * https://bugzilla.suse.com/show_bug.cgi?id=1250247 * https://bugzilla.suse.com/show_bug.cgi?id=1250249 * https://bugzilla.suse.com/show_bug.cgi?id=1250251 * https://bugzilla.suse.com/show_bug.cgi?id=1250258 * https://bugzilla.suse.com/show_bug.cgi?id=1250262 * https://bugzilla.suse.com/show_bug.cgi?id=1250266 * https://bugzilla.suse.com/show_bug.cgi?id=1250267 * https://bugzilla.suse.com/show_bug.cgi?id=1250268 * https://bugzilla.suse.com/show_bug.cgi?id=1250275 * https://bugzilla.suse.com/show_bug.cgi?id=1250276 * https://bugzilla.suse.com/show_bug.cgi?id=1250281 * https://bugzilla.suse.com/show_bug.cgi?id=1250291 * https://bugzilla.suse.com/show_bug.cgi?id=1250292 * https://bugzilla.suse.com/show_bug.cgi?id=1250294 * https://bugzilla.suse.com/show_bug.cgi?id=1250296 * https://bugzilla.suse.com/show_bug.cgi?id=1250297 * https://bugzilla.suse.com/show_bug.cgi?id=1250298 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1250344 * https://bugzilla.suse.com/show_bug.cgi?id=1250365 * https://bugzilla.suse.com/show_bug.cgi?id=1250371 * https://bugzilla.suse.com/show_bug.cgi?id=1250377 * https://bugzilla.suse.com/show_bug.cgi?id=1250386 * https://bugzilla.suse.com/show_bug.cgi?id=1250389 * https://bugzilla.suse.com/show_bug.cgi?id=1250398 * https://bugzilla.suse.com/show_bug.cgi?id=1250402 * https://bugzilla.suse.com/show_bug.cgi?id=1250406 * https://bugzilla.suse.com/show_bug.cgi?id=1250407 * https://bugzilla.suse.com/show_bug.cgi?id=1250408 * https://bugzilla.suse.com/show_bug.cgi?id=1250450 * https://bugzilla.suse.com/show_bug.cgi?id=1250491 * https://bugzilla.suse.com/show_bug.cgi?id=1250519 * https://bugzilla.suse.com/show_bug.cgi?id=1250522 * https://bugzilla.suse.com/show_bug.cgi?id=1250650 * https://bugzilla.suse.com/show_bug.cgi?id=1250655 * https://bugzilla.suse.com/show_bug.cgi?id=1250671 * https://bugzilla.suse.com/show_bug.cgi?id=1250702 * https://bugzilla.suse.com/show_bug.cgi?id=1250711 * https://bugzilla.suse.com/show_bug.cgi?id=1250712 * https://bugzilla.suse.com/show_bug.cgi?id=1250713 * https://bugzilla.suse.com/show_bug.cgi?id=1250716 * https://bugzilla.suse.com/show_bug.cgi?id=1250719 * https://bugzilla.suse.com/show_bug.cgi?id=1250722 * https://bugzilla.suse.com/show_bug.cgi?id=1250729 * https://bugzilla.suse.com/show_bug.cgi?id=1250736 * https://bugzilla.suse.com/show_bug.cgi?id=1250737 * https://bugzilla.suse.com/show_bug.cgi?id=1250739 * https://bugzilla.suse.com/show_bug.cgi?id=1250741 * https://bugzilla.suse.com/show_bug.cgi?id=1250742 * https://bugzilla.suse.com/show_bug.cgi?id=1250758 * https://bugzilla.suse.com/show_bug.cgi?id=1250952 * https://bugzilla.suse.com/show_bug.cgi?id=1251100 * https://bugzilla.suse.com/show_bug.cgi?id=1251114 * https://bugzilla.suse.com/show_bug.cgi?id=1251134 * https://bugzilla.suse.com/show_bug.cgi?id=1251135 * https://bugzilla.suse.com/show_bug.cgi?id=1251143 * https://bugzilla.suse.com/show_bug.cgi?id=1251146 * https://bugzilla.suse.com/show_bug.cgi?id=1251186 * https://bugzilla.suse.com/show_bug.cgi?id=1251216 * https://bugzilla.suse.com/show_bug.cgi?id=1251230 * https://bugzilla.suse.com/show_bug.cgi?id=1251810 * https://bugzilla.suse.com/show_bug.cgi?id=1252084 * https://jira.suse.com/browse/PED-10909 * https://jira.suse.com/browse/PED-12405 * https://jira.suse.com/browse/PED-12745 * https://jira.suse.com/browse/PED-12882 * https://jira.suse.com/browse/PED-13113 * https://jira.suse.com/browse/PED-13256 * https://jira.suse.com/browse/PED-13302 * https://jira.suse.com/browse/PED-13331 * https://jira.suse.com/browse/PED-13343 * https://jira.suse.com/browse/PED-13345 * https://jira.suse.com/browse/PED-13631 * https://jira.suse.com/browse/PED-13704 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-13762 * https://jira.suse.com/browse/PED-13815 * https://jira.suse.com/browse/PED-348 * https://jira.suse.com/browse/PED-7249 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:26:51 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:26:51 -0000 Subject: SUSE-RU-2026:20559-1: moderate: Recommended update for python-kiwi Message-ID: <177271721146.1901.14752046994189049234@13ea24840d99> # Recommended update for python-kiwi Announcement ID: SUSE-RU-2026:20559-1 Release Date: 2025-11-14T18:18:15Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that can now be installed. ## Description: This update for python-kiwi fixes the following issues: Version 10.2.33. * Run grub mkconfig with os-prober disabled Set GRUB_DISABLE_OS_PROBER=true to the caller environment such that it gets consumed via /etc/grub.d/30_os-prober This Fixes #2883 * Fixed typo in documentation Invalid XML syntax, missing end tag. This Fixes #2882 * References #2474 and #2475 poweroff instead of halt on oem shutdown * Fix rawhide integration test The package shim-ia32 got dropped * Add test for profiled overlays kiwi supports overlay files per profile, but we didn't had a proper integration test for it. This commit adds one * Mount proc when needed Using cp -a might lookup in proc/self/.. under certain conditions. Make sure to mount proc for config/function that might trigger this condition. This Fixes #2876 * Update test-image-custom-partitions test build Fix patch files to match with new dracut module dirs * Update dracut version compat runtime check Update check_dracut_module_versions_compatible_to_kiwi to match with new dracut module dirs which have changed due to recommended dracut module ordering for out-of-tree modules. * Fix dracut Makefile install target module dir names have changed due to recommended dracut module ordering for out- of-tree modules. * Update pacman spec to dract changed module dirs Follow up change for the fix of the recommended dracut module ordering for out- of-tree modules. * Update spec file due to dract changed module dirs Follow up change for the fix of the recommended dracut module ordering for out- of-tree modules. * Follow the recommended dracut module ordering for out-of-tree modules In dracut release v108 or later the recommended ordering for out out of tree modules is 50-59 range. The following is a section from dracut documentation: > Not using the 50-59 range for out of tree dracut modules will likely > lead to > unintended errors in the initramfs generation process as your > dracut module > will either run too early or too late in the generation process. > You have > been warned. * Fix agama integration test Disable no longer existing agama-auto.service * Fixed agama integration test nothing provides agama-auto anymore * Update SLFO integration test Make sure ps tool is installed * Fix exclude list for live image builds When specifying a filesystem attribute for a live image build, the rootfs gets build directly into this filesystem instead of being a squashfs wraped ext4 which is the default layout for compatibility reasons. In this direct filesystem mode the exclude list was not passed along to the filesystem creation and causes unwanted metadata to be part of the final image. This Fixes #2873 * Fix test-image-custom-partitions integration test Same fix as for the Tumbleweed test now also applied to the Leap test. Patching of the new root device did no longer apply * Fix test-image-custom-partitions integration test Patching of the new root device did no longer apply * fix: resize for raid device, ensure vars like kiwi_RaidDev are loaded before setting disk variable * Do not clobber initialize method There was a method named initialize defined and implemented differently in the dracut modules kiwi-lib and kiwi-repart. kiwi-lib is expected to be shared code across all kiwi dracut modules. However if one module redefines a method of the same name which is used in another module and expected to work differently there, this is evil. This commit cleans up the name conflict and names the kiwi library init function as lib_initialize. All dracut code that is expected to make use of this method has been adopted too. * Skip kiwi-repart module in install ISOs In case the kiwi-repart module is explicitly requested in a dracut.conf file and the image is also configured to build an install ISO image this leads the install ISO to contain the kiwi-repart module as well which is unwanted. This commit explicitly omits the kiwi-repart when creating the initrd for the install image * Skip repart when booting install/live iso * Update leap test-image-disk integration test Add test for alternative volume ID in install ISO * Consolidate device lock into its own method Add set_device_lock method which uses udevadm lock preferable but also supports an flock fallback in case there is no lock command provided via systemd/udev * Fix bug in shell condition The shell code test ... || warn A; warn B will always print the warning for B despite the test result. This lead to the warning message "Settings from the kiwi description will be ignored" to be printed always. This commit fixes it with a clean if/then condition * Fix documentation rendering There was an indentation bug which caused the docs to render wrong. This commit fixes it * solver/repository: Handle zstd-compressed metadata files `_create_solvables` assumes metadata files are gzip-compressed, but modern Fedora ones are not, they are zstd-compressed. * uri: If we fail to resolve the metalink URI, log it It's rather useful to know _what_ the URI is when something goes wrong, after all. Signed-off-by: Adam Williamson * Fix repartitioning with parted parted does locking itself already. Wrapping it in udevadm lock results in a deadlock, breaking boot. * Update test-image-disk-simple integration test Update slfo/test-image-disk-simple. Add more space for flake testing and add a user to test flakes for non root * Catch potential exceptions from pathlib.Path.mkdir Creating a directory can fail, we should catch this error instead of ending up in a stack trace ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-17=1 ## Package List: * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kiwi-systemdeps-core-10.2.33-160000.1.1 * python3-kiwi-10.2.33-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:26:55 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:26:55 -0000 Subject: SUSE-SU-2026:20558-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) Message-ID: <177271721567.1901.10903163957462770498@13ea24840d99> # Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 16) Announcement ID: SUSE-SU-2026:20558-1 Release Date: 2026-03-02T10:01:23Z Rating: important References: * bsc#1253439 Cross-References: * CVE-2025-40186 CVSS scores: * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes one security issue The following security issue was fixed: * CVE-2025-40186: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request() (bsc#1253439). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-332=1 ## Package List: * SUSE Linux Micro 6.2 (x86_64) * kernel-livepatch-SLE16-RT_Update_1-debugsource-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-rt-debuginfo-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-rt-4-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40186.html * https://bugzilla.suse.com/show_bug.cgi?id=1253439 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:27:00 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:27:00 -0000 Subject: SUSE-SU-2026:20557-1: moderate: Security update for haproxy Message-ID: <177271722009.1901.1866860647230942049@13ea24840d99> # Security update for haproxy Announcement ID: SUSE-SU-2026:20557-1 Release Date: 2026-02-27T13:14:13Z Rating: moderate References: * bsc#1257521 * bsc#1257976 Cross-References: * CVE-2026-26080 * CVE-2026-26081 CVSS scores: * CVE-2026-26080 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-26080 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26081 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-26081 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for haproxy fixes the following issues: * Update to version 3.2.12+git0.6011f448e * CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976) * CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-328=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * haproxy-debugsource-3.2.12+git0.6011f448e-160000.1.1 * haproxy-3.2.12+git0.6011f448e-160000.1.1 * haproxy-debuginfo-3.2.12+git0.6011f448e-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-26080.html * https://www.suse.com/security/cve/CVE-2026-26081.html * https://bugzilla.suse.com/show_bug.cgi?id=1257521 * https://bugzilla.suse.com/show_bug.cgi?id=1257976 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:27:01 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:27:01 -0000 Subject: SUSE-SU-2026:20556-1: important: Security update for the initial kernel livepatch Message-ID: <177271722136.1901.4569102396658509994@13ea24840d99> # Security update for the initial kernel livepatch Announcement ID: SUSE-SU-2026:20556-1 Release Date: 2026-02-27T11:23:38Z Rating: important References: Affected Products: * SUSE Linux Micro 6.2 An update that can now be installed. ## Description: This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-326=1 ## Package List: * SUSE Linux Micro 6.2 (ppc64le s390x x86_64) * kernel-livepatch-6_12_0-160000_26-default-1-160000.1.1 * kernel-livepatch-SLE16_Update_5-debugsource-1-160000.1.1 * kernel-livepatch-6_12_0-160000_26-default-debuginfo-1-160000.1.1 * SUSE Linux Micro 6.2 (x86_64) * kernel-livepatch-6_12_0-160000_26-rt-debuginfo-1-160000.1.1 * kernel-livepatch-SLE16-RT_Update_5-debugsource-1-160000.1.1 * kernel-livepatch-6_12_0-160000_26-rt-1-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:14 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:14 -0000 Subject: SUSE-SU-2026:20555-1: important: Security update for the Linux Kernel Message-ID: <177271759455.1901.3081888015821629049@13ea24840d99> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20555-1 Release Date: 2026-02-27T11:23:36Z Rating: important References: * bsc#1205462 * bsc#1214285 * bsc#1215199 * bsc#1235905 * bsc#1242505 * bsc#1242974 * bsc#1242986 * bsc#1243452 * bsc#1243507 * bsc#1243662 * bsc#1246184 * bsc#1246282 * bsc#1247030 * bsc#1247292 * bsc#1247712 * bsc#1248166 * bsc#1248175 * bsc#1248178 * bsc#1248179 * bsc#1248185 * bsc#1248188 * bsc#1248196 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248211 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248222 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248232 * bsc#1248234 * bsc#1248240 * bsc#1248360 * bsc#1248366 * bsc#1248384 * bsc#1248626 * bsc#1249307 * bsc#1249609 * bsc#1249895 * bsc#1249998 * bsc#1250032 * bsc#1250082 * bsc#1250388 * bsc#1250705 * bsc#1250738 * bsc#1250748 * bsc#1252712 * bsc#1252773 * bsc#1252784 * bsc#1252891 * bsc#1252900 * bsc#1253049 * bsc#1253078 * bsc#1253079 * bsc#1253087 * bsc#1253344 * bsc#1253500 * bsc#1253739 * bsc#1254244 * bsc#1254308 * bsc#1254447 * bsc#1254839 * bsc#1254842 * bsc#1254845 * bsc#1254977 * bsc#1255102 * bsc#1255128 * bsc#1255157 * bsc#1255164 * bsc#1255172 * bsc#1255216 * bsc#1255232 * bsc#1255241 * bsc#1255245 * bsc#1255266 * bsc#1255268 * bsc#1255269 * bsc#1255319 * bsc#1255327 * bsc#1255346 * bsc#1255403 * bsc#1255417 * bsc#1255459 * bsc#1255482 * bsc#1255506 * bsc#1255526 * bsc#1255527 * bsc#1255529 * bsc#1255530 * bsc#1255536 * bsc#1255537 * bsc#1255542 * bsc#1255544 * bsc#1255547 * bsc#1255569 * bsc#1255593 * bsc#1255622 * bsc#1255694 * bsc#1255695 * bsc#1255703 * bsc#1255708 * bsc#1255811 * bsc#1255930 * bsc#1256579 * bsc#1256582 * bsc#1256584 * bsc#1256586 * bsc#1256591 * bsc#1256592 * bsc#1256593 * bsc#1256594 * bsc#1256597 * bsc#1256605 * bsc#1256607 * bsc#1256608 * bsc#1256609 * bsc#1256610 * bsc#1256611 * bsc#1256612 * bsc#1256613 * bsc#1256616 * bsc#1256617 * bsc#1256619 * bsc#1256622 * bsc#1256623 * bsc#1256625 * bsc#1256627 * bsc#1256628 * bsc#1256630 * bsc#1256632 * bsc#1256638 * bsc#1256641 * bsc#1256643 * bsc#1256645 * bsc#1256646 * bsc#1256650 * bsc#1256651 * bsc#1256653 * bsc#1256654 * bsc#1256655 * bsc#1256656 * bsc#1256659 * bsc#1256660 * bsc#1256661 * bsc#1256664 * bsc#1256665 * bsc#1256667 * bsc#1256668 * bsc#1256674 * bsc#1256677 * bsc#1256680 * bsc#1256682 * bsc#1256683 * bsc#1256688 * bsc#1256689 * bsc#1256716 * bsc#1256726 * bsc#1256728 * bsc#1256730 * bsc#1256733 * bsc#1256737 * bsc#1256741 * bsc#1256742 * bsc#1256744 * bsc#1256748 * bsc#1256749 * bsc#1256752 * bsc#1256754 * bsc#1256755 * bsc#1256756 * bsc#1256757 * bsc#1256759 * bsc#1256760 * bsc#1256761 * bsc#1256763 * bsc#1256770 * bsc#1256773 * bsc#1256774 * bsc#1256777 * bsc#1256779 * bsc#1256781 * bsc#1256785 * bsc#1256792 * bsc#1256793 * bsc#1256794 * bsc#1256864 * bsc#1256865 * bsc#1256867 * bsc#1256975 * bsc#1257015 * bsc#1257035 * bsc#1257053 * bsc#1257154 * bsc#1257155 * bsc#1257158 * bsc#1257159 * bsc#1257163 * bsc#1257164 * bsc#1257167 * bsc#1257168 * bsc#1257179 * bsc#1257180 * bsc#1257202 * bsc#1257204 * bsc#1257207 * bsc#1257208 * bsc#1257215 * bsc#1257217 * bsc#1257218 * bsc#1257220 * bsc#1257221 * bsc#1257225 * bsc#1257227 * bsc#1257232 * bsc#1257234 * bsc#1257236 * bsc#1257243 * bsc#1257245 * bsc#1257276 * bsc#1257277 * bsc#1257279 * bsc#1257282 * bsc#1257296 * bsc#1257309 * bsc#1257473 * bsc#1257504 * bsc#1257603 * jsc#PED-10906 * jsc#PED-13728 * jsc#PED-14156 Cross-References: * CVE-2024-54031 * CVE-2025-37744 * CVE-2025-37751 * CVE-2025-37841 * CVE-2025-37845 * CVE-2025-37904 * CVE-2025-37955 * CVE-2025-38243 * CVE-2025-38262 * CVE-2025-38297 * CVE-2025-38298 * CVE-2025-38379 * CVE-2025-38423 * CVE-2025-38505 * CVE-2025-38507 * CVE-2025-38510 * CVE-2025-38511 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38521 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38539 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38547 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38551 * CVE-2025-38569 * CVE-2025-38589 * CVE-2025-38590 * CVE-2025-38645 * CVE-2025-39689 * CVE-2025-39795 * CVE-2025-39813 * CVE-2025-39814 * CVE-2025-39817 * CVE-2025-39829 * CVE-2025-39880 * CVE-2025-39913 * CVE-2025-39927 * CVE-2025-40030 * CVE-2025-40045 * CVE-2025-40097 * CVE-2025-40106 * CVE-2025-40147 * CVE-2025-40195 * CVE-2025-40257 * CVE-2025-40259 * CVE-2025-40261 * CVE-2025-40363 * CVE-2025-68174 * CVE-2025-68178 * CVE-2025-68188 * CVE-2025-68200 * CVE-2025-68211 * CVE-2025-68218 * CVE-2025-68227 * CVE-2025-68241 * CVE-2025-68245 * CVE-2025-68261 * CVE-2025-68296 * CVE-2025-68297 * CVE-2025-68320 * CVE-2025-68325 * CVE-2025-68337 * CVE-2025-68341 * CVE-2025-68348 * CVE-2025-68349 * CVE-2025-68356 * CVE-2025-68359 * CVE-2025-68360 * CVE-2025-68361 * CVE-2025-68366 * CVE-2025-68367 * CVE-2025-68368 * CVE-2025-68372 * CVE-2025-68374 * CVE-2025-68376 * CVE-2025-68379 * CVE-2025-68725 * CVE-2025-68735 * CVE-2025-68741 * CVE-2025-68743 * CVE-2025-68764 * CVE-2025-68768 * CVE-2025-68770 * CVE-2025-68771 * CVE-2025-68773 * CVE-2025-68775 * CVE-2025-68776 * CVE-2025-68777 * CVE-2025-68778 * CVE-2025-68783 * CVE-2025-68784 * CVE-2025-68788 * CVE-2025-68789 * CVE-2025-68792 * CVE-2025-68795 * CVE-2025-68797 * CVE-2025-68798 * CVE-2025-68799 * CVE-2025-68800 * CVE-2025-68801 * CVE-2025-68802 * CVE-2025-68803 * CVE-2025-68804 * CVE-2025-68808 * CVE-2025-68811 * CVE-2025-68813 * CVE-2025-68814 * CVE-2025-68815 * CVE-2025-68816 * CVE-2025-68819 * CVE-2025-68820 * CVE-2025-68821 * CVE-2025-68822 * CVE-2025-71064 * CVE-2025-71066 * CVE-2025-71073 * CVE-2025-71076 * CVE-2025-71077 * CVE-2025-71078 * CVE-2025-71079 * CVE-2025-71080 * CVE-2025-71081 * CVE-2025-71082 * CVE-2025-71083 * CVE-2025-71084 * CVE-2025-71085 * CVE-2025-71086 * CVE-2025-71087 * CVE-2025-71088 * CVE-2025-71089 * CVE-2025-71091 * CVE-2025-71093 * CVE-2025-71094 * CVE-2025-71095 * CVE-2025-71097 * CVE-2025-71098 * CVE-2025-71099 * CVE-2025-71100 * CVE-2025-71101 * CVE-2025-71108 * CVE-2025-71111 * CVE-2025-71112 * CVE-2025-71113 * CVE-2025-71114 * CVE-2025-71116 * CVE-2025-71118 * CVE-2025-71119 * CVE-2025-71120 * CVE-2025-71123 * CVE-2025-71126 * CVE-2025-71130 * CVE-2025-71131 * CVE-2025-71132 * CVE-2025-71133 * CVE-2025-71135 * CVE-2025-71136 * CVE-2025-71137 * CVE-2025-71138 * CVE-2025-71141 * CVE-2025-71142 * CVE-2025-71143 * CVE-2025-71145 * CVE-2025-71147 * CVE-2025-71148 * CVE-2025-71149 * CVE-2025-71154 * CVE-2025-71156 * CVE-2025-71157 * CVE-2025-71162 * CVE-2025-71163 * CVE-2026-22976 * CVE-2026-22977 * CVE-2026-22978 * CVE-2026-22981 * CVE-2026-22982 * CVE-2026-22984 * CVE-2026-22985 * CVE-2026-22986 * CVE-2026-22988 * CVE-2026-22989 * CVE-2026-22990 * CVE-2026-22991 * CVE-2026-22992 * CVE-2026-22993 * CVE-2026-22996 * CVE-2026-22997 * CVE-2026-22999 * CVE-2026-23000 * CVE-2026-23001 * CVE-2026-23002 * CVE-2026-23005 * CVE-2026-23006 * CVE-2026-23011 CVSS scores: * CVE-2024-54031 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37744 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37744 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38243 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38297 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38298 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38379 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38505 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38512 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38529 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38547 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38547 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39927 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39927 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40045 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40045 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40195 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40363 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40363 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68188 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68188 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68366 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68735 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68735 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68741 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68741 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68743 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68743 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68764 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-68764 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-68768 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68768 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68770 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68770 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68775 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68776 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68777 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68777 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68778 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68778 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68783 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-68788 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-68789 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68792 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68792 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68795 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68795 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68798 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68798 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68799 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68799 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-68800 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68801 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68802 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68802 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68803 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-68803 ( SUSE ): 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N * CVE-2025-68804 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68804 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68813 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68820 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71073 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71080 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-71080 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-71081 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71084 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71084 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71085 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71086 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71086 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71087 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71087 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71088 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71088 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71089 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71091 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71091 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71093 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-71093 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71094 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71094 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71097 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71099 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71099 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71100 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71100 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71101 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71101 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71108 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71112 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71113 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71114 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71114 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-71116 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-71118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71119 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71119 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71120 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71123 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71123 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-71126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71145 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71147 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71148 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-71149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71157 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71157 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71162 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22977 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22978 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-22981 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-22985 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22985 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22986 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22988 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-22988 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2026-22988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22990 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22999 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23001 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23002 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23005 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-23005 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2026-23006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves 205 vulnerabilities, contains three features and has 28 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344). * CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842). * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845). * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839). * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102). * CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327). * CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266). * CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269). * CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241). * CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319). * CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245). * CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216). * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157). * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268). * CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164). * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128). * CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403). * CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172). * CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417). * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482). * CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506). * CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694). * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544). * CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593). * CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542). * CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536). * CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526). * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622). * CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547). * CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527). * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537). * CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530). * CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529). * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure (bsc#1255695). * CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811). * CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703). * CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708). * CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930). * CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579). * CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584). * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582). * CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665). * CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659). * CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793). * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638). * CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656). * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688). * CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689). * CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643). * CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646). * CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653). * CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770). * CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677). * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641). * CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651). * CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680). * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674). * CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754). * CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667). * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654). * CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645). * CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613). * CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608). * CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622). * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623). * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628). * CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630). * CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612). * CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773). * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777). * CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597). * CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605). * CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607). * CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591). * CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726). * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744). * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779). * CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757). * CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755). * CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737). * CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733). * CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761). * CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760). * CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159). * CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164). * CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167). * CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168). * CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035). * CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053). * CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225). * CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179). * CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217). * CVE-2026-22986: gpiolib: fix race condition for gdev->srcu (bsc#1257276). * CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221). * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220). * CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218). * CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180). * CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv. * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236). * CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234). * CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232). * CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245). * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207). The following non security issues were fixed: * ALSA: usb-audio: Update for native DSD support quirks (stable-fixes). * Add bugnumber to an existing hv_netvsc change (bsc#1257473). * Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977). * Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792) * arm64: Update config files. Disable DEVPORT (bsc#1256792) * bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603). * bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569). * btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes). * btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes). * bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes). * drm/imagination: Wait for FW trace update command completion (git-fixes). * drm/msm/a6xx: fix bogus hwcg register updates (git-fixes). * ice: use netif_get_num_default_rss_queues() (bsc#1247712). * libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309). * mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087). * net: mana: Fix incorrect speed reported by debugfs (bsc#1255232). * net: mana: Support HW link state events (bsc#1253049). * nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015). * nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes). * powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199). * sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459). * scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864). * scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864). * scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296). * selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346). * slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes). * smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154). * smb: client: update cfid->last_access_time in open_cached_dir_by_dentry() (git-fixes). * smb: improve directory cache reuse for readdir operations (bsc#1252712). * tsm-mr: Add TVM Measurement Register support (bsc#1257504). * tsm-mr: Add tsm-mr sample code (bsc#1257504). * virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504). * virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504). * virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504). * wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes). * x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504). * x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-325=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * kernel-macros-6.12.0-160000.26.1 * kernel-devel-6.12.0-160000.26.1 * kernel-source-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le x86_64) * kernel-default-base-6.12.0-160000.26.1.160000.2.7 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.12.0-160000.26.1 * kernel-default-extra-6.12.0-160000.26.1 * kernel-default-extra-debuginfo-6.12.0-160000.26.1 * kernel-default-devel-6.12.0-160000.26.1 * kernel-default-debugsource-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (x86_64) * kernel-default-devel-debuginfo-6.12.0-160000.26.1 * kernel-rt-devel-debuginfo-6.12.0-160000.26.1 * kernel-rt-livepatch-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (aarch64 nosrc x86_64) * kernel-rt-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (aarch64 x86_64) * kernel-rt-devel-6.12.0-160000.26.1 * kernel-rt-debuginfo-6.12.0-160000.26.1 * kernel-rt-debugsource-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.26.1 * SUSE Linux Micro 6.2 (aarch64) * kernel-64kb-devel-6.12.0-160000.26.1 * kernel-64kb-debugsource-6.12.0-160000.26.1 * kernel-64kb-debuginfo-6.12.0-160000.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54031.html * https://www.suse.com/security/cve/CVE-2025-37744.html * https://www.suse.com/security/cve/CVE-2025-37751.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37845.html * https://www.suse.com/security/cve/CVE-2025-37904.html * https://www.suse.com/security/cve/CVE-2025-37955.html * https://www.suse.com/security/cve/CVE-2025-38243.html * https://www.suse.com/security/cve/CVE-2025-38262.html * https://www.suse.com/security/cve/CVE-2025-38297.html * https://www.suse.com/security/cve/CVE-2025-38298.html * https://www.suse.com/security/cve/CVE-2025-38379.html * https://www.suse.com/security/cve/CVE-2025-38423.html * https://www.suse.com/security/cve/CVE-2025-38505.html * https://www.suse.com/security/cve/CVE-2025-38507.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38521.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38547.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38551.html * https://www.suse.com/security/cve/CVE-2025-38569.html * https://www.suse.com/security/cve/CVE-2025-38589.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-39689.html * https://www.suse.com/security/cve/CVE-2025-39795.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39814.html * https://www.suse.com/security/cve/CVE-2025-39817.html * https://www.suse.com/security/cve/CVE-2025-39829.html * https://www.suse.com/security/cve/CVE-2025-39880.html * https://www.suse.com/security/cve/CVE-2025-39913.html * https://www.suse.com/security/cve/CVE-2025-39927.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40045.html * https://www.suse.com/security/cve/CVE-2025-40097.html * https://www.suse.com/security/cve/CVE-2025-40106.html * https://www.suse.com/security/cve/CVE-2025-40147.html * https://www.suse.com/security/cve/CVE-2025-40195.html * https://www.suse.com/security/cve/CVE-2025-40257.html * https://www.suse.com/security/cve/CVE-2025-40259.html * https://www.suse.com/security/cve/CVE-2025-40261.html * https://www.suse.com/security/cve/CVE-2025-40363.html * https://www.suse.com/security/cve/CVE-2025-68174.html * https://www.suse.com/security/cve/CVE-2025-68178.html * https://www.suse.com/security/cve/CVE-2025-68188.html * https://www.suse.com/security/cve/CVE-2025-68200.html * https://www.suse.com/security/cve/CVE-2025-68211.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68227.html * https://www.suse.com/security/cve/CVE-2025-68241.html * https://www.suse.com/security/cve/CVE-2025-68245.html * https://www.suse.com/security/cve/CVE-2025-68261.html * https://www.suse.com/security/cve/CVE-2025-68296.html * https://www.suse.com/security/cve/CVE-2025-68297.html * https://www.suse.com/security/cve/CVE-2025-68320.html * https://www.suse.com/security/cve/CVE-2025-68325.html * https://www.suse.com/security/cve/CVE-2025-68337.html * https://www.suse.com/security/cve/CVE-2025-68341.html * https://www.suse.com/security/cve/CVE-2025-68348.html * https://www.suse.com/security/cve/CVE-2025-68349.html * https://www.suse.com/security/cve/CVE-2025-68356.html * https://www.suse.com/security/cve/CVE-2025-68359.html * https://www.suse.com/security/cve/CVE-2025-68360.html * https://www.suse.com/security/cve/CVE-2025-68361.html * https://www.suse.com/security/cve/CVE-2025-68366.html * https://www.suse.com/security/cve/CVE-2025-68367.html * https://www.suse.com/security/cve/CVE-2025-68368.html * https://www.suse.com/security/cve/CVE-2025-68372.html * https://www.suse.com/security/cve/CVE-2025-68374.html * https://www.suse.com/security/cve/CVE-2025-68376.html * https://www.suse.com/security/cve/CVE-2025-68379.html * https://www.suse.com/security/cve/CVE-2025-68725.html * https://www.suse.com/security/cve/CVE-2025-68735.html * https://www.suse.com/security/cve/CVE-2025-68741.html * https://www.suse.com/security/cve/CVE-2025-68743.html * https://www.suse.com/security/cve/CVE-2025-68764.html * https://www.suse.com/security/cve/CVE-2025-68768.html * https://www.suse.com/security/cve/CVE-2025-68770.html * https://www.suse.com/security/cve/CVE-2025-68771.html * https://www.suse.com/security/cve/CVE-2025-68773.html * https://www.suse.com/security/cve/CVE-2025-68775.html * https://www.suse.com/security/cve/CVE-2025-68776.html * https://www.suse.com/security/cve/CVE-2025-68777.html * https://www.suse.com/security/cve/CVE-2025-68778.html * https://www.suse.com/security/cve/CVE-2025-68783.html * https://www.suse.com/security/cve/CVE-2025-68784.html * https://www.suse.com/security/cve/CVE-2025-68788.html * https://www.suse.com/security/cve/CVE-2025-68789.html * https://www.suse.com/security/cve/CVE-2025-68792.html * https://www.suse.com/security/cve/CVE-2025-68795.html * https://www.suse.com/security/cve/CVE-2025-68797.html * https://www.suse.com/security/cve/CVE-2025-68798.html * https://www.suse.com/security/cve/CVE-2025-68799.html * https://www.suse.com/security/cve/CVE-2025-68800.html * https://www.suse.com/security/cve/CVE-2025-68801.html * https://www.suse.com/security/cve/CVE-2025-68802.html * https://www.suse.com/security/cve/CVE-2025-68803.html * https://www.suse.com/security/cve/CVE-2025-68804.html * https://www.suse.com/security/cve/CVE-2025-68808.html * https://www.suse.com/security/cve/CVE-2025-68811.html * https://www.suse.com/security/cve/CVE-2025-68813.html * https://www.suse.com/security/cve/CVE-2025-68814.html * https://www.suse.com/security/cve/CVE-2025-68815.html * https://www.suse.com/security/cve/CVE-2025-68816.html * https://www.suse.com/security/cve/CVE-2025-68819.html * https://www.suse.com/security/cve/CVE-2025-68820.html * https://www.suse.com/security/cve/CVE-2025-68821.html * https://www.suse.com/security/cve/CVE-2025-68822.html * https://www.suse.com/security/cve/CVE-2025-71064.html * https://www.suse.com/security/cve/CVE-2025-71066.html * https://www.suse.com/security/cve/CVE-2025-71073.html * https://www.suse.com/security/cve/CVE-2025-71076.html * https://www.suse.com/security/cve/CVE-2025-71077.html * https://www.suse.com/security/cve/CVE-2025-71078.html * https://www.suse.com/security/cve/CVE-2025-71079.html * https://www.suse.com/security/cve/CVE-2025-71080.html * https://www.suse.com/security/cve/CVE-2025-71081.html * https://www.suse.com/security/cve/CVE-2025-71082.html * https://www.suse.com/security/cve/CVE-2025-71083.html * https://www.suse.com/security/cve/CVE-2025-71084.html * https://www.suse.com/security/cve/CVE-2025-71085.html * https://www.suse.com/security/cve/CVE-2025-71086.html * https://www.suse.com/security/cve/CVE-2025-71087.html * https://www.suse.com/security/cve/CVE-2025-71088.html * https://www.suse.com/security/cve/CVE-2025-71089.html * https://www.suse.com/security/cve/CVE-2025-71091.html * https://www.suse.com/security/cve/CVE-2025-71093.html * https://www.suse.com/security/cve/CVE-2025-71094.html * https://www.suse.com/security/cve/CVE-2025-71095.html * https://www.suse.com/security/cve/CVE-2025-71097.html * https://www.suse.com/security/cve/CVE-2025-71098.html * https://www.suse.com/security/cve/CVE-2025-71099.html * https://www.suse.com/security/cve/CVE-2025-71100.html * https://www.suse.com/security/cve/CVE-2025-71101.html * https://www.suse.com/security/cve/CVE-2025-71108.html * https://www.suse.com/security/cve/CVE-2025-71111.html * https://www.suse.com/security/cve/CVE-2025-71112.html * https://www.suse.com/security/cve/CVE-2025-71113.html * https://www.suse.com/security/cve/CVE-2025-71114.html * https://www.suse.com/security/cve/CVE-2025-71116.html * https://www.suse.com/security/cve/CVE-2025-71118.html * https://www.suse.com/security/cve/CVE-2025-71119.html * https://www.suse.com/security/cve/CVE-2025-71120.html * https://www.suse.com/security/cve/CVE-2025-71123.html * https://www.suse.com/security/cve/CVE-2025-71126.html * https://www.suse.com/security/cve/CVE-2025-71130.html * https://www.suse.com/security/cve/CVE-2025-71131.html * https://www.suse.com/security/cve/CVE-2025-71132.html * https://www.suse.com/security/cve/CVE-2025-71133.html * https://www.suse.com/security/cve/CVE-2025-71135.html * https://www.suse.com/security/cve/CVE-2025-71136.html * https://www.suse.com/security/cve/CVE-2025-71137.html * https://www.suse.com/security/cve/CVE-2025-71138.html * https://www.suse.com/security/cve/CVE-2025-71141.html * https://www.suse.com/security/cve/CVE-2025-71142.html * https://www.suse.com/security/cve/CVE-2025-71143.html * https://www.suse.com/security/cve/CVE-2025-71145.html * https://www.suse.com/security/cve/CVE-2025-71147.html * https://www.suse.com/security/cve/CVE-2025-71148.html * https://www.suse.com/security/cve/CVE-2025-71149.html * https://www.suse.com/security/cve/CVE-2025-71154.html * https://www.suse.com/security/cve/CVE-2025-71156.html * https://www.suse.com/security/cve/CVE-2025-71157.html * https://www.suse.com/security/cve/CVE-2025-71162.html * https://www.suse.com/security/cve/CVE-2025-71163.html * https://www.suse.com/security/cve/CVE-2026-22976.html * https://www.suse.com/security/cve/CVE-2026-22977.html * https://www.suse.com/security/cve/CVE-2026-22978.html * https://www.suse.com/security/cve/CVE-2026-22981.html * https://www.suse.com/security/cve/CVE-2026-22982.html * https://www.suse.com/security/cve/CVE-2026-22984.html * https://www.suse.com/security/cve/CVE-2026-22985.html * https://www.suse.com/security/cve/CVE-2026-22986.html * https://www.suse.com/security/cve/CVE-2026-22988.html * https://www.suse.com/security/cve/CVE-2026-22989.html * https://www.suse.com/security/cve/CVE-2026-22990.html * https://www.suse.com/security/cve/CVE-2026-22991.html * https://www.suse.com/security/cve/CVE-2026-22992.html * https://www.suse.com/security/cve/CVE-2026-22993.html * https://www.suse.com/security/cve/CVE-2026-22996.html * https://www.suse.com/security/cve/CVE-2026-22997.html * https://www.suse.com/security/cve/CVE-2026-22999.html * https://www.suse.com/security/cve/CVE-2026-23000.html * https://www.suse.com/security/cve/CVE-2026-23001.html * https://www.suse.com/security/cve/CVE-2026-23002.html * https://www.suse.com/security/cve/CVE-2026-23005.html * https://www.suse.com/security/cve/CVE-2026-23006.html * https://www.suse.com/security/cve/CVE-2026-23011.html * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1235905 * https://bugzilla.suse.com/show_bug.cgi?id=1242505 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242986 * https://bugzilla.suse.com/show_bug.cgi?id=1243452 * https://bugzilla.suse.com/show_bug.cgi?id=1243507 * https://bugzilla.suse.com/show_bug.cgi?id=1243662 * https://bugzilla.suse.com/show_bug.cgi?id=1246184 * https://bugzilla.suse.com/show_bug.cgi?id=1246282 * https://bugzilla.suse.com/show_bug.cgi?id=1247030 * https://bugzilla.suse.com/show_bug.cgi?id=1247292 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248175 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248185 * https://bugzilla.suse.com/show_bug.cgi?id=1248188 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248222 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248232 * https://bugzilla.suse.com/show_bug.cgi?id=1248234 * https://bugzilla.suse.com/show_bug.cgi?id=1248240 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248366 * https://bugzilla.suse.com/show_bug.cgi?id=1248384 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1249307 * https://bugzilla.suse.com/show_bug.cgi?id=1249609 * https://bugzilla.suse.com/show_bug.cgi?id=1249895 * https://bugzilla.suse.com/show_bug.cgi?id=1249998 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250082 * https://bugzilla.suse.com/show_bug.cgi?id=1250388 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250738 * https://bugzilla.suse.com/show_bug.cgi?id=1250748 * https://bugzilla.suse.com/show_bug.cgi?id=1252712 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252784 * https://bugzilla.suse.com/show_bug.cgi?id=1252891 * https://bugzilla.suse.com/show_bug.cgi?id=1252900 * https://bugzilla.suse.com/show_bug.cgi?id=1253049 * https://bugzilla.suse.com/show_bug.cgi?id=1253078 * https://bugzilla.suse.com/show_bug.cgi?id=1253079 * https://bugzilla.suse.com/show_bug.cgi?id=1253087 * https://bugzilla.suse.com/show_bug.cgi?id=1253344 * https://bugzilla.suse.com/show_bug.cgi?id=1253500 * https://bugzilla.suse.com/show_bug.cgi?id=1253739 * https://bugzilla.suse.com/show_bug.cgi?id=1254244 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254447 * https://bugzilla.suse.com/show_bug.cgi?id=1254839 * https://bugzilla.suse.com/show_bug.cgi?id=1254842 * https://bugzilla.suse.com/show_bug.cgi?id=1254845 * https://bugzilla.suse.com/show_bug.cgi?id=1254977 * https://bugzilla.suse.com/show_bug.cgi?id=1255102 * https://bugzilla.suse.com/show_bug.cgi?id=1255128 * https://bugzilla.suse.com/show_bug.cgi?id=1255157 * https://bugzilla.suse.com/show_bug.cgi?id=1255164 * https://bugzilla.suse.com/show_bug.cgi?id=1255172 * https://bugzilla.suse.com/show_bug.cgi?id=1255216 * https://bugzilla.suse.com/show_bug.cgi?id=1255232 * https://bugzilla.suse.com/show_bug.cgi?id=1255241 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255266 * https://bugzilla.suse.com/show_bug.cgi?id=1255268 * https://bugzilla.suse.com/show_bug.cgi?id=1255269 * https://bugzilla.suse.com/show_bug.cgi?id=1255319 * https://bugzilla.suse.com/show_bug.cgi?id=1255327 * https://bugzilla.suse.com/show_bug.cgi?id=1255346 * https://bugzilla.suse.com/show_bug.cgi?id=1255403 * https://bugzilla.suse.com/show_bug.cgi?id=1255417 * https://bugzilla.suse.com/show_bug.cgi?id=1255459 * https://bugzilla.suse.com/show_bug.cgi?id=1255482 * https://bugzilla.suse.com/show_bug.cgi?id=1255506 * https://bugzilla.suse.com/show_bug.cgi?id=1255526 * https://bugzilla.suse.com/show_bug.cgi?id=1255527 * https://bugzilla.suse.com/show_bug.cgi?id=1255529 * https://bugzilla.suse.com/show_bug.cgi?id=1255530 * https://bugzilla.suse.com/show_bug.cgi?id=1255536 * https://bugzilla.suse.com/show_bug.cgi?id=1255537 * https://bugzilla.suse.com/show_bug.cgi?id=1255542 * https://bugzilla.suse.com/show_bug.cgi?id=1255544 * https://bugzilla.suse.com/show_bug.cgi?id=1255547 * https://bugzilla.suse.com/show_bug.cgi?id=1255569 * https://bugzilla.suse.com/show_bug.cgi?id=1255593 * https://bugzilla.suse.com/show_bug.cgi?id=1255622 * https://bugzilla.suse.com/show_bug.cgi?id=1255694 * https://bugzilla.suse.com/show_bug.cgi?id=1255695 * https://bugzilla.suse.com/show_bug.cgi?id=1255703 * https://bugzilla.suse.com/show_bug.cgi?id=1255708 * https://bugzilla.suse.com/show_bug.cgi?id=1255811 * https://bugzilla.suse.com/show_bug.cgi?id=1255930 * https://bugzilla.suse.com/show_bug.cgi?id=1256579 * https://bugzilla.suse.com/show_bug.cgi?id=1256582 * https://bugzilla.suse.com/show_bug.cgi?id=1256584 * https://bugzilla.suse.com/show_bug.cgi?id=1256586 * https://bugzilla.suse.com/show_bug.cgi?id=1256591 * https://bugzilla.suse.com/show_bug.cgi?id=1256592 * https://bugzilla.suse.com/show_bug.cgi?id=1256593 * https://bugzilla.suse.com/show_bug.cgi?id=1256594 * https://bugzilla.suse.com/show_bug.cgi?id=1256597 * https://bugzilla.suse.com/show_bug.cgi?id=1256605 * https://bugzilla.suse.com/show_bug.cgi?id=1256607 * https://bugzilla.suse.com/show_bug.cgi?id=1256608 * https://bugzilla.suse.com/show_bug.cgi?id=1256609 * https://bugzilla.suse.com/show_bug.cgi?id=1256610 * https://bugzilla.suse.com/show_bug.cgi?id=1256611 * https://bugzilla.suse.com/show_bug.cgi?id=1256612 * https://bugzilla.suse.com/show_bug.cgi?id=1256613 * https://bugzilla.suse.com/show_bug.cgi?id=1256616 * https://bugzilla.suse.com/show_bug.cgi?id=1256617 * https://bugzilla.suse.com/show_bug.cgi?id=1256619 * https://bugzilla.suse.com/show_bug.cgi?id=1256622 * https://bugzilla.suse.com/show_bug.cgi?id=1256623 * https://bugzilla.suse.com/show_bug.cgi?id=1256625 * https://bugzilla.suse.com/show_bug.cgi?id=1256627 * https://bugzilla.suse.com/show_bug.cgi?id=1256628 * https://bugzilla.suse.com/show_bug.cgi?id=1256630 * https://bugzilla.suse.com/show_bug.cgi?id=1256632 * https://bugzilla.suse.com/show_bug.cgi?id=1256638 * https://bugzilla.suse.com/show_bug.cgi?id=1256641 * https://bugzilla.suse.com/show_bug.cgi?id=1256643 * https://bugzilla.suse.com/show_bug.cgi?id=1256645 * https://bugzilla.suse.com/show_bug.cgi?id=1256646 * https://bugzilla.suse.com/show_bug.cgi?id=1256650 * https://bugzilla.suse.com/show_bug.cgi?id=1256651 * https://bugzilla.suse.com/show_bug.cgi?id=1256653 * https://bugzilla.suse.com/show_bug.cgi?id=1256654 * https://bugzilla.suse.com/show_bug.cgi?id=1256655 * https://bugzilla.suse.com/show_bug.cgi?id=1256656 * https://bugzilla.suse.com/show_bug.cgi?id=1256659 * https://bugzilla.suse.com/show_bug.cgi?id=1256660 * https://bugzilla.suse.com/show_bug.cgi?id=1256661 * https://bugzilla.suse.com/show_bug.cgi?id=1256664 * https://bugzilla.suse.com/show_bug.cgi?id=1256665 * https://bugzilla.suse.com/show_bug.cgi?id=1256667 * https://bugzilla.suse.com/show_bug.cgi?id=1256668 * https://bugzilla.suse.com/show_bug.cgi?id=1256674 * https://bugzilla.suse.com/show_bug.cgi?id=1256677 * https://bugzilla.suse.com/show_bug.cgi?id=1256680 * https://bugzilla.suse.com/show_bug.cgi?id=1256682 * https://bugzilla.suse.com/show_bug.cgi?id=1256683 * https://bugzilla.suse.com/show_bug.cgi?id=1256688 * https://bugzilla.suse.com/show_bug.cgi?id=1256689 * https://bugzilla.suse.com/show_bug.cgi?id=1256716 * https://bugzilla.suse.com/show_bug.cgi?id=1256726 * https://bugzilla.suse.com/show_bug.cgi?id=1256728 * https://bugzilla.suse.com/show_bug.cgi?id=1256730 * https://bugzilla.suse.com/show_bug.cgi?id=1256733 * https://bugzilla.suse.com/show_bug.cgi?id=1256737 * https://bugzilla.suse.com/show_bug.cgi?id=1256741 * https://bugzilla.suse.com/show_bug.cgi?id=1256742 * https://bugzilla.suse.com/show_bug.cgi?id=1256744 * https://bugzilla.suse.com/show_bug.cgi?id=1256748 * https://bugzilla.suse.com/show_bug.cgi?id=1256749 * https://bugzilla.suse.com/show_bug.cgi?id=1256752 * https://bugzilla.suse.com/show_bug.cgi?id=1256754 * https://bugzilla.suse.com/show_bug.cgi?id=1256755 * https://bugzilla.suse.com/show_bug.cgi?id=1256756 * https://bugzilla.suse.com/show_bug.cgi?id=1256757 * https://bugzilla.suse.com/show_bug.cgi?id=1256759 * https://bugzilla.suse.com/show_bug.cgi?id=1256760 * https://bugzilla.suse.com/show_bug.cgi?id=1256761 * https://bugzilla.suse.com/show_bug.cgi?id=1256763 * https://bugzilla.suse.com/show_bug.cgi?id=1256770 * https://bugzilla.suse.com/show_bug.cgi?id=1256773 * https://bugzilla.suse.com/show_bug.cgi?id=1256774 * https://bugzilla.suse.com/show_bug.cgi?id=1256777 * https://bugzilla.suse.com/show_bug.cgi?id=1256779 * https://bugzilla.suse.com/show_bug.cgi?id=1256781 * https://bugzilla.suse.com/show_bug.cgi?id=1256785 * https://bugzilla.suse.com/show_bug.cgi?id=1256792 * https://bugzilla.suse.com/show_bug.cgi?id=1256793 * https://bugzilla.suse.com/show_bug.cgi?id=1256794 * https://bugzilla.suse.com/show_bug.cgi?id=1256864 * https://bugzilla.suse.com/show_bug.cgi?id=1256865 * https://bugzilla.suse.com/show_bug.cgi?id=1256867 * https://bugzilla.suse.com/show_bug.cgi?id=1256975 * https://bugzilla.suse.com/show_bug.cgi?id=1257015 * https://bugzilla.suse.com/show_bug.cgi?id=1257035 * https://bugzilla.suse.com/show_bug.cgi?id=1257053 * https://bugzilla.suse.com/show_bug.cgi?id=1257154 * https://bugzilla.suse.com/show_bug.cgi?id=1257155 * https://bugzilla.suse.com/show_bug.cgi?id=1257158 * https://bugzilla.suse.com/show_bug.cgi?id=1257159 * https://bugzilla.suse.com/show_bug.cgi?id=1257163 * https://bugzilla.suse.com/show_bug.cgi?id=1257164 * https://bugzilla.suse.com/show_bug.cgi?id=1257167 * https://bugzilla.suse.com/show_bug.cgi?id=1257168 * https://bugzilla.suse.com/show_bug.cgi?id=1257179 * https://bugzilla.suse.com/show_bug.cgi?id=1257180 * https://bugzilla.suse.com/show_bug.cgi?id=1257202 * https://bugzilla.suse.com/show_bug.cgi?id=1257204 * https://bugzilla.suse.com/show_bug.cgi?id=1257207 * https://bugzilla.suse.com/show_bug.cgi?id=1257208 * https://bugzilla.suse.com/show_bug.cgi?id=1257215 * https://bugzilla.suse.com/show_bug.cgi?id=1257217 * https://bugzilla.suse.com/show_bug.cgi?id=1257218 * https://bugzilla.suse.com/show_bug.cgi?id=1257220 * https://bugzilla.suse.com/show_bug.cgi?id=1257221 * https://bugzilla.suse.com/show_bug.cgi?id=1257225 * https://bugzilla.suse.com/show_bug.cgi?id=1257227 * https://bugzilla.suse.com/show_bug.cgi?id=1257232 * https://bugzilla.suse.com/show_bug.cgi?id=1257234 * https://bugzilla.suse.com/show_bug.cgi?id=1257236 * https://bugzilla.suse.com/show_bug.cgi?id=1257243 * https://bugzilla.suse.com/show_bug.cgi?id=1257245 * https://bugzilla.suse.com/show_bug.cgi?id=1257276 * https://bugzilla.suse.com/show_bug.cgi?id=1257277 * https://bugzilla.suse.com/show_bug.cgi?id=1257279 * https://bugzilla.suse.com/show_bug.cgi?id=1257282 * https://bugzilla.suse.com/show_bug.cgi?id=1257296 * https://bugzilla.suse.com/show_bug.cgi?id=1257309 * https://bugzilla.suse.com/show_bug.cgi?id=1257473 * https://bugzilla.suse.com/show_bug.cgi?id=1257504 * https://bugzilla.suse.com/show_bug.cgi?id=1257603 * https://jira.suse.com/browse/PED-10906 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-14156 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:27 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:27 -0000 Subject: SUSE-RU-2026:20554-1: important: Recommended update for aaa_base Message-ID: <177271760720.1901.17446427939515107112@13ea24840d99> # Recommended update for aaa_base Announcement ID: SUSE-RU-2026:20554-1 Release Date: 2026-02-27T10:33:38Z Rating: important References: * bsc#1247286 * bsc#1247495 * bsc#1248158 * bsc#1249686 * bsc#1250513 * bsc#1257875 * jsc#PED-13807 * jsc#PED-14803 Affected Products: * SUSE Linux Micro 6.2 An update that contains two features and has six fixes can now be installed. ## Description: This update for aaa_base fixes the following issues: * Update to version 84.87+git20260210.ecce285: * For boo#1257875 get intrinsic DEFAULT_WM back * DIR_COLORS: add vt220 and .jxl * Update to version 84.87+git20260112.8f614f3: * add ghost entries for the removed dirs * Revert list directories above all normal files. * Update to version 84.87+git20251217.34fd7bc: * add tmpfiles template adm-backup.conf (jsc#PED-14803) * Fix old script to support copy mode as well * Support for XDG environment variables for the su, * adapted sugggestions * Patching nsswitch.conf only if it has not been generated by nsswitch-config (jsc#PED-13807). * Avoid nasty exceptions running tput * Update to version 84.87+git20251111.509a363: * Avoid escape sequences on dump terminal of s390 * Update to version 84.87+git20251111.16d9d43: * Set XDG environment variables consistently without trailing slash * Update to version 84.87+git20251110.af063e6: * Avoid escape sequences on dump terminal of s390 * Set erase character from kbs entry of terminfo * Update to version 84.87+git20251030.441f926: * Add systemd to /etc/nsswitch.conf (bsc#1250513) * Add group-directories-first option * prevent normal users from accessing dmesg (bsc#1249686) * Use explicit defaults for XDG environment variables * Update to version 84.87+git20250903.33e5ba4: * Correct fix for (bsc#1247495, bsc#1248158) * Update to version 84.87+git20250805.3069494: * Remove initviocons for tcsh as well and * Update csh.login * Add missing quoting and remove unneeded uses of eval * Update to version 84.87+git20250801.f305627: * Remove sysconfig.language (bsc#1247286) * Update to version 84.87+git20250801.b2fa3fe: * Allow /etc/locale.conf to have no newline ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-327=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * aaa_base-debuginfo-84.87+git20260210.ecce285-160000.1.1 * aaa_base-84.87+git20260210.ecce285-160000.1.1 * aaa_base-debugsource-84.87+git20260210.ecce285-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1247286 * https://bugzilla.suse.com/show_bug.cgi?id=1247495 * https://bugzilla.suse.com/show_bug.cgi?id=1248158 * https://bugzilla.suse.com/show_bug.cgi?id=1249686 * https://bugzilla.suse.com/show_bug.cgi?id=1250513 * https://bugzilla.suse.com/show_bug.cgi?id=1257875 * https://jira.suse.com/browse/PED-13807 * https://jira.suse.com/browse/PED-14803 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:30 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:30 -0000 Subject: SUSE-RU-2026:20553-1: moderate: Recommended update for open-vm-tools Message-ID: <177271761003.1901.13661309472021763866@13ea24840d99> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2026:20553-1 Release Date: 2026-02-27T08:54:00Z Rating: moderate References: * bsc#1257357 Affected Products: * SUSE Linux Micro 6.2 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * update to 13.0.10 based on build 25056151: (boo#1257357): * There are no new features in the open-vm-tools 13.0.10 release. * This is primarily a maintenance release that addresses a fix. * A minor enhancement has been made for Guest OS Customization. * The DeployPkg plugin has been updated to handle a new cloud-init error code that signals a recoverable error and allow cloud-init to finish running. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-320=1 ## Package List: * SUSE Linux Micro 6.2 (x86_64) * open-vm-tools-debugsource-13.0.10-160000.1.1 * libvmtools0-13.0.10-160000.1.1 * libvmtools0-debuginfo-13.0.10-160000.1.1 * open-vm-tools-13.0.10-160000.1.1 * open-vm-tools-debuginfo-13.0.10-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257357 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:49 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:49 -0000 Subject: SUSE-SU-2026:20551-1: important: Security update for kubevirt Message-ID: <177271762963.1901.4317767021380512397@13ea24840d99> # Security update for kubevirt Announcement ID: SUSE-SU-2026:20551-1 Release Date: 2026-02-27T08:49:48Z Rating: important References: * bsc#1241772 * bsc#1253181 * bsc#1253185 * bsc#1253186 * bsc#1253189 * bsc#1253194 * bsc#1253748 * bsc#1257128 * bsc#1257422 Cross-References: * CVE-2024-45310 * CVE-2025-22872 * CVE-2025-64324 * CVE-2025-64432 * CVE-2025-64433 * CVE-2025-64434 * CVE-2025-64435 * CVE-2025-64437 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-64324 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64324 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64433 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-64433 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64433 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64434 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-64434 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64435 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64435 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-64435 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64437 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-64437 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2025-64437 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.2 An update that solves eight vulnerabilities and has one fix can now be installed. ## Description: This update for kubevirt fixes the following issues: Update to version 1.7.0 (bsc#1257128). Security issues fixed: * CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS (bsc#1253189). * CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into creating empty files/directories on host (bsc#1257422). * CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241772). * CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls (bsc#1253181). * CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185). * CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations (bsc#1253186). * CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194). * CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users (bsc#1253748). Other updates and bugfixes: * Upstream now uses stateless firmware for CoCo VMs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-319=1 ## Package List: * SUSE Linux Micro 6.2 (x86_64) * kubevirt-manifests-1.7.0-160000.1.1 * kubevirt-virtctl-debuginfo-1.7.0-160000.1.1 * kubevirt-virtctl-1.7.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-64324.html * https://www.suse.com/security/cve/CVE-2025-64432.html * https://www.suse.com/security/cve/CVE-2025-64433.html * https://www.suse.com/security/cve/CVE-2025-64434.html * https://www.suse.com/security/cve/CVE-2025-64435.html * https://www.suse.com/security/cve/CVE-2025-64437.html * https://bugzilla.suse.com/show_bug.cgi?id=1241772 * https://bugzilla.suse.com/show_bug.cgi?id=1253181 * https://bugzilla.suse.com/show_bug.cgi?id=1253185 * https://bugzilla.suse.com/show_bug.cgi?id=1253186 * https://bugzilla.suse.com/show_bug.cgi?id=1253189 * https://bugzilla.suse.com/show_bug.cgi?id=1253194 * https://bugzilla.suse.com/show_bug.cgi?id=1253748 * https://bugzilla.suse.com/show_bug.cgi?id=1257128 * https://bugzilla.suse.com/show_bug.cgi?id=1257422 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:33 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:33 -0000 Subject: SUSE-RU-2026:20552-1: important: Recommended update for fde-tools Message-ID: <177271761379.1901.5030403942763811099@13ea24840d99> # Recommended update for fde-tools Announcement ID: SUSE-RU-2026:20552-1 Release Date: 2026-02-27T08:51:15Z Rating: important References: * bsc#1248516 * jsc#PED-14754 Affected Products: * SUSE Linux Micro 6.2 An update that contains one feature and has one fix can now be installed. ## Description: This update for fde-tools fixes the following issues: * Add support for persistent SRK (bsc#1248516) * Add fde-tools.conf to create /var/log/fde with tmpfiles.d (jsc#PED-14754) * Build with distro flags ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-322=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * fde-tpm-helper-0.7.3-160000.3.1 * fde-firstboot-0.7.3-160000.3.1 * SUSE Linux Micro 6.2 (aarch64 x86_64) * fde-tools-debugsource-0.7.3-160000.3.1 * fde-tools-debuginfo-0.7.3-160000.3.1 * fde-tools-0.7.3-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1248516 * https://jira.suse.com/browse/PED-14754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:56 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:56 -0000 Subject: SUSE-SU-2026:20550-1: important: Security update for containerized-data-importer Message-ID: <177271763608.1901.7423489669409356424@13ea24840d99> # Security update for containerized-data-importer Announcement ID: SUSE-SU-2026:20550-1 Release Date: 2026-02-26T16:03:48Z Rating: important References: * bsc#1235204 * bsc#1235365 * bsc#1239205 Cross-References: * CVE-2024-28180 * CVE-2024-45338 * CVE-2025-22868 CVSS scores: * CVE-2024-28180 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-28180 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-28180 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-45338 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45338 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45338 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22868 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for containerized-data-importer fixes the following issues: Update to version 1.64.0. Security issues fixed: * CVE-2024-28180: improper handling of highly compressed data (bsc#1235204). * CVE-2024-45338: denial of service due to non-linear parsing of case- insensitive content (bsc#1235365). * CVE-2025-22868: unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239205). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-317=1 ## Package List: * SUSE Linux Micro 6.2 (x86_64) * containerized-data-importer-manifests-1.64.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-28180.html * https://www.suse.com/security/cve/CVE-2024-45338.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://bugzilla.suse.com/show_bug.cgi?id=1235204 * https://bugzilla.suse.com/show_bug.cgi?id=1235365 * https://bugzilla.suse.com/show_bug.cgi?id=1239205 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:59 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:59 -0000 Subject: SUSE-RU-2026:20548-1: low: Recommended update for openssl-3 Message-ID: <177271763927.1901.3885024856926524707@13ea24840d99> # Recommended update for openssl-3 Announcement ID: SUSE-RU-2026:20548-1 Release Date: 2026-02-26T07:46:12Z Rating: low References: Affected Products: * SUSE Linux Micro 6.2 An update that can now be installed. ## Description: This update for openssl-3 fixes the following issues: * removed test patches because they are not needed. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-310=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * openssl-3-3.5.0-160000.6.1 * libopenssl-3-devel-3.5.0-160000.6.1 * libopenssl-3-fips-provider-debuginfo-3.5.0-160000.6.1 * openssl-3-debuginfo-3.5.0-160000.6.1 * libopenssl3-3.5.0-160000.6.1 * libopenssl-3-fips-provider-3.5.0-160000.6.1 * libopenssl3-debuginfo-3.5.0-160000.6.1 * openssl-3-debugsource-3.5.0-160000.6.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:33:57 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:33:57 -0000 Subject: SUSE-RU-2026:20549-1: moderate: Recommended update for gcc15 Message-ID: <177271763736.1901.18257809749674598139@13ea24840d99> # Recommended update for gcc15 Announcement ID: SUSE-RU-2026:20549-1 Release Date: 2026-02-26T13:48:59Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.2 An update that can now be installed. ## Description: This update for gcc15 fixes the following issues: Update to GCC 15.2 release * the GCC 15.2 release contains regression fixes accumulated since the GCC 15.1 release * Fixes PR120714, RISC-V: incorrect frame pointer CFA address for stack-clash protection loops ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-314=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libtsan2-debuginfo-15.2.0+git10201-160000.1.1 * libatomic1-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-debugsource-15.2.0+git10201-160000.1.1 * libitm1-debuginfo-15.2.0+git10201-160000.1.1 * liblsan0-15.2.0+git10201-160000.1.1 * libubsan1-15.2.0+git10201-160000.1.1 * libasan8-debuginfo-15.2.0+git10201-160000.1.1 * libstdc++6-15.2.0+git10201-160000.1.1 * libgcc_s1-15.2.0+git10201-160000.1.1 * libitm1-15.2.0+git10201-160000.1.1 * libgomp1-debuginfo-15.2.0+git10201-160000.1.1 * libstdc++6-debuginfo-15.2.0+git10201-160000.1.1 * libasan8-15.2.0+git10201-160000.1.1 * libatomic1-15.2.0+git10201-160000.1.1 * libtsan2-15.2.0+git10201-160000.1.1 * libgomp1-15.2.0+git10201-160000.1.1 * liblsan0-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-debuginfo-15.2.0+git10201-160000.1.1 * libgcc_s1-debuginfo-15.2.0+git10201-160000.1.1 * libubsan1-debuginfo-15.2.0+git10201-160000.1.1 * SUSE Linux Micro 6.2 (aarch64 x86_64) * libhwasan0-15.2.0+git10201-160000.1.1 * libhwasan0-debuginfo-15.2.0+git10201-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:02 -0000 Subject: SUSE-RU-2026:20547-1: important: Recommended update for lvm2 Message-ID: <177271764232.1901.12831474660640835750@13ea24840d99> # Recommended update for lvm2 Announcement ID: SUSE-RU-2026:20547-1 Release Date: 2026-02-20T15:43:32Z Rating: important References: * bsc#1257661 Affected Products: * SUSE Linux Micro 6.2 An update that has one fix can now be installed. ## Description: This update for lvm2 fixes the following issues: * L3: LVM_SUPPRESS_FD_WARNINGS is no longer effective (bsc#1257661) * libdaemon: fix suppressing stray fd warnings ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-305=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * liblvm2cmd2_03-2.03.29-160000.3.1 * libdevmapper-event1_03-2.03.29_1.02.203-160000.3.1 * libdevmapper1_03-debuginfo-2.03.29_1.02.203-160000.3.1 * device-mapper-2.03.29_1.02.203-160000.3.1 * liblvm2cmd2_03-debuginfo-2.03.29-160000.3.1 * libdevmapper-event1_03-debuginfo-2.03.29_1.02.203-160000.3.1 * device-mapper-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-device-mapper-debugsource-2.03.29-160000.3.1 * libdevmapper1_03-2.03.29_1.02.203-160000.3.1 * lvm2-debugsource-2.03.29-160000.3.1 * lvm2-2.03.29-160000.3.1 * lvm2-debuginfo-2.03.29-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257661 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:11 -0000 Subject: SUSE-OU-2026:20545-1: moderate: Optional update for nvidia-open-driver-G07-signed Message-ID: <177271765175.1901.13793773857338990524@13ea24840d99> # Optional update for nvidia-open-driver-G07-signed Announcement ID: SUSE-OU-2026:20545-1 Release Date: 2026-02-20T09:33:09Z Rating: moderate References: * jsc#PED-15510 Affected Products: * SUSE Linux Micro 6.2 An update that contains one feature can now be installed. ## Description: This update for nvidia-open-driver-G07-signed fixes the following issues: The G07 opensource NVidia driver is being added. (jsc#PED-15510) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-302=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 x86_64) * nvidia-open-driver-G07-signed-cuda-debugsource-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-debugsource-590.48.01-160000.1.1 * SUSE Linux Micro 6.2 (x86_64) * nvidia-open-driver-G07-signed-kmp-default-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-debuginfo-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-debuginfo-590.48.01_k6.12.0_160000.25-160000.1.1 * SUSE Linux Micro 6.2 (aarch64) * nvidia-open-driver-G07-signed-kmp-64kb-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-64kb-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-64kb-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-kmp-64kb-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-590.48.01_k6.12.0_160000.9-160000.1.1 ## References: * https://jira.suse.com/browse/PED-15510 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:36 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:36 -0000 Subject: SUSE-SU-2026:20542-1: critical: Security update for openssl-3-livepatches Message-ID: <177271767606.1901.11175820533009893031@13ea24840d99> # Security update for openssl-3-livepatches Announcement ID: SUSE-SU-2026:20542-1 Release Date: 2026-02-18T16:22:39Z Rating: critical References: * bsc#1250410 * bsc#1256876 * bsc#1256878 * bsc#1256880 Cross-References: * CVE-2025-11187 * CVE-2025-15467 * CVE-2025-15468 * CVE-2025-9230 CVSS scores: * CVE-2025-11187 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11187 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11187 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H * CVE-2025-15467 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-15467 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-15468 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-15468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-15468 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves four vulnerabilities can now be installed. ## Description: This update for openssl-3-livepatches fixes the following issues: * CVE-2025-11187: Fixed improper validation of PBMAC1 parameters in PKCS#12 MAC verification (bsc#1256878). * CVE-2025-15467: Fixed stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256876). * CVE-2025-15468: Fixed NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (bsc#1256880). * CVE-2025-9230: Fixed out-of-bounds read & write in RFC 3211 KEK Unwrap (bsc#1250410). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-298=1 ## Package List: * SUSE Linux Micro 6.2 (ppc64le x86_64) * openssl-3-livepatches-0.3-160000.1.1 * SUSE Linux Micro 6.2 (x86_64) * openssl-3-livepatches-debugsource-0.3-160000.1.1 * openssl-3-livepatches-debuginfo-0.3-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11187.html * https://www.suse.com/security/cve/CVE-2025-15467.html * https://www.suse.com/security/cve/CVE-2025-15468.html * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250410 * https://bugzilla.suse.com/show_bug.cgi?id=1256876 * https://bugzilla.suse.com/show_bug.cgi?id=1256878 * https://bugzilla.suse.com/show_bug.cgi?id=1256880 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:27 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:27 -0000 Subject: SUSE-SU-2026:20543-1: important: Security update for python313 Message-ID: <177271766782.1901.11267105608683586549@13ea24840d99> # Security update for python313 Announcement ID: SUSE-SU-2026:20543-1 Release Date: 2026-02-19T11:59:12Z Rating: important References: * bsc#1257029 * bsc#1257031 * bsc#1257042 * bsc#1257046 * bsc#1257181 Cross-References: * CVE-2025-11468 * CVE-2025-15282 * CVE-2026-0672 * CVE-2026-0865 * CVE-2026-1299 CVSS scores: * CVE-2025-11468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-11468 ( NVD ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-15282 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-15282 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0672 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0672 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0865 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2026-0865 ( NVD ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-1299 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-1299 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-1299 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.2 An update that solves five vulnerabilities can now be installed. ## Description: This update for python313 fixes the following issues: Update to version 3.13.12. Security issues fixed: * CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable characters (bsc#1257029). * CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046). * CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel (bsc#1257031). * CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042). * CVE-2026-1299: header injection when an email is serialized due to improper newline quoting in `BytesGenerator` (bsc#1257181). Other updates and bugfixes: * Update to version 3.13.12. * Library * gh-144380: Improve performance of io.BufferedReader line iteration by ~49%. * gh-144169: Fix three crashes when non-string keyword arguments are supplied to objects in the ast module. * gh-144100: Fixed a crash in ctypes when using a deprecated POINTER(str) type in argtypes. Instead of aborting, ctypes now raises a proper Python exception when the pointer target type is unresolved. * gh-144050: Fix stat.filemode() in the pure-Python implementation to avoid misclassifying invalid mode values as block devices. * gh-144023: Fixed validation of file descriptor 0 in posix functions when used with follow_symlinks parameter. * gh-143999: Fix an issue where inspect.getgeneratorstate() and inspect.getcoroutinestate() could fail for generators wrapped by types.coroutine() in the suspended state. * gh-143706: Fix multiprocessing forkserver so that sys.argv is correctly set before **main** is preloaded. Previously, sys.argv was empty during main module import in forkserver child processes. This fixes a regression introduced in 3.13.8 and 3.14.1. Root caused by Aaron Wieczorek, test provided by Thomas Watson, thanks! * gh-143638: Forbid reentrant calls of the pickle.Pickler and pickle.Unpickler methods for the C implementation. Previously, this could cause crash or data corruption, now concurrent calls of methods of the same object raise RuntimeError. * gh-78724: Raise RuntimeError's when user attempts to call methods on half-initialized Struct objects, For example, created by Struct. **new** (Struct). Patch by Sergey B Kirpichev. * gh-143602: Fix a inconsistency issue in write() that leads to unexpected buffer overwrite by deduplicating the buffer exports. * gh-143547: Fix sys.unraisablehook() when the hook raises an exception and changes sys.unraisablehook(): hold a strong reference to the old hook. Patch by Victor Stinner. * gh-143378: Fix use-after-free crashes when a BytesIO object is concurrently mutated during write() or writelines(). * gh-143346: Fix incorrect wrapping of the Base64 data in plistlib._PlistWriter when the indent contains a mix of tabs and spaces. * gh-143310: tkinter: fix a crash when a Python list is mutated during the conversion to a Tcl object (e.g., when setting a Tcl variable). Patch by Benedikt Tran. * gh-143309: Fix a crash in os.execve() on non-Windows platforms when given a custom environment mapping which is then mutated during parsing. Patch by Benedikt Tran. * gh-143308: pickle: fix use-after-free crashes when a PickleBuffer is concurrently mutated by a custom buffer callback during pickling. Patch by Benedikt Tran and Aaron Wieczorek. * gh-143237: Fix support of named pipes in the rotating logging handlers. * gh-143249: Fix possible buffer leaks in Windows overlapped I/O on error handling. * gh-143241: zoneinfo: fix infinite loop in ZoneInfo.from_file when parsing a malformed TZif file. Patch by Fatih Celik. * gh-142830: sqlite3: fix use-after-free crashes when the connection's callbacks are mutated during a callback execution. Patch by Benedikt Tran. * gh-143200: xml.etree.ElementTree: fix use-after-free crashes in **getitem** () and **setitem** () methods of Element when the element is concurrently mutated. Patch by Benedikt Tran. * gh-142195: Updated timeout evaluation logic in subprocess to be compatible with deterministic environments like Shadow where time moves exactly as requested. * gh-143145: Fixed a possible reference leak in ctypes when constructing results with multiple output parameters on error. * gh-122431: Corrected the error message in readline.append_history_file() to state that nelements must be non-negative instead of positive. * gh-143004: Fix a potential use-after-free in collections.Counter.update() when user code mutates the Counter during an update. * gh-143046: The asyncio REPL no longer prints copyright and version messages in the quiet mode (-q). Patch by Bartosz Slawecki. * gh-140648: The asyncio REPL now respects the -I flag (isolated mode). Previously, it would load and execute PYTHONSTARTUP even if the flag was set. Contributed by Bartosz Slawecki. * gh-142991: Fixed socket operations such as recvfrom() and sendto() for FreeBSD divert(4) socket. * gh-143010: Fixed a bug in mailbox where the precise timing of an external event could result in the library opening an existing file instead of a file it expected to create. * gh-142881: Fix concurrent and reentrant call of atexit.unregister(). * gh-112127: Fix possible use-after-free in atexit.unregister() when the callback is unregistered during comparison. * gh-142783: Fix zoneinfo use-after-free with descriptor _weak_cache. a descriptor as _weak_cache could cause crashes during object creation. The fix ensures proper reference counting for descriptor-provided objects. * gh-142754: Add the ownerDocument attribute to xml.dom.minidom elements and attributes created by directly instantiating the Element or Attr class. Note that this way of creating nodes is not supported; creator functions like xml.dom.Document.documentElement() should be used instead. * gh-142784: The asyncio REPL now properly closes the loop upon the end of interactive session. Previously, it could cause surprising warnings. Contributed by Bartosz Slawecki. * gh-142555: array: fix a crash in a[i] = v when converting i to an index via i. **index** or i. **float** mutates the array. * gh-142594: Fix crash in TextIOWrapper.close() when the underlying buffer's closed property calls detach(). * gh-142451: hmac: Ensure that the HMAC.block_size attribute is correctly copied by HMAC.copy. Patch by Benedikt Tran. * gh-142495: collections.defaultdict now prioritizes **setitem** () when inserting default values from default_factory. This prevents race conditions where a default value would overwrite a value set before default_factory returns. * gh-142651: unittest.mock: fix a thread safety issue where Mock.call_count may return inaccurate values when the mock is called concurrently from multiple threads. * gh-142595: Added type check during initialization of the decimal module to prevent a crash in case of broken stdlib. Patch by Sergey B Kirpichev. * gh-142517: The non-compat32 email policies now correctly handle refolding encoded words that contain bytes that can not be decoded in their specified character set. Previously this resulted in an encoding exception during folding. * gh-112527: The help text for required options in argparse no longer extended with "(default: None)". * gh-142315: Pdb can now run scripts from anonymous pipes used in process substitution. Patch by Bartosz Slawecki. * gh-142282: Fix winreg.QueryValueEx() to not accidentally read garbage buffer under race condition. * gh-75949: Fix argparse to preserve | separators in mutually exclusive groups when the usage line wraps due to length. * gh-68552: MisplacedEnvelopeHeaderDefect and Missing header name defects are now correctly passed to the handle_defect method of policy in FeedParser. * gh-142006: Fix a bug in the email.policy.default folding algorithm which incorrectly resulted in a doubled newline when a line ending at exactly max_line_length was followed by an unfoldable token. * gh-105836: Fix asyncio.run_coroutine_threadsafe() leaving underlying cancelled asyncio task running. * gh-139971: pydoc: Ensure that the link to the online documentation of a stdlib module is correct. * gh-139262: Some keystrokes can be swallowed in the new PyREPL on Windows, especially when used together with the ALT key. Fix by Chris Eibl. * gh-138897: Improved license/copyright/credits display in the REPL: now uses a pager. * gh-79986: Add parsing for References and In-Reply-To headers to the email library that parses the header content as lists of message id tokens. This prevents them from being folded incorrectly. * gh-109263: Starting a process from spawn context in multiprocessing no longer sets the start method globally. * gh-90871: Fixed an off by one error concerning the backlog parameter in create_unix_server(). Contributed by Christian Harries. * gh-133253: Fix thread-safety issues in linecache. * gh-132715: Skip writing objects during marshalling once a failure has occurred. * gh-127529: Correct behavior of asyncio.selector_events.BaseSelectorEventLoop._accept_connection() in handling ConnectionAbortedError in a loop. This improves performance on OpenBSD. * IDLE * gh-143774: Better explain the operation of Format / Format Paragraph. * Core and Builtins * gh-144307: Prevent a reference leak in module teardown at interpreter finalization. * gh-144194: Fix error handling in perf jitdump initialization on memory allocation failure. * gh-141805: Fix crash in set when objects with the same hash are concurrently added to the set after removing an element with the same hash while the set still contains elements with the same hash. * gh-143670: Fixes a crash in ga_repr_items_list function. * gh-143377: Fix a crash in _interpreters.capture_exception() when the exception is incorrectly formatted. Patch by Benedikt Tran. * gh-143189: Fix crash when inserting a non-str key into a split table dictionary when the key matches an existing key in the split table but has no corresponding value in the dict. * gh-143228: Fix use-after-free in perf trampoline when toggling profiling while threads are running or during interpreter finalization with daemon threads active. The fix uses reference counting to ensure trampolines are not freed while any code object could still reference them. Pach by Pablo Galindo * gh-142664: Fix a use-after-free crash in memoryview. **hash** when the **hash** method of the referenced object mutates that object or the view. Patch by Benedikt Tran. * gh-142557: Fix a use-after-free crash in bytearray. **mod** when the bytearray is mutated while formatting the %-style arguments. Patch by Benedikt Tran. * gh-143195: Fix use-after-free crashes in bytearray.hex() and memoryview.hex() when the separator's **len** () mutates the original object. Patch by Benedikt Tran. * gh-143135: Set sys.flags.inspect to 1 when PYTHONINSPECT is * Previously, it was set to 0 in this case. * gh-143003: Fix an overflow of the shared empty buffer in bytearray.extend() when **length_hint** () returns 0 for non-empty iterator. * gh-143006: Fix a possible assertion error when comparing negative non-integer float and int with the same number of bits in the integer part. * gh-142776: Fix a file descriptor leak in import.c * gh-142829: Fix a use-after-free crash in contextvars.Context comparison when a custom **eq** method modifies the context via set(). * gh-142766: Clear the frame of a generator when generator.close() is called. * gh-142737: Tracebacks will be displayed in fallback mode even if io.open() is lost. Previously, this would crash the interpreter. Patch by Bartosz Slawecki. * gh-142554: Fix a crash in divmod() when _pylong.int_divmod() does not return a tuple of length two exactly. Patch by Benedikt Tran. * gh-142560: Fix use-after-free in bytearray search-like methods (find(), count(), index(), rindex(), and rfind()) by marking the storage as exported which causes reallocation attempts to raise BufferError. For contains(), split(), and rsplit() the buffer protocol is used for this. * gh-142343: Fix SIGILL crash on m68k due to incorrect assembly constraint. * gh-141732: Ensure the **repr** () for ExceptionGroup and BaseExceptionGroup does not change when the exception sequence that was original passed in to its constructor is subsequently mutated. * gh-100964: Fix reference cycle in exhausted generator frames. Patch by Savannah Ostrowski. * gh-140373: Correctly emit PY_UNWIND event when generator object is closed. Patch by Mikhail Efimov. * gh-138568: Adjusted the built-in help() function so that empty inputs are ignored in interactive mode. * gh-127773: Do not use the type attribute cache for types with incompatible MRO. * C API * gh-142571: PyUnstable_CopyPerfMapFile() now checks that opening the file succeeded before flushing. * Build * gh-142454: When calculating the digest of the JIT stencils input, sort the hashed files by filenames before adding their content to the hasher. This ensures deterministic hash input and hence deterministic hash, independent on filesystem order. * gh-141808: When running make clean-retain-profile, keep the generated JIT stencils. That way, the stencils are not generated twice when Profile-guided optimization (PGO) is used. It also allows distributors to supply their own pre-built JIT stencils. * gh-138061: Ensure reproducible builds by making JIT stencil header generation deterministic. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-300=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * python313-base-3.13.12-160000.1.1 * python313-curses-debuginfo-3.13.12-160000.1.1 * python313-debugsource-3.13.12-160000.1.1 * python313-base-debuginfo-3.13.12-160000.1.1 * python313-core-debugsource-3.13.12-160000.1.1 * libpython3_13-1_0-debuginfo-3.13.12-160000.1.1 * python313-curses-3.13.12-160000.1.1 * libpython3_13-1_0-3.13.12-160000.1.1 * python313-3.13.12-160000.1.1 * python313-debuginfo-3.13.12-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11468.html * https://www.suse.com/security/cve/CVE-2025-15282.html * https://www.suse.com/security/cve/CVE-2026-0672.html * https://www.suse.com/security/cve/CVE-2026-0865.html * https://www.suse.com/security/cve/CVE-2026-1299.html * https://bugzilla.suse.com/show_bug.cgi?id=1257029 * https://bugzilla.suse.com/show_bug.cgi?id=1257031 * https://bugzilla.suse.com/show_bug.cgi?id=1257042 * https://bugzilla.suse.com/show_bug.cgi?id=1257046 * https://bugzilla.suse.com/show_bug.cgi?id=1257181 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:10 -0000 Subject: SUSE-RU-2026:20546-1: important: Recommended update for zypper, libzypp, libsolv, zypp-plugin Message-ID: <177271765020.1901.12549980175904214027@13ea24840d99> # Recommended update for zypper, libzypp, libsolv, zypp-plugin Announcement ID: SUSE-RU-2026:20546-1 Release Date: 2026-02-20T10:36:21Z Rating: important References: * bsc#1230267 * bsc#1249435 * bsc#1257068 * jsc#PED-14658 Affected Products: * SUSE Linux Micro 6.2 An update that contains one feature and has three fixes can now be installed. ## Description: This update for zypper, libzypp, libsolv, zypp-plugin fixes the following issues: Changes in zypper: * upgrade version to 1.14.94: * Fixed `bash-completion`: zypper refresh now ignores repository priority lines. * Changes to support building against restructured libzypp in stack build (bsc#1230267) Changes in libzypp: * upgrade version to 17.38.2: * Prepare a legacy /etc/zypp/zypp.conf to be installed on old distros. See the ZYPP.CONF(5) man page for details. * Fix runtime check for broken rpm --runposttrans (bsc#1257068) * upgrade version to 17.38.1: * Avoid libcurl-mini4 when building as it does not support ftp protocol. * Translation: updated .pot file. * upgrade version to 17.38.0: * zypp.conf: follow the UAPI configuration file specification (PED-14658) In short terms it means we will no longer ship an /etc/zypp/zypp.conf, but store our own defaults in /usr/etc/zypp/zypp.conf. The systems administrator may choose to keep a full copy in /etc/zypp/zypp.conf ignoring our config file settings completely, or the preferred way - to overwrite specific settings via /etc/zypp/zypp.conf.d/*.conf overlay files. See the ZYPP.CONF(5) man page for details. * cmake: correctly detect rpm6 * Use 'zypp.tmp' as temp directory component to ease setting up SELinux policies (bsc#1249435) * zyppng: Update Provider to current MediaCurl2 download approach, drop Metalink Changes in libsolv: * bump version to 0.7.35: * fixed rare crash in the handling of allowuninstall in combination with forcebest updates * new pool_satisfieddep_map feature to test if a set of packages satisfies a dependency Changes in zypp-plugin: * upgrade version 0.6.6: * Fix link to libzypp plugins documentation: https://opensuse.github.io/libzypp/zypp-plugins.html ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-303=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * zypper-debuginfo-1.14.94-160000.1.1 * libzypp-debuginfo-17.38.2-160000.1.1 * libzypp-debugsource-17.38.2-160000.1.1 * zypper-1.14.94-160000.1.1 * libsolv-debuginfo-0.7.35-160000.1.1 * libsolv-tools-base-debuginfo-0.7.35-160000.1.1 * libsolv-tools-base-0.7.35-160000.1.1 * libsolv-debugsource-0.7.35-160000.1.1 * libzypp-17.38.2-160000.1.1 * zypper-debugsource-1.14.94-160000.1.1 * SUSE Linux Micro 6.2 (noarch) * python313-zypp-plugin-0.6.6-160000.1.1 * zypper-needs-restarting-1.14.94-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230267 * https://bugzilla.suse.com/show_bug.cgi?id=1249435 * https://bugzilla.suse.com/show_bug.cgi?id=1257068 * https://jira.suse.com/browse/PED-14658 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:18 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:18 -0000 Subject: SUSE-SU-2026:20544-1: important: Security update for glibc-livepatches Message-ID: <177271765833.1901.7156768718699159303@13ea24840d99> # Security update for glibc-livepatches Announcement ID: SUSE-SU-2026:20544-1 Release Date: 2026-02-19T13:54:03Z Rating: important References: * bsc#1226501 * bsc#1228879 * bsc#1256913 Cross-References: * CVE-2026-0861 CVSS scores: * CVE-2026-0861 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0861 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for glibc-livepatches fixes the following issues: Changes in glibc-livepatches: * CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256913) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-301=1 ## Package List: * SUSE Linux Micro 6.2 (x86_64) * glibc-livepatches-0.3-160000.1.1 * glibc-livepatches-debugsource-0.3-160000.1.1 * glibc-livepatches-debuginfo-0.3-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0861.html * https://bugzilla.suse.com/show_bug.cgi?id=1226501 * https://bugzilla.suse.com/show_bug.cgi?id=1228879 * https://bugzilla.suse.com/show_bug.cgi?id=1256913 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:35:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:35:02 -0000 Subject: SUSE-SU-2026:20538-1: important: Security update for cockpit-machines, cockpit Message-ID: <177271770286.1901.16605662027241427746@13ea24840d99> # Security update for cockpit-machines, cockpit Announcement ID: SUSE-SU-2026:20538-1 Release Date: 2026-02-17T14:06:44Z Rating: important References: * bsc#1221342 * bsc#1236149 * bsc#1239759 * bsc#1248250 * bsc#1249828 * bsc#1249830 * bsc#1257324 * bsc#1257325 Cross-References: * CVE-2025-13465 CVSS scores: * CVE-2025-13465 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13465 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-13465 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13465 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability and has seven fixes can now be installed. ## Description: This update for cockpit-machines, cockpit fixes the following issues: * CVE-2025-13465: Update the lodash dependencie to avoid prototype pollution. (bsc#1257324) Changes in cockpit-machines: * Update to 346 * 346 * Performance improvements * Translation updates * 345 * New virtual machines don't get SPICE graphics anymore * Support for network port forwarding * Bug fixes and translation updates * Update to 344 * 344 * Port forwarding for user session VMs * "Shutdown and restart" action * Faster startup * 343 * Memory usage now shows numbers reported by the guest (RHEL-116731) * Update to 342 * 342 * Bug fixes and translation updates * 341 * Improved UX for Disks and Network interface tables * Bug fixes and translation updates * 340 * Use exclusive VNC connections with "Remote resizing" * Update to 339 * 339 * Serial consoles now keep their content and stay alive * No longer copies qemu.conf values into VM definitions * 338 * Translation and dependency updates * Detachable VNC console * Update to 337 * 337 * Bug fixes and translation updates * 336 * Graphical VNC and serial consoles improvements * Control VNC console resizing and scaling * Bug fixes and translation updates * 335 * Bug fixes and translation updates * 334 * Bug fixes and translation updates Changes in cockpit: * Update to 354 * changes since 351 * 354 * Convert documentation to AsciiDoc * Work around Firefox 146/147 bug (rhbz#2422331) * Bug fixes * 353 * Networking: Suggest prefix length and gateway address * Bug fixes and translation updates * 352 * Shown a warning if the last shutdown/reboot was unclean * Bug fixes and translation updates * Update to 351 * Changes since 349 * 351 * Firewall ports can be deleted individually * 350 * networking: fix renaming of bridges and other groups (RHEL-117883) * bridge: fix OpenSSH_10.2p1 host key detection * Update to 349 * Changes since 346 * 349 * Package manifests: add any test * Bug fixes and translation updates * 348 * Bug fixes and translation updates * 347 * Site-specific branding support * Update to 346 * Changes since 344 * 346 * Support branding Cockpit pages * Storage: Support for Stratis "V2" pools * 345 * Translation and dependency updates * Shorter IPv6 addresses * IPv6 addresses for WireGuard * Update to 344 * Changes since 340 * 344 * Bug fixes and translation updates * 343 * login: Improve error message for unsupported shells * cockpit: Handle file access issues with files in machines.d * Translation updates * 342 * systemd: ensure update() is called at least once for tuned-dialog * Translation updates * 341 * services: show link to podman page for quadlets * Bug fixes and translation updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-291=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * cockpit-kdump-354-160000.1.1 * cockpit-system-354-160000.1.1 * cockpit-machines-346-160000.1.1 * cockpit-networkmanager-354-160000.1.1 * cockpit-selinux-354-160000.1.1 * cockpit-storaged-354-160000.1.1 * cockpit-bridge-354-160000.1.1 * cockpit-firewalld-354-160000.1.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * cockpit-ws-debuginfo-354-160000.1.1 * cockpit-debugsource-354-160000.1.1 * cockpit-ws-selinux-354-160000.1.1 * cockpit-ws-354-160000.1.1 * cockpit-354-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13465.html * https://bugzilla.suse.com/show_bug.cgi?id=1221342 * https://bugzilla.suse.com/show_bug.cgi?id=1236149 * https://bugzilla.suse.com/show_bug.cgi?id=1239759 * https://bugzilla.suse.com/show_bug.cgi?id=1248250 * https://bugzilla.suse.com/show_bug.cgi?id=1249828 * https://bugzilla.suse.com/show_bug.cgi?id=1249830 * https://bugzilla.suse.com/show_bug.cgi?id=1257324 * https://bugzilla.suse.com/show_bug.cgi?id=1257325 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:47 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:47 -0000 Subject: SUSE-SU-2026:20539-1: moderate: Security update for docker Message-ID: <177271768758.1901.1304585233689663318@13ea24840d99> # Security update for docker Announcement ID: SUSE-SU-2026:20539-1 Release Date: 2026-02-18T09:38:06Z Rating: moderate References: * bsc#1253904 Cross-References: * CVE-2025-58181 CVSS scores: * CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability can now be installed. ## Description: This update for docker fixes the following issues: * CVE-2025-58181: not validating the number of mechanisms can cause unlimited memory consumption (bsc#1253904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-294=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * docker-buildx-debuginfo-0.29.0-160000.5.1 * docker-28.5.1_ce-160000.5.1 * docker-buildx-0.29.0-160000.5.1 * docker-debuginfo-28.5.1_ce-160000.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58181.html * https://bugzilla.suse.com/show_bug.cgi?id=1253904 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:35:09 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:35:09 -0000 Subject: SUSE-SU-2026:0811-1: important: Security update for libsoup2 Message-ID: <177271770940.1901.7253673311225732391@13ea24840d99> # Security update for libsoup2 Announcement ID: SUSE-SU-2026:0811-1 Release Date: 2026-03-05T03:05:33Z Rating: important References: * bsc#1257398 * bsc#1257441 * bsc#1257597 Cross-References: * CVE-2026-1467 * CVE-2026-1539 * CVE-2026-1760 CVSS scores: * CVE-2026-1467 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N * CVE-2026-1467 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2026-1467 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2026-1539 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2026-1539 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1539 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N * CVE-2026-1760 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-1760 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L * CVE-2026-1760 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2026-1467: lack of input sanitization can lead to unintended or unauthorized HTTP requests (bsc#1257398). * CVE-2026-1539: proxy authentication credentials leaked via the Proxy- Authorization header when handling HTTP redirects (bsc#1257441). * CVE-2026-1760: improper handling of HTTP requests combining certain headers by SoupServer can lead to HTTP request smuggling and potential DoS (bsc#1257597). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-811=1 openSUSE-SLE-15.6-2026-811=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-811=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-811=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-811=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1 * libsoup2-debugsource-2.74.3-150600.4.30.1 * libsoup-2_4-1-2.74.3-150600.4.30.1 * libsoup2-devel-2.74.3-150600.4.30.1 * openSUSE Leap 15.6 (x86_64) * libsoup-2_4-1-32bit-2.74.3-150600.4.30.1 * libsoup2-devel-32bit-2.74.3-150600.4.30.1 * libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.30.1 * openSUSE Leap 15.6 (noarch) * libsoup2-lang-2.74.3-150600.4.30.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.30.1 * libsoup2-devel-64bit-2.74.3-150600.4.30.1 * libsoup-2_4-1-64bit-2.74.3-150600.4.30.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1 * libsoup2-debugsource-2.74.3-150600.4.30.1 * libsoup-2_4-1-2.74.3-150600.4.30.1 * libsoup2-devel-2.74.3-150600.4.30.1 * Basesystem Module 15-SP7 (noarch) * libsoup2-lang-2.74.3-150600.4.30.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1 * libsoup2-debugsource-2.74.3-150600.4.30.1 * libsoup-2_4-1-2.74.3-150600.4.30.1 * libsoup2-devel-2.74.3-150600.4.30.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * libsoup2-lang-2.74.3-150600.4.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libsoup-2_4-1-debuginfo-2.74.3-150600.4.30.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.30.1 * libsoup2-debugsource-2.74.3-150600.4.30.1 * libsoup-2_4-1-2.74.3-150600.4.30.1 * libsoup2-devel-2.74.3-150600.4.30.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * libsoup2-lang-2.74.3-150600.4.30.1 ## References: * https://www.suse.com/security/cve/CVE-2026-1467.html * https://www.suse.com/security/cve/CVE-2026-1539.html * https://www.suse.com/security/cve/CVE-2026-1760.html * https://bugzilla.suse.com/show_bug.cgi?id=1257398 * https://bugzilla.suse.com/show_bug.cgi?id=1257441 * https://bugzilla.suse.com/show_bug.cgi?id=1257597 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:39 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:39 -0000 Subject: SUSE-SU-2026:20541-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) Message-ID: <177271767950.1901.16141717437350225515@13ea24840d99> # Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) Announcement ID: SUSE-SU-2026:20541-1 Release Date: 2026-02-18T16:13:19Z Rating: important References: * bsc#1253439 Cross-References: * CVE-2025-40186 CVSS scores: * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes one security issue The following security issue was fixed: * CVE-2025-40186: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request() (bsc#1253439). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-297=1 ## Package List: * SUSE Linux Micro 6.2 (ppc64le s390x x86_64) * kernel-livepatch-6_12_0-160000_6-default-4-160000.1.1 * kernel-livepatch-SLE16_Update_1-debugsource-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-default-debuginfo-4-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40186.html * https://bugzilla.suse.com/show_bug.cgi?id=1253439 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 13:34:44 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 13:34:44 -0000 Subject: SUSE-SU-2026:20540-1: important: Security update for cockpit-repos Message-ID: <177271768458.1901.17563303334594884794@13ea24840d99> # Security update for cockpit-repos Announcement ID: SUSE-SU-2026:20540-1 Release Date: 2026-02-18T11:22:31Z Rating: important References: * bsc#1255425 * bsc#1257325 Cross-References: * CVE-2025-13465 * CVE-2025-64718 CVSS scores: * CVE-2025-13465 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13465 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-13465 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13465 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-64718 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-64718 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-64718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for cockpit-repos fixes the following issues: Update to version 4.7. Security issues fixed: * CVE-2025-13465: prototype pollution in the _.unset and_.omit functions can lead to deletion of methods from global (bsc#1257325). * CVE-2025-64718: js-yaml prototype pollution in merge (bsc#1255425). Other updates and bugfixes: * version update to 4.7 * Translation updates * version update to 4.6: * Translation updates * Dependency updates * Fix translations pot file not being update * version update to 4.5: * Dependency updates * version update to 4.4: * Translation updates * Dependency updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-296=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * cockpit-repos-4.7-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13465.html * https://www.suse.com/security/cve/CVE-2025-64718.html * https://bugzilla.suse.com/show_bug.cgi?id=1255425 * https://bugzilla.suse.com/show_bug.cgi?id=1257325 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:30:04 -0000 Subject: SUSE-SU-2026:20621-1: important: Security update for python-azure-core Message-ID: <177272820492.1967.1599755629511551933@df8f6ab05d2e> # Security update for python-azure-core Announcement ID: SUSE-SU-2026:20621-1 Release Date: 2026-03-01T15:59:49Z Rating: important References: * bsc#1257703 Cross-References: * CVE-2026-21226 CVSS scores: * CVE-2026-21226 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-21226 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-21226 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-azure-core fixes the following issues: * CVE-2026-21226: Fixed deserialization of untrusted data which may allow an authorized attacker to execute code over a network. (bsc#1257703) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-330=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * python313-azure-core-1.32.0-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2026-21226.html * https://bugzilla.suse.com/show_bug.cgi?id=1257703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:30:11 -0000 Subject: SUSE-SU-2026:20620-1: moderate: Security update for haproxy Message-ID: <177272821139.1967.12629865493470113481@df8f6ab05d2e> # Security update for haproxy Announcement ID: SUSE-SU-2026:20620-1 Release Date: 2026-02-27T13:14:13Z Rating: moderate References: * bsc#1257521 * bsc#1257976 Cross-References: * CVE-2026-26080 * CVE-2026-26081 CVSS scores: * CVE-2026-26080 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-26080 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26081 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-26081 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for haproxy fixes the following issues: * Update to version 3.2.12+git0.6011f448e * CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976) * CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-328=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * haproxy-debugsource-3.2.12+git0.6011f448e-160000.1.1 * haproxy-3.2.12+git0.6011f448e-160000.1.1 * haproxy-debuginfo-3.2.12+git0.6011f448e-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-26080.html * https://www.suse.com/security/cve/CVE-2026-26081.html * https://bugzilla.suse.com/show_bug.cgi?id=1257521 * https://bugzilla.suse.com/show_bug.cgi?id=1257976 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:30:17 -0000 Subject: SUSE-RU-2026:20619-1: moderate: Recommended update for SAPHanaSR-angi Message-ID: <177272821738.1967.7814487797962848486@df8f6ab05d2e> # Recommended update for SAPHanaSR-angi Announcement ID: SUSE-RU-2026:20619-1 Release Date: 2026-02-26T12:03:46Z Rating: moderate References: * bsc#1257744 * bsc#1257746 * bsc#1257747 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has three fixes can now be installed. ## Description: This update for SAPHanaSR-angi fixes the following issues: * Version bump to 1.3.0: * Technology preview - Support for XSA standalone node in Mx-setup (one master, one XSA worker) * improve logging to SAP HANA trace file (bsc#1257746) * improve HANA 'stop' logging (bsc#1257747) * improve srHook attribute logging (bsc#1257744) * stop lost slave workers, if master nameserver node crashed before promoting the secondary * fix stop status for lost slave worker (bsc#1257747) * SAPHanaSR-alert-fencing could now restart a node without using cluster infrastructure * new man page: * SAPHanaSR-ScaleOut-XSA.7 * update man pages: * ocf_suse_SAPHanaFilesystem.7 * SAPHanaController-scale-out.7 * SAPHanaController-scale-up.7 * SAPHanaSR-alert-fencing.8 * SAPHanaSR-angi-scenarios.7 * SAPHanaSR-angi.7 * SAPHanaSR-hookHelper.8 * SAPHanaSR-ScaleOut.7 * SAPHanaSR-ScaleOut_basic_cluster.7 * SAPHanaSR-showAttr.8 * SAPHanaSR_basic_cluster.7 * SAPHanaSR_maintenance_examples.7 * SAPHanaSR_upgrade_to_angi.7 * susHanaSR.py.7 * update man pages - copyright date only: * ocf_suse_SAPHanaController.7 * ocf_suse_SAPHanaTopology.7 * SAPHanaSR-manageProvider.8 * SAPHanaSR-replay-archive.8 * SAPHanaSR-show-hadr-runtimes.8 * SAPHanaSR-showAttr_properties.5 * SAPHanaSR-upgrade-to-angi-demo.8 * SAPHanaSR.7 * susChkSrv.py.7 * susCostOpt.py.7 * susHanaSrMultiTarget.py.7 * susTkOver.py.7 * change required crmsh version from 4.4.0 to 4.4.2+20250526.46896f4 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-316=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * SAPHanaSR-angi-1.3.0-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257744 * https://bugzilla.suse.com/show_bug.cgi?id=1257746 * https://bugzilla.suse.com/show_bug.cgi?id=1257747 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:30:24 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:30:24 -0000 Subject: SUSE-RU-2026:20618-1: important: Recommended update for crmsh Message-ID: <177272822498.1967.7185832206622981472@df8f6ab05d2e> # Recommended update for crmsh Announcement ID: SUSE-RU-2026:20618-1 Release Date: 2026-02-26T07:48:34Z Rating: important References: * bsc#1254571 * bsc#1254892 * bsc#1257143 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has three fixes can now be installed. ## Description: This update for crmsh fixes the following issues: * Update to version 5.0.0+20260126.316aa9fa: * Dev: options: Change 'force' option to be session-only (bsc#1254892) * Fix: sbd: Allow setting -1 to stonith-watchdog-timeout (bsc#1257143) * Fix: qdevice: Make sure stonith-watchdog-timeout is 2 times of SBD_WATCHDOG_TIMEOUT (bsc#1254571) * Fix: migration: Avoid exception inside thread * Dev: sbd: Remove sbd configuration directories while removing cluster node ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-311=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * crmsh-scripts-5.0.0+20260126.316aa9fa-160000.1.1 * crmsh-5.0.0+20260126.316aa9fa-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254571 * https://bugzilla.suse.com/show_bug.cgi?id=1254892 * https://bugzilla.suse.com/show_bug.cgi?id=1257143 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:30:27 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:30:27 -0000 Subject: SUSE-SU-2026:20617-1: important: Security update for python-azure-core Message-ID: <177272822780.1967.7305201399198718696@df8f6ab05d2e> # Security update for python-azure-core Announcement ID: SUSE-SU-2026:20617-1 Release Date: 2026-03-01T15:59:58Z Rating: important References: * bsc#1257703 Cross-References: * CVE-2026-21226 CVSS scores: * CVE-2026-21226 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-21226 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-21226 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for python-azure-core fixes the following issues: * CVE-2026-21226: Fixed deserialization of untrusted data which may allow an authorized attacker to execute code over a network. (bsc#1257703) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-330=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (noarch) * python313-azure-core-1.32.0-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2026-21226.html * https://bugzilla.suse.com/show_bug.cgi?id=1257703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:30:32 -0000 Subject: SUSE-SU-2026:20616-1: moderate: Security update for haproxy Message-ID: <177272823218.1967.5159434172314782194@df8f6ab05d2e> # Security update for haproxy Announcement ID: SUSE-SU-2026:20616-1 Release Date: 2026-02-27T13:16:38Z Rating: moderate References: * bsc#1257521 * bsc#1257976 Cross-References: * CVE-2026-26080 * CVE-2026-26081 CVSS scores: * CVE-2026-26080 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-26080 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-26081 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-26081 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for haproxy fixes the following issues: * Update to version 3.2.12+git0.6011f448e * CVE-2026-26081: Fixed a DOS vulnerability in QUIC. (bsc#1257976) * CVE-2026-26080: Fixed a DOS vulnerability in QUIC. (bsc#1257976) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-328=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * haproxy-debugsource-3.2.12+git0.6011f448e-160000.1.1 * haproxy-3.2.12+git0.6011f448e-160000.1.1 * haproxy-debuginfo-3.2.12+git0.6011f448e-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-26080.html * https://www.suse.com/security/cve/CVE-2026-26081.html * https://bugzilla.suse.com/show_bug.cgi?id=1257521 * https://bugzilla.suse.com/show_bug.cgi?id=1257976 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:26 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:26 -0000 Subject: SUSE-SU-2026:20615-1: important: Security update for the Linux Kernel Message-ID: <177272858614.1967.8387261519891237627@df8f6ab05d2e> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20615-1 Release Date: 2026-02-27T11:32:45Z Rating: important References: * bsc#1205462 * bsc#1214285 * bsc#1215199 * bsc#1235905 * bsc#1242505 * bsc#1242974 * bsc#1242986 * bsc#1243452 * bsc#1243507 * bsc#1243662 * bsc#1246184 * bsc#1246282 * bsc#1247030 * bsc#1247292 * bsc#1247712 * bsc#1248166 * bsc#1248175 * bsc#1248178 * bsc#1248179 * bsc#1248185 * bsc#1248188 * bsc#1248196 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248211 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248222 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248232 * bsc#1248234 * bsc#1248240 * bsc#1248360 * bsc#1248366 * bsc#1248384 * bsc#1248626 * bsc#1249307 * bsc#1249609 * bsc#1249895 * bsc#1249998 * bsc#1250032 * bsc#1250082 * bsc#1250388 * bsc#1250705 * bsc#1250738 * bsc#1250748 * bsc#1252712 * bsc#1252773 * bsc#1252784 * bsc#1252891 * bsc#1252900 * bsc#1253049 * bsc#1253078 * bsc#1253079 * bsc#1253087 * bsc#1253344 * bsc#1253500 * bsc#1253739 * bsc#1254244 * bsc#1254308 * bsc#1254447 * bsc#1254839 * bsc#1254842 * bsc#1254845 * bsc#1254977 * bsc#1255102 * bsc#1255128 * bsc#1255157 * bsc#1255164 * bsc#1255172 * bsc#1255216 * bsc#1255232 * bsc#1255241 * bsc#1255245 * bsc#1255266 * bsc#1255268 * bsc#1255269 * bsc#1255319 * bsc#1255327 * bsc#1255346 * bsc#1255403 * bsc#1255417 * bsc#1255459 * bsc#1255482 * bsc#1255506 * bsc#1255526 * bsc#1255527 * bsc#1255529 * bsc#1255530 * bsc#1255536 * bsc#1255537 * bsc#1255542 * bsc#1255544 * bsc#1255547 * bsc#1255569 * bsc#1255593 * bsc#1255622 * bsc#1255694 * bsc#1255695 * bsc#1255703 * bsc#1255708 * bsc#1255811 * bsc#1255930 * bsc#1256579 * bsc#1256582 * bsc#1256584 * bsc#1256586 * bsc#1256591 * bsc#1256592 * bsc#1256593 * bsc#1256594 * bsc#1256597 * bsc#1256605 * bsc#1256607 * bsc#1256608 * bsc#1256609 * bsc#1256610 * bsc#1256611 * bsc#1256612 * bsc#1256613 * bsc#1256616 * bsc#1256617 * bsc#1256619 * bsc#1256622 * bsc#1256623 * bsc#1256625 * bsc#1256627 * bsc#1256628 * bsc#1256630 * bsc#1256632 * bsc#1256638 * bsc#1256641 * bsc#1256643 * bsc#1256645 * bsc#1256646 * bsc#1256650 * bsc#1256651 * bsc#1256653 * bsc#1256654 * bsc#1256655 * bsc#1256656 * bsc#1256659 * bsc#1256660 * bsc#1256661 * bsc#1256664 * bsc#1256665 * bsc#1256667 * bsc#1256668 * bsc#1256674 * bsc#1256677 * bsc#1256680 * bsc#1256682 * bsc#1256683 * bsc#1256688 * bsc#1256689 * bsc#1256716 * bsc#1256726 * bsc#1256728 * bsc#1256730 * bsc#1256733 * bsc#1256737 * bsc#1256741 * bsc#1256742 * bsc#1256744 * bsc#1256748 * bsc#1256749 * bsc#1256752 * bsc#1256754 * bsc#1256755 * bsc#1256756 * bsc#1256757 * bsc#1256759 * bsc#1256760 * bsc#1256761 * bsc#1256763 * bsc#1256770 * bsc#1256773 * bsc#1256774 * bsc#1256777 * bsc#1256779 * bsc#1256781 * bsc#1256785 * bsc#1256792 * bsc#1256793 * bsc#1256794 * bsc#1256864 * bsc#1256865 * bsc#1256867 * bsc#1256975 * bsc#1257015 * bsc#1257035 * bsc#1257053 * bsc#1257154 * bsc#1257155 * bsc#1257158 * bsc#1257159 * bsc#1257163 * bsc#1257164 * bsc#1257167 * bsc#1257168 * bsc#1257179 * bsc#1257180 * bsc#1257202 * bsc#1257204 * bsc#1257207 * bsc#1257208 * bsc#1257215 * bsc#1257217 * bsc#1257218 * bsc#1257220 * bsc#1257221 * bsc#1257225 * bsc#1257227 * bsc#1257232 * bsc#1257234 * bsc#1257236 * bsc#1257243 * bsc#1257245 * bsc#1257276 * bsc#1257277 * bsc#1257279 * bsc#1257282 * bsc#1257296 * bsc#1257309 * bsc#1257473 * bsc#1257504 * bsc#1257603 * jsc#PED-10906 * jsc#PED-13728 * jsc#PED-14156 Cross-References: * CVE-2024-54031 * CVE-2025-37744 * CVE-2025-37751 * CVE-2025-37841 * CVE-2025-37845 * CVE-2025-37904 * CVE-2025-37955 * CVE-2025-38243 * CVE-2025-38262 * CVE-2025-38297 * CVE-2025-38298 * CVE-2025-38379 * CVE-2025-38423 * CVE-2025-38505 * CVE-2025-38507 * CVE-2025-38510 * CVE-2025-38511 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38521 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38539 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38547 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38551 * CVE-2025-38569 * CVE-2025-38589 * CVE-2025-38590 * CVE-2025-38645 * CVE-2025-39689 * CVE-2025-39795 * CVE-2025-39813 * CVE-2025-39814 * CVE-2025-39817 * CVE-2025-39829 * CVE-2025-39880 * CVE-2025-39913 * CVE-2025-39927 * CVE-2025-40030 * CVE-2025-40045 * CVE-2025-40097 * CVE-2025-40106 * CVE-2025-40147 * CVE-2025-40195 * CVE-2025-40257 * CVE-2025-40259 * CVE-2025-40261 * CVE-2025-40363 * CVE-2025-68174 * CVE-2025-68178 * CVE-2025-68188 * CVE-2025-68200 * CVE-2025-68211 * CVE-2025-68218 * CVE-2025-68227 * CVE-2025-68241 * CVE-2025-68245 * CVE-2025-68261 * CVE-2025-68296 * CVE-2025-68297 * CVE-2025-68320 * CVE-2025-68325 * CVE-2025-68337 * CVE-2025-68341 * CVE-2025-68348 * CVE-2025-68349 * CVE-2025-68356 * CVE-2025-68359 * CVE-2025-68360 * CVE-2025-68361 * CVE-2025-68366 * CVE-2025-68367 * CVE-2025-68368 * CVE-2025-68372 * CVE-2025-68374 * CVE-2025-68376 * CVE-2025-68379 * CVE-2025-68725 * CVE-2025-68735 * CVE-2025-68741 * CVE-2025-68743 * CVE-2025-68764 * CVE-2025-68768 * CVE-2025-68770 * CVE-2025-68771 * CVE-2025-68773 * CVE-2025-68775 * CVE-2025-68776 * CVE-2025-68777 * CVE-2025-68778 * CVE-2025-68783 * CVE-2025-68784 * CVE-2025-68788 * CVE-2025-68789 * CVE-2025-68792 * CVE-2025-68795 * CVE-2025-68797 * CVE-2025-68798 * CVE-2025-68799 * CVE-2025-68800 * CVE-2025-68801 * CVE-2025-68802 * CVE-2025-68803 * CVE-2025-68804 * CVE-2025-68808 * CVE-2025-68811 * CVE-2025-68813 * CVE-2025-68814 * CVE-2025-68815 * CVE-2025-68816 * CVE-2025-68819 * CVE-2025-68820 * CVE-2025-68821 * CVE-2025-68822 * CVE-2025-71064 * CVE-2025-71066 * CVE-2025-71073 * CVE-2025-71076 * CVE-2025-71077 * CVE-2025-71078 * CVE-2025-71079 * CVE-2025-71080 * CVE-2025-71081 * CVE-2025-71082 * CVE-2025-71083 * CVE-2025-71084 * CVE-2025-71085 * CVE-2025-71086 * CVE-2025-71087 * CVE-2025-71088 * CVE-2025-71089 * CVE-2025-71091 * CVE-2025-71093 * CVE-2025-71094 * CVE-2025-71095 * CVE-2025-71097 * CVE-2025-71098 * CVE-2025-71099 * CVE-2025-71100 * CVE-2025-71101 * CVE-2025-71108 * CVE-2025-71111 * CVE-2025-71112 * CVE-2025-71113 * CVE-2025-71114 * CVE-2025-71116 * CVE-2025-71118 * CVE-2025-71119 * CVE-2025-71120 * CVE-2025-71123 * CVE-2025-71126 * CVE-2025-71130 * CVE-2025-71131 * CVE-2025-71132 * CVE-2025-71133 * CVE-2025-71135 * CVE-2025-71136 * CVE-2025-71137 * CVE-2025-71138 * CVE-2025-71141 * CVE-2025-71142 * CVE-2025-71143 * CVE-2025-71145 * CVE-2025-71147 * CVE-2025-71148 * CVE-2025-71149 * CVE-2025-71154 * CVE-2025-71156 * CVE-2025-71157 * CVE-2025-71162 * CVE-2025-71163 * CVE-2026-22976 * CVE-2026-22977 * CVE-2026-22978 * CVE-2026-22981 * CVE-2026-22982 * CVE-2026-22984 * CVE-2026-22985 * CVE-2026-22986 * CVE-2026-22988 * CVE-2026-22989 * CVE-2026-22990 * CVE-2026-22991 * CVE-2026-22992 * CVE-2026-22993 * CVE-2026-22996 * CVE-2026-22997 * CVE-2026-22999 * CVE-2026-23000 * CVE-2026-23001 * CVE-2026-23002 * CVE-2026-23005 * CVE-2026-23006 * CVE-2026-23011 CVSS scores: * CVE-2024-54031 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37744 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37744 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38243 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38297 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38298 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38379 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38505 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38512 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38529 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38547 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38547 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39927 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39927 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40045 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40045 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40195 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40363 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40363 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68188 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68188 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68366 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68735 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68735 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68741 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68741 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68743 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68743 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68764 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-68764 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-68768 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68768 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68770 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68770 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68775 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68776 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68777 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68777 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68778 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68778 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68783 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-68788 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-68789 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68792 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68792 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68795 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68795 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68798 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68798 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68799 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68799 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-68800 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68801 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68802 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68802 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68803 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-68803 ( SUSE ): 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N * CVE-2025-68804 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68804 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68813 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68820 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71073 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71080 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-71080 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-71081 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71084 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71084 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71085 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71086 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71086 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71087 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71087 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71088 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71088 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71089 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71091 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71091 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71093 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-71093 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71094 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71094 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71097 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71099 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71099 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71100 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71100 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71101 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71101 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71108 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71112 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71113 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71114 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71114 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-71116 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-71118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71119 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71119 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71120 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71123 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71123 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-71126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71145 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71147 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71148 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-71149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71157 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71157 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71162 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22977 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22978 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-22981 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-22985 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22985 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22986 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22988 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-22988 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2026-22988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22990 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22999 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23001 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23002 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23005 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-23005 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2026-23006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves 205 vulnerabilities, contains three features and has 28 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344). * CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842). * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845). * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839). * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102). * CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327). * CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266). * CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269). * CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241). * CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319). * CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245). * CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216). * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157). * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268). * CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164). * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128). * CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403). * CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172). * CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417). * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482). * CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506). * CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694). * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544). * CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593). * CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542). * CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536). * CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526). * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622). * CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547). * CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527). * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537). * CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530). * CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529). * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure (bsc#1255695). * CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811). * CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703). * CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708). * CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930). * CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579). * CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584). * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582). * CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665). * CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659). * CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793). * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638). * CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656). * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688). * CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689). * CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643). * CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646). * CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653). * CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770). * CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677). * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641). * CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651). * CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680). * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674). * CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754). * CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667). * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654). * CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645). * CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613). * CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608). * CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622). * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623). * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628). * CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630). * CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612). * CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773). * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777). * CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597). * CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605). * CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607). * CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591). * CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726). * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744). * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779). * CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757). * CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755). * CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737). * CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733). * CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761). * CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760). * CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159). * CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164). * CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167). * CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168). * CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035). * CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053). * CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225). * CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179). * CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217). * CVE-2026-22986: gpiolib: fix race condition for gdev->srcu (bsc#1257276). * CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221). * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220). * CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218). * CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180). * CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv. * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236). * CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234). * CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232). * CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245). * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207). The following non security issues were fixed: * ALSA: usb-audio: Update for native DSD support quirks (stable-fixes). * Add bugnumber to an existing hv_netvsc change (bsc#1257473). * Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977). * Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792) * arm64: Update config files. Disable DEVPORT (bsc#1256792) * bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603). * bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569). * btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes). * btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes). * bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes). * drm/imagination: Wait for FW trace update command completion (git-fixes). * drm/msm/a6xx: fix bogus hwcg register updates (git-fixes). * ice: use netif_get_num_default_rss_queues() (bsc#1247712). * libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309). * mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087). * net: mana: Fix incorrect speed reported by debugfs (bsc#1255232). * net: mana: Support HW link state events (bsc#1253049). * nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015). * nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes). * powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199). * sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459). * scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864). * scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864). * scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296). * selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346). * slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes). * smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154). * smb: client: update cfid->last_access_time in open_cached_dir_by_dentry() (git-fixes). * smb: improve directory cache reuse for readdir operations (bsc#1252712). * tsm-mr: Add TVM Measurement Register support (bsc#1257504). * tsm-mr: Add tsm-mr sample code (bsc#1257504). * virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504). * virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504). * virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504). * wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes). * x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504). * x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-325=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * gfs2-kmp-default-6.12.0-160000.26.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.26.1 * dlm-kmp-default-6.12.0-160000.26.1 * kernel-default-debuginfo-6.12.0-160000.26.1 * cluster-md-kmp-default-6.12.0-160000.26.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.26.1 * dlm-kmp-default-debuginfo-6.12.0-160000.26.1 * kernel-default-debugsource-6.12.0-160000.26.1 * SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc) * kernel-default-6.12.0-160000.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54031.html * https://www.suse.com/security/cve/CVE-2025-37744.html * https://www.suse.com/security/cve/CVE-2025-37751.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37845.html * https://www.suse.com/security/cve/CVE-2025-37904.html * https://www.suse.com/security/cve/CVE-2025-37955.html * https://www.suse.com/security/cve/CVE-2025-38243.html * https://www.suse.com/security/cve/CVE-2025-38262.html * https://www.suse.com/security/cve/CVE-2025-38297.html * https://www.suse.com/security/cve/CVE-2025-38298.html * https://www.suse.com/security/cve/CVE-2025-38379.html * https://www.suse.com/security/cve/CVE-2025-38423.html * https://www.suse.com/security/cve/CVE-2025-38505.html * https://www.suse.com/security/cve/CVE-2025-38507.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38521.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38547.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38551.html * https://www.suse.com/security/cve/CVE-2025-38569.html * https://www.suse.com/security/cve/CVE-2025-38589.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-39689.html * https://www.suse.com/security/cve/CVE-2025-39795.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39814.html * https://www.suse.com/security/cve/CVE-2025-39817.html * https://www.suse.com/security/cve/CVE-2025-39829.html * https://www.suse.com/security/cve/CVE-2025-39880.html * https://www.suse.com/security/cve/CVE-2025-39913.html * https://www.suse.com/security/cve/CVE-2025-39927.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40045.html * https://www.suse.com/security/cve/CVE-2025-40097.html * https://www.suse.com/security/cve/CVE-2025-40106.html * https://www.suse.com/security/cve/CVE-2025-40147.html * https://www.suse.com/security/cve/CVE-2025-40195.html * https://www.suse.com/security/cve/CVE-2025-40257.html * https://www.suse.com/security/cve/CVE-2025-40259.html * https://www.suse.com/security/cve/CVE-2025-40261.html * https://www.suse.com/security/cve/CVE-2025-40363.html * https://www.suse.com/security/cve/CVE-2025-68174.html * https://www.suse.com/security/cve/CVE-2025-68178.html * https://www.suse.com/security/cve/CVE-2025-68188.html * https://www.suse.com/security/cve/CVE-2025-68200.html * https://www.suse.com/security/cve/CVE-2025-68211.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68227.html * https://www.suse.com/security/cve/CVE-2025-68241.html * https://www.suse.com/security/cve/CVE-2025-68245.html * https://www.suse.com/security/cve/CVE-2025-68261.html * https://www.suse.com/security/cve/CVE-2025-68296.html * https://www.suse.com/security/cve/CVE-2025-68297.html * https://www.suse.com/security/cve/CVE-2025-68320.html * https://www.suse.com/security/cve/CVE-2025-68325.html * https://www.suse.com/security/cve/CVE-2025-68337.html * https://www.suse.com/security/cve/CVE-2025-68341.html * https://www.suse.com/security/cve/CVE-2025-68348.html * https://www.suse.com/security/cve/CVE-2025-68349.html * https://www.suse.com/security/cve/CVE-2025-68356.html * https://www.suse.com/security/cve/CVE-2025-68359.html * https://www.suse.com/security/cve/CVE-2025-68360.html * https://www.suse.com/security/cve/CVE-2025-68361.html * https://www.suse.com/security/cve/CVE-2025-68366.html * https://www.suse.com/security/cve/CVE-2025-68367.html * https://www.suse.com/security/cve/CVE-2025-68368.html * https://www.suse.com/security/cve/CVE-2025-68372.html * https://www.suse.com/security/cve/CVE-2025-68374.html * https://www.suse.com/security/cve/CVE-2025-68376.html * https://www.suse.com/security/cve/CVE-2025-68379.html * https://www.suse.com/security/cve/CVE-2025-68725.html * https://www.suse.com/security/cve/CVE-2025-68735.html * https://www.suse.com/security/cve/CVE-2025-68741.html * https://www.suse.com/security/cve/CVE-2025-68743.html * https://www.suse.com/security/cve/CVE-2025-68764.html * https://www.suse.com/security/cve/CVE-2025-68768.html * https://www.suse.com/security/cve/CVE-2025-68770.html * https://www.suse.com/security/cve/CVE-2025-68771.html * https://www.suse.com/security/cve/CVE-2025-68773.html * https://www.suse.com/security/cve/CVE-2025-68775.html * https://www.suse.com/security/cve/CVE-2025-68776.html * https://www.suse.com/security/cve/CVE-2025-68777.html * https://www.suse.com/security/cve/CVE-2025-68778.html * https://www.suse.com/security/cve/CVE-2025-68783.html * https://www.suse.com/security/cve/CVE-2025-68784.html * https://www.suse.com/security/cve/CVE-2025-68788.html * https://www.suse.com/security/cve/CVE-2025-68789.html * https://www.suse.com/security/cve/CVE-2025-68792.html * https://www.suse.com/security/cve/CVE-2025-68795.html * https://www.suse.com/security/cve/CVE-2025-68797.html * https://www.suse.com/security/cve/CVE-2025-68798.html * https://www.suse.com/security/cve/CVE-2025-68799.html * https://www.suse.com/security/cve/CVE-2025-68800.html * https://www.suse.com/security/cve/CVE-2025-68801.html * https://www.suse.com/security/cve/CVE-2025-68802.html * https://www.suse.com/security/cve/CVE-2025-68803.html * https://www.suse.com/security/cve/CVE-2025-68804.html * https://www.suse.com/security/cve/CVE-2025-68808.html * https://www.suse.com/security/cve/CVE-2025-68811.html * https://www.suse.com/security/cve/CVE-2025-68813.html * https://www.suse.com/security/cve/CVE-2025-68814.html * https://www.suse.com/security/cve/CVE-2025-68815.html * https://www.suse.com/security/cve/CVE-2025-68816.html * https://www.suse.com/security/cve/CVE-2025-68819.html * https://www.suse.com/security/cve/CVE-2025-68820.html * https://www.suse.com/security/cve/CVE-2025-68821.html * https://www.suse.com/security/cve/CVE-2025-68822.html * https://www.suse.com/security/cve/CVE-2025-71064.html * https://www.suse.com/security/cve/CVE-2025-71066.html * https://www.suse.com/security/cve/CVE-2025-71073.html * https://www.suse.com/security/cve/CVE-2025-71076.html * https://www.suse.com/security/cve/CVE-2025-71077.html * https://www.suse.com/security/cve/CVE-2025-71078.html * https://www.suse.com/security/cve/CVE-2025-71079.html * https://www.suse.com/security/cve/CVE-2025-71080.html * https://www.suse.com/security/cve/CVE-2025-71081.html * https://www.suse.com/security/cve/CVE-2025-71082.html * https://www.suse.com/security/cve/CVE-2025-71083.html * https://www.suse.com/security/cve/CVE-2025-71084.html * https://www.suse.com/security/cve/CVE-2025-71085.html * https://www.suse.com/security/cve/CVE-2025-71086.html * https://www.suse.com/security/cve/CVE-2025-71087.html * https://www.suse.com/security/cve/CVE-2025-71088.html * https://www.suse.com/security/cve/CVE-2025-71089.html * https://www.suse.com/security/cve/CVE-2025-71091.html * https://www.suse.com/security/cve/CVE-2025-71093.html * https://www.suse.com/security/cve/CVE-2025-71094.html * https://www.suse.com/security/cve/CVE-2025-71095.html * https://www.suse.com/security/cve/CVE-2025-71097.html * https://www.suse.com/security/cve/CVE-2025-71098.html * https://www.suse.com/security/cve/CVE-2025-71099.html * https://www.suse.com/security/cve/CVE-2025-71100.html * https://www.suse.com/security/cve/CVE-2025-71101.html * https://www.suse.com/security/cve/CVE-2025-71108.html * https://www.suse.com/security/cve/CVE-2025-71111.html * https://www.suse.com/security/cve/CVE-2025-71112.html * https://www.suse.com/security/cve/CVE-2025-71113.html * https://www.suse.com/security/cve/CVE-2025-71114.html * https://www.suse.com/security/cve/CVE-2025-71116.html * https://www.suse.com/security/cve/CVE-2025-71118.html * https://www.suse.com/security/cve/CVE-2025-71119.html * https://www.suse.com/security/cve/CVE-2025-71120.html * https://www.suse.com/security/cve/CVE-2025-71123.html * https://www.suse.com/security/cve/CVE-2025-71126.html * https://www.suse.com/security/cve/CVE-2025-71130.html * https://www.suse.com/security/cve/CVE-2025-71131.html * https://www.suse.com/security/cve/CVE-2025-71132.html * https://www.suse.com/security/cve/CVE-2025-71133.html * https://www.suse.com/security/cve/CVE-2025-71135.html * https://www.suse.com/security/cve/CVE-2025-71136.html * https://www.suse.com/security/cve/CVE-2025-71137.html * https://www.suse.com/security/cve/CVE-2025-71138.html * https://www.suse.com/security/cve/CVE-2025-71141.html * https://www.suse.com/security/cve/CVE-2025-71142.html * https://www.suse.com/security/cve/CVE-2025-71143.html * https://www.suse.com/security/cve/CVE-2025-71145.html * https://www.suse.com/security/cve/CVE-2025-71147.html * https://www.suse.com/security/cve/CVE-2025-71148.html * https://www.suse.com/security/cve/CVE-2025-71149.html * https://www.suse.com/security/cve/CVE-2025-71154.html * https://www.suse.com/security/cve/CVE-2025-71156.html * https://www.suse.com/security/cve/CVE-2025-71157.html * https://www.suse.com/security/cve/CVE-2025-71162.html * https://www.suse.com/security/cve/CVE-2025-71163.html * https://www.suse.com/security/cve/CVE-2026-22976.html * https://www.suse.com/security/cve/CVE-2026-22977.html * https://www.suse.com/security/cve/CVE-2026-22978.html * https://www.suse.com/security/cve/CVE-2026-22981.html * https://www.suse.com/security/cve/CVE-2026-22982.html * https://www.suse.com/security/cve/CVE-2026-22984.html * https://www.suse.com/security/cve/CVE-2026-22985.html * https://www.suse.com/security/cve/CVE-2026-22986.html * https://www.suse.com/security/cve/CVE-2026-22988.html * https://www.suse.com/security/cve/CVE-2026-22989.html * https://www.suse.com/security/cve/CVE-2026-22990.html * https://www.suse.com/security/cve/CVE-2026-22991.html * https://www.suse.com/security/cve/CVE-2026-22992.html * https://www.suse.com/security/cve/CVE-2026-22993.html * https://www.suse.com/security/cve/CVE-2026-22996.html * https://www.suse.com/security/cve/CVE-2026-22997.html * https://www.suse.com/security/cve/CVE-2026-22999.html * https://www.suse.com/security/cve/CVE-2026-23000.html * https://www.suse.com/security/cve/CVE-2026-23001.html * https://www.suse.com/security/cve/CVE-2026-23002.html * https://www.suse.com/security/cve/CVE-2026-23005.html * https://www.suse.com/security/cve/CVE-2026-23006.html * https://www.suse.com/security/cve/CVE-2026-23011.html * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1235905 * https://bugzilla.suse.com/show_bug.cgi?id=1242505 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242986 * https://bugzilla.suse.com/show_bug.cgi?id=1243452 * https://bugzilla.suse.com/show_bug.cgi?id=1243507 * https://bugzilla.suse.com/show_bug.cgi?id=1243662 * https://bugzilla.suse.com/show_bug.cgi?id=1246184 * https://bugzilla.suse.com/show_bug.cgi?id=1246282 * https://bugzilla.suse.com/show_bug.cgi?id=1247030 * https://bugzilla.suse.com/show_bug.cgi?id=1247292 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248175 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248185 * https://bugzilla.suse.com/show_bug.cgi?id=1248188 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248222 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248232 * https://bugzilla.suse.com/show_bug.cgi?id=1248234 * https://bugzilla.suse.com/show_bug.cgi?id=1248240 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248366 * https://bugzilla.suse.com/show_bug.cgi?id=1248384 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1249307 * https://bugzilla.suse.com/show_bug.cgi?id=1249609 * https://bugzilla.suse.com/show_bug.cgi?id=1249895 * https://bugzilla.suse.com/show_bug.cgi?id=1249998 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250082 * https://bugzilla.suse.com/show_bug.cgi?id=1250388 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250738 * https://bugzilla.suse.com/show_bug.cgi?id=1250748 * https://bugzilla.suse.com/show_bug.cgi?id=1252712 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252784 * https://bugzilla.suse.com/show_bug.cgi?id=1252891 * https://bugzilla.suse.com/show_bug.cgi?id=1252900 * https://bugzilla.suse.com/show_bug.cgi?id=1253049 * https://bugzilla.suse.com/show_bug.cgi?id=1253078 * https://bugzilla.suse.com/show_bug.cgi?id=1253079 * https://bugzilla.suse.com/show_bug.cgi?id=1253087 * https://bugzilla.suse.com/show_bug.cgi?id=1253344 * https://bugzilla.suse.com/show_bug.cgi?id=1253500 * https://bugzilla.suse.com/show_bug.cgi?id=1253739 * https://bugzilla.suse.com/show_bug.cgi?id=1254244 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254447 * https://bugzilla.suse.com/show_bug.cgi?id=1254839 * https://bugzilla.suse.com/show_bug.cgi?id=1254842 * https://bugzilla.suse.com/show_bug.cgi?id=1254845 * https://bugzilla.suse.com/show_bug.cgi?id=1254977 * https://bugzilla.suse.com/show_bug.cgi?id=1255102 * https://bugzilla.suse.com/show_bug.cgi?id=1255128 * https://bugzilla.suse.com/show_bug.cgi?id=1255157 * https://bugzilla.suse.com/show_bug.cgi?id=1255164 * https://bugzilla.suse.com/show_bug.cgi?id=1255172 * https://bugzilla.suse.com/show_bug.cgi?id=1255216 * https://bugzilla.suse.com/show_bug.cgi?id=1255232 * https://bugzilla.suse.com/show_bug.cgi?id=1255241 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255266 * https://bugzilla.suse.com/show_bug.cgi?id=1255268 * https://bugzilla.suse.com/show_bug.cgi?id=1255269 * https://bugzilla.suse.com/show_bug.cgi?id=1255319 * https://bugzilla.suse.com/show_bug.cgi?id=1255327 * https://bugzilla.suse.com/show_bug.cgi?id=1255346 * https://bugzilla.suse.com/show_bug.cgi?id=1255403 * https://bugzilla.suse.com/show_bug.cgi?id=1255417 * https://bugzilla.suse.com/show_bug.cgi?id=1255459 * https://bugzilla.suse.com/show_bug.cgi?id=1255482 * https://bugzilla.suse.com/show_bug.cgi?id=1255506 * https://bugzilla.suse.com/show_bug.cgi?id=1255526 * https://bugzilla.suse.com/show_bug.cgi?id=1255527 * https://bugzilla.suse.com/show_bug.cgi?id=1255529 * https://bugzilla.suse.com/show_bug.cgi?id=1255530 * https://bugzilla.suse.com/show_bug.cgi?id=1255536 * https://bugzilla.suse.com/show_bug.cgi?id=1255537 * https://bugzilla.suse.com/show_bug.cgi?id=1255542 * https://bugzilla.suse.com/show_bug.cgi?id=1255544 * https://bugzilla.suse.com/show_bug.cgi?id=1255547 * https://bugzilla.suse.com/show_bug.cgi?id=1255569 * https://bugzilla.suse.com/show_bug.cgi?id=1255593 * https://bugzilla.suse.com/show_bug.cgi?id=1255622 * https://bugzilla.suse.com/show_bug.cgi?id=1255694 * https://bugzilla.suse.com/show_bug.cgi?id=1255695 * https://bugzilla.suse.com/show_bug.cgi?id=1255703 * https://bugzilla.suse.com/show_bug.cgi?id=1255708 * https://bugzilla.suse.com/show_bug.cgi?id=1255811 * https://bugzilla.suse.com/show_bug.cgi?id=1255930 * https://bugzilla.suse.com/show_bug.cgi?id=1256579 * https://bugzilla.suse.com/show_bug.cgi?id=1256582 * https://bugzilla.suse.com/show_bug.cgi?id=1256584 * https://bugzilla.suse.com/show_bug.cgi?id=1256586 * https://bugzilla.suse.com/show_bug.cgi?id=1256591 * https://bugzilla.suse.com/show_bug.cgi?id=1256592 * https://bugzilla.suse.com/show_bug.cgi?id=1256593 * https://bugzilla.suse.com/show_bug.cgi?id=1256594 * https://bugzilla.suse.com/show_bug.cgi?id=1256597 * https://bugzilla.suse.com/show_bug.cgi?id=1256605 * https://bugzilla.suse.com/show_bug.cgi?id=1256607 * https://bugzilla.suse.com/show_bug.cgi?id=1256608 * https://bugzilla.suse.com/show_bug.cgi?id=1256609 * https://bugzilla.suse.com/show_bug.cgi?id=1256610 * https://bugzilla.suse.com/show_bug.cgi?id=1256611 * https://bugzilla.suse.com/show_bug.cgi?id=1256612 * https://bugzilla.suse.com/show_bug.cgi?id=1256613 * https://bugzilla.suse.com/show_bug.cgi?id=1256616 * https://bugzilla.suse.com/show_bug.cgi?id=1256617 * https://bugzilla.suse.com/show_bug.cgi?id=1256619 * https://bugzilla.suse.com/show_bug.cgi?id=1256622 * https://bugzilla.suse.com/show_bug.cgi?id=1256623 * https://bugzilla.suse.com/show_bug.cgi?id=1256625 * https://bugzilla.suse.com/show_bug.cgi?id=1256627 * https://bugzilla.suse.com/show_bug.cgi?id=1256628 * https://bugzilla.suse.com/show_bug.cgi?id=1256630 * https://bugzilla.suse.com/show_bug.cgi?id=1256632 * https://bugzilla.suse.com/show_bug.cgi?id=1256638 * https://bugzilla.suse.com/show_bug.cgi?id=1256641 * https://bugzilla.suse.com/show_bug.cgi?id=1256643 * https://bugzilla.suse.com/show_bug.cgi?id=1256645 * https://bugzilla.suse.com/show_bug.cgi?id=1256646 * https://bugzilla.suse.com/show_bug.cgi?id=1256650 * https://bugzilla.suse.com/show_bug.cgi?id=1256651 * https://bugzilla.suse.com/show_bug.cgi?id=1256653 * https://bugzilla.suse.com/show_bug.cgi?id=1256654 * https://bugzilla.suse.com/show_bug.cgi?id=1256655 * https://bugzilla.suse.com/show_bug.cgi?id=1256656 * https://bugzilla.suse.com/show_bug.cgi?id=1256659 * https://bugzilla.suse.com/show_bug.cgi?id=1256660 * https://bugzilla.suse.com/show_bug.cgi?id=1256661 * https://bugzilla.suse.com/show_bug.cgi?id=1256664 * https://bugzilla.suse.com/show_bug.cgi?id=1256665 * https://bugzilla.suse.com/show_bug.cgi?id=1256667 * https://bugzilla.suse.com/show_bug.cgi?id=1256668 * https://bugzilla.suse.com/show_bug.cgi?id=1256674 * https://bugzilla.suse.com/show_bug.cgi?id=1256677 * https://bugzilla.suse.com/show_bug.cgi?id=1256680 * https://bugzilla.suse.com/show_bug.cgi?id=1256682 * https://bugzilla.suse.com/show_bug.cgi?id=1256683 * https://bugzilla.suse.com/show_bug.cgi?id=1256688 * https://bugzilla.suse.com/show_bug.cgi?id=1256689 * https://bugzilla.suse.com/show_bug.cgi?id=1256716 * https://bugzilla.suse.com/show_bug.cgi?id=1256726 * https://bugzilla.suse.com/show_bug.cgi?id=1256728 * https://bugzilla.suse.com/show_bug.cgi?id=1256730 * https://bugzilla.suse.com/show_bug.cgi?id=1256733 * https://bugzilla.suse.com/show_bug.cgi?id=1256737 * https://bugzilla.suse.com/show_bug.cgi?id=1256741 * https://bugzilla.suse.com/show_bug.cgi?id=1256742 * https://bugzilla.suse.com/show_bug.cgi?id=1256744 * https://bugzilla.suse.com/show_bug.cgi?id=1256748 * https://bugzilla.suse.com/show_bug.cgi?id=1256749 * https://bugzilla.suse.com/show_bug.cgi?id=1256752 * https://bugzilla.suse.com/show_bug.cgi?id=1256754 * https://bugzilla.suse.com/show_bug.cgi?id=1256755 * https://bugzilla.suse.com/show_bug.cgi?id=1256756 * https://bugzilla.suse.com/show_bug.cgi?id=1256757 * https://bugzilla.suse.com/show_bug.cgi?id=1256759 * https://bugzilla.suse.com/show_bug.cgi?id=1256760 * https://bugzilla.suse.com/show_bug.cgi?id=1256761 * https://bugzilla.suse.com/show_bug.cgi?id=1256763 * https://bugzilla.suse.com/show_bug.cgi?id=1256770 * https://bugzilla.suse.com/show_bug.cgi?id=1256773 * https://bugzilla.suse.com/show_bug.cgi?id=1256774 * https://bugzilla.suse.com/show_bug.cgi?id=1256777 * https://bugzilla.suse.com/show_bug.cgi?id=1256779 * https://bugzilla.suse.com/show_bug.cgi?id=1256781 * https://bugzilla.suse.com/show_bug.cgi?id=1256785 * https://bugzilla.suse.com/show_bug.cgi?id=1256792 * https://bugzilla.suse.com/show_bug.cgi?id=1256793 * https://bugzilla.suse.com/show_bug.cgi?id=1256794 * https://bugzilla.suse.com/show_bug.cgi?id=1256864 * https://bugzilla.suse.com/show_bug.cgi?id=1256865 * https://bugzilla.suse.com/show_bug.cgi?id=1256867 * https://bugzilla.suse.com/show_bug.cgi?id=1256975 * https://bugzilla.suse.com/show_bug.cgi?id=1257015 * https://bugzilla.suse.com/show_bug.cgi?id=1257035 * https://bugzilla.suse.com/show_bug.cgi?id=1257053 * https://bugzilla.suse.com/show_bug.cgi?id=1257154 * https://bugzilla.suse.com/show_bug.cgi?id=1257155 * https://bugzilla.suse.com/show_bug.cgi?id=1257158 * https://bugzilla.suse.com/show_bug.cgi?id=1257159 * https://bugzilla.suse.com/show_bug.cgi?id=1257163 * https://bugzilla.suse.com/show_bug.cgi?id=1257164 * https://bugzilla.suse.com/show_bug.cgi?id=1257167 * https://bugzilla.suse.com/show_bug.cgi?id=1257168 * https://bugzilla.suse.com/show_bug.cgi?id=1257179 * https://bugzilla.suse.com/show_bug.cgi?id=1257180 * https://bugzilla.suse.com/show_bug.cgi?id=1257202 * https://bugzilla.suse.com/show_bug.cgi?id=1257204 * https://bugzilla.suse.com/show_bug.cgi?id=1257207 * https://bugzilla.suse.com/show_bug.cgi?id=1257208 * https://bugzilla.suse.com/show_bug.cgi?id=1257215 * https://bugzilla.suse.com/show_bug.cgi?id=1257217 * https://bugzilla.suse.com/show_bug.cgi?id=1257218 * https://bugzilla.suse.com/show_bug.cgi?id=1257220 * https://bugzilla.suse.com/show_bug.cgi?id=1257221 * https://bugzilla.suse.com/show_bug.cgi?id=1257225 * https://bugzilla.suse.com/show_bug.cgi?id=1257227 * https://bugzilla.suse.com/show_bug.cgi?id=1257232 * https://bugzilla.suse.com/show_bug.cgi?id=1257234 * https://bugzilla.suse.com/show_bug.cgi?id=1257236 * https://bugzilla.suse.com/show_bug.cgi?id=1257243 * https://bugzilla.suse.com/show_bug.cgi?id=1257245 * https://bugzilla.suse.com/show_bug.cgi?id=1257276 * https://bugzilla.suse.com/show_bug.cgi?id=1257277 * https://bugzilla.suse.com/show_bug.cgi?id=1257279 * https://bugzilla.suse.com/show_bug.cgi?id=1257282 * https://bugzilla.suse.com/show_bug.cgi?id=1257296 * https://bugzilla.suse.com/show_bug.cgi?id=1257309 * https://bugzilla.suse.com/show_bug.cgi?id=1257473 * https://bugzilla.suse.com/show_bug.cgi?id=1257504 * https://bugzilla.suse.com/show_bug.cgi?id=1257603 * https://jira.suse.com/browse/PED-10906 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-14156 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:32 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:32 -0000 Subject: SUSE-RU-2026:20614-1: important: Recommended update for crmsh Message-ID: <177272859298.1967.8950149339132898089@df8f6ab05d2e> # Recommended update for crmsh Announcement ID: SUSE-RU-2026:20614-1 Release Date: 2026-02-26T07:40:43Z Rating: important References: * bsc#1254571 * bsc#1254892 * bsc#1257143 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that has three fixes can now be installed. ## Description: This update for crmsh fixes the following issues: * Update to version 5.0.0+20260126.316aa9fa: * Dev: options: Change 'force' option to be session-only (bsc#1254892) * Fix: sbd: Allow setting -1 to stonith-watchdog-timeout (bsc#1257143) * Fix: qdevice: Make sure stonith-watchdog-timeout is 2 times of SBD_WATCHDOG_TIMEOUT (bsc#1254571) * Fix: migration: Avoid exception inside thread * Dev: sbd: Remove sbd configuration directories while removing cluster node ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-311=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (noarch) * crmsh-scripts-5.0.0+20260126.316aa9fa-160000.1.1 * crmsh-5.0.0+20260126.316aa9fa-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254571 * https://bugzilla.suse.com/show_bug.cgi?id=1254892 * https://bugzilla.suse.com/show_bug.cgi?id=1257143 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:35 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:35 -0000 Subject: SUSE-RU-2026:20613-1: important: Recommended update for lvm2 Message-ID: <177272859568.1967.9056868825098073768@df8f6ab05d2e> # Recommended update for lvm2 Announcement ID: SUSE-RU-2026:20613-1 Release Date: 2026-02-20T15:48:21Z Rating: important References: * bsc#1257661 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that has one fix can now be installed. ## Description: This update for lvm2 fixes the following issues: * L3: LVM_SUPPRESS_FD_WARNINGS is no longer effective (bsc#1257661) * libdaemon: fix suppressing stray fd warnings ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-305=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * lvm2-lockd-2.03.29-160000.3.1 * lvm2-lockd-debuginfo-2.03.29-160000.3.1 * lvm2-lvmlockd-debugsource-2.03.29-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257661 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:37 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:37 -0000 Subject: SUSE-SU-2026:20611-1: important: Security update for the initial kernel livepatch Message-ID: <177272859796.1967.3678532827726862614@df8f6ab05d2e> # Security update for the initial kernel livepatch Announcement ID: SUSE-SU-2026:20611-1 Release Date: 2026-02-27T11:23:38Z Rating: important References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-326=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-326=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-livepatch-6_12_0-160000_26-default-1-160000.1.1 * kernel-livepatch-6_12_0-160000_26-default-debuginfo-1-160000.1.1 * kernel-livepatch-SLE16_Update_5-debugsource-1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * kernel-livepatch-6_12_0-160000_26-default-1-160000.1.1 * kernel-livepatch-6_12_0-160000_26-default-debuginfo-1-160000.1.1 * kernel-livepatch-SLE16_Update_5-debugsource-1-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:36 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:36 -0000 Subject: SUSE-OU-2026:20612-1: moderate: Optional update for ansible-trento Message-ID: <177272859694.1967.11804339417990698820@df8f6ab05d2e> # Optional update for ansible-trento Announcement ID: SUSE-OU-2026:20612-1 Release Date: 2026-02-25T10:16:19Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for ansible-trento fixes the following issues: Adds ansible-trento to the distribution. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-309=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-309=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * ansible-trento-1.0.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * ansible-trento-1.0.0-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:52 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:52 -0000 Subject: SUSE-SU-2026:20610-1: important: Security update for kubevirt Message-ID: <177272861296.1967.5011457131257788231@df8f6ab05d2e> # Security update for kubevirt Announcement ID: SUSE-SU-2026:20610-1 Release Date: 2026-02-27T08:49:48Z Rating: important References: * bsc#1241772 * bsc#1253181 * bsc#1253185 * bsc#1253186 * bsc#1253189 * bsc#1253194 * bsc#1253748 * bsc#1257128 * bsc#1257422 Cross-References: * CVE-2024-45310 * CVE-2025-22872 * CVE-2025-64324 * CVE-2025-64432 * CVE-2025-64433 * CVE-2025-64434 * CVE-2025-64435 * CVE-2025-64437 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L * CVE-2025-64324 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64324 ( NVD ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-64324 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64432 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64432 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64433 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-64433 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64433 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-64434 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-64434 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-64434 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64435 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-64435 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-64435 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-64437 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-64437 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L * CVE-2025-64437 ( NVD ): 5.0 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves eight vulnerabilities and has one fix can now be installed. ## Description: This update for kubevirt fixes the following issues: Update to version 1.7.0 (bsc#1257128). Security issues fixed: * CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS (bsc#1253189). * CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into creating empty files/directories on host (bsc#1257422). * CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241772). * CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls (bsc#1253181). * CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185). * CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations (bsc#1253186). * CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194). * CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users (bsc#1253748). Other updates and bugfixes: * Upstream now uses stateless firmware for CoCo VMs. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-319=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-319=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (x86_64) * kubevirt-virtctl-1.7.0-160000.1.1 * kubevirt-virtctl-debuginfo-1.7.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * kubevirt-virtctl-1.7.0-160000.1.1 * kubevirt-virtctl-debuginfo-1.7.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://www.suse.com/security/cve/CVE-2025-22872.html * https://www.suse.com/security/cve/CVE-2025-64324.html * https://www.suse.com/security/cve/CVE-2025-64432.html * https://www.suse.com/security/cve/CVE-2025-64433.html * https://www.suse.com/security/cve/CVE-2025-64434.html * https://www.suse.com/security/cve/CVE-2025-64435.html * https://www.suse.com/security/cve/CVE-2025-64437.html * https://bugzilla.suse.com/show_bug.cgi?id=1241772 * https://bugzilla.suse.com/show_bug.cgi?id=1253181 * https://bugzilla.suse.com/show_bug.cgi?id=1253185 * https://bugzilla.suse.com/show_bug.cgi?id=1253186 * https://bugzilla.suse.com/show_bug.cgi?id=1253189 * https://bugzilla.suse.com/show_bug.cgi?id=1253194 * https://bugzilla.suse.com/show_bug.cgi?id=1253748 * https://bugzilla.suse.com/show_bug.cgi?id=1257128 * https://bugzilla.suse.com/show_bug.cgi?id=1257422 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:36:54 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:36:54 -0000 Subject: SUSE-OU-2026:20609-1: moderate: Optional update for migrate-sles-to-sles4sap Message-ID: <177272861434.1967.207173704171598212@df8f6ab05d2e> # Optional update for migrate-sles-to-sles4sap Announcement ID: SUSE-OU-2026:20609-1 Release Date: 2026-02-20T15:44:42Z Rating: moderate References: * jsc#PED-13724 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature can now be installed. ## Description: This update for migrate-sles-to-sles4sap fixes the following issues: This ships the migrate-sles-to-sles4sap tool to migrate SLES to SLES 4 SAP. (jsc#PED-13724) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-306=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-306=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * migrate-sles-to-sles4sap-15.1.2-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * migrate-sles-to-sles4sap-15.1.2-160000.1.1 ## References: * https://jira.suse.com/browse/PED-13724 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:00 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:00 -0000 Subject: SUSE-SU-2026:20608-1: important: Security update for glibc-livepatches Message-ID: <177272862003.1967.13893661166734801148@df8f6ab05d2e> # Security update for glibc-livepatches Announcement ID: SUSE-SU-2026:20608-1 Release Date: 2026-02-19T13:54:03Z Rating: important References: * bsc#1226501 * bsc#1228879 * bsc#1256913 Cross-References: * CVE-2026-0861 CVSS scores: * CVE-2026-0861 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0861 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability and has two fixes can now be installed. ## Description: This update for glibc-livepatches fixes the following issues: Changes in glibc-livepatches: * CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256913) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-301=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-301=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (x86_64) * glibc-livepatches-0.3-160000.1.1 * glibc-livepatches-debugsource-0.3-160000.1.1 * glibc-livepatches-debuginfo-0.3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * glibc-livepatches-0.3-160000.1.1 * glibc-livepatches-debugsource-0.3-160000.1.1 * glibc-livepatches-debuginfo-0.3-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0861.html * https://bugzilla.suse.com/show_bug.cgi?id=1226501 * https://bugzilla.suse.com/show_bug.cgi?id=1228879 * https://bugzilla.suse.com/show_bug.cgi?id=1256913 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:07 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:07 -0000 Subject: SUSE-SU-2026:20607-1: critical: Security update for openssl-3-livepatches Message-ID: <177272862724.1967.3967939577183247922@df8f6ab05d2e> # Security update for openssl-3-livepatches Announcement ID: SUSE-SU-2026:20607-1 Release Date: 2026-02-18T16:22:39Z Rating: critical References: * bsc#1250410 * bsc#1256876 * bsc#1256878 * bsc#1256880 Cross-References: * CVE-2025-11187 * CVE-2025-15467 * CVE-2025-15468 * CVE-2025-9230 CVSS scores: * CVE-2025-11187 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11187 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11187 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H * CVE-2025-15467 ( SUSE ): 9.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-15467 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-15468 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-15468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-15468 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-9230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for openssl-3-livepatches fixes the following issues: * CVE-2025-11187: Fixed improper validation of PBMAC1 parameters in PKCS#12 MAC verification (bsc#1256878). * CVE-2025-15467: Fixed stack buffer overflow in CMS AuthEnvelopedData parsing (bsc#1256876). * CVE-2025-15468: Fixed NULL dereference in SSL_CIPHER_find() function on unknown cipher ID (bsc#1256880). * CVE-2025-9230: Fixed out-of-bounds read & write in RFC 3211 KEK Unwrap (bsc#1250410). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-298=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-298=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (ppc64le x86_64) * openssl-3-livepatches-0.3-160000.1.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * openssl-3-livepatches-debugsource-0.3-160000.1.1 * openssl-3-livepatches-debuginfo-0.3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * openssl-3-livepatches-0.3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * openssl-3-livepatches-debugsource-0.3-160000.1.1 * openssl-3-livepatches-debuginfo-0.3-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11187.html * https://www.suse.com/security/cve/CVE-2025-15467.html * https://www.suse.com/security/cve/CVE-2025-15468.html * https://www.suse.com/security/cve/CVE-2025-9230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250410 * https://bugzilla.suse.com/show_bug.cgi?id=1256876 * https://bugzilla.suse.com/show_bug.cgi?id=1256878 * https://bugzilla.suse.com/show_bug.cgi?id=1256880 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:11 -0000 Subject: SUSE-SU-2026:20606-1: important: Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) Message-ID: <177272863145.1967.5854245263323142950@df8f6ab05d2e> # Security update for the Linux Kernel (Live Patch 1 for SUSE Linux Enterprise 16) Announcement ID: SUSE-SU-2026:20606-1 Release Date: 2026-02-18T16:13:19Z Rating: important References: * bsc#1253439 Cross-References: * CVE-2025-40186 CVSS scores: * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.12.0-160000.6.1 fixes one security issue The following security issue was fixed: * CVE-2025-40186: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request() (bsc#1253439). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-297=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-297=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-livepatch-SLE16_Update_1-debugsource-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-default-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-default-debuginfo-4-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * kernel-livepatch-SLE16_Update_1-debugsource-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-default-4-160000.1.1 * kernel-livepatch-6_12_0-160000_6-default-debuginfo-4-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40186.html * https://bugzilla.suse.com/show_bug.cgi?id=1253439 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:12 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:12 -0000 Subject: SUSE-RU-2026:20605-1: moderate: Recommended update for libpinyin Message-ID: <177272863287.1967.15916155088893632917@df8f6ab05d2e> # Recommended update for libpinyin Announcement ID: SUSE-RU-2026:20605-1 Release Date: 2026-03-02T15:48:41Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for libpinyin fixes the following issues: * Update version to 2.10.3: * Fix bugs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-337=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-337=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libzhuyin15-debuginfo-2.10.3-160000.1.1 * libpinyin15-2.10.3-160000.1.1 * libpinyin-data-2.10.3-160000.1.1 * libpinyin15-debuginfo-2.10.3-160000.1.1 * libpinyin-debugsource-2.10.3-160000.1.1 * libzhuyin15-2.10.3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libzhuyin15-debuginfo-2.10.3-160000.1.1 * libpinyin15-2.10.3-160000.1.1 * libpinyin-data-2.10.3-160000.1.1 * libpinyin15-debuginfo-2.10.3-160000.1.1 * libpinyin-debugsource-2.10.3-160000.1.1 * libzhuyin15-2.10.3-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:15 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:15 -0000 Subject: SUSE-SU-2026:20604-1: moderate: Security update for assertj-core Message-ID: <177272863545.1967.12383455962092502678@df8f6ab05d2e> # Security update for assertj-core Announcement ID: SUSE-SU-2026:20604-1 Release Date: 2026-03-02T15:48:41Z Rating: moderate References: * bsc#1257293 Cross-References: * CVE-2026-24400 CVSS scores: * CVE-2026-24400 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-24400 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2026-24400 ( NVD ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for assertj-core fixes the following issues: Upgrade to version 3.27.7: * CVE-2026-24400: Fix XXE vulnerability in isXmlEqualTo assertion (bsc#1257293). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-336=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-336=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * assertj-core-3.27.7-160000.1.1 * assertj-core-javadoc-3.27.7-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * assertj-core-3.27.7-160000.1.1 * assertj-core-javadoc-3.27.7-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-24400.html * https://bugzilla.suse.com/show_bug.cgi?id=1257293 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:18 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:18 -0000 Subject: SUSE-SU-2026:20603-1: moderate: Security update for rhino Message-ID: <177272863824.1967.18322773312579838879@df8f6ab05d2e> # Security update for rhino Announcement ID: SUSE-SU-2026:20603-1 Release Date: 2026-03-02T15:48:41Z Rating: moderate References: * bsc#1254481 Cross-References: * CVE-2025-66453 CVSS scores: * CVE-2025-66453 ( SUSE ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-66453 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-66453 ( NVD ): 5.5 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for rhino fixes the following issues: Update to 1.7.15.1: * CVE-2025-66453: Fixed a problem with formatting of floating-point numbers to strings that may result in DoS (bsc#1254481). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-335=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-335=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * rhino-engine-1.7.15.1-160000.1.1 * rhino-demo-1.7.15.1-160000.1.1 * rhino-runtime-1.7.15.1-160000.1.1 * rhino-1.7.15.1-160000.1.1 * rhino-javadoc-1.7.15.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * rhino-engine-1.7.15.1-160000.1.1 * rhino-demo-1.7.15.1-160000.1.1 * rhino-runtime-1.7.15.1-160000.1.1 * rhino-1.7.15.1-160000.1.1 * rhino-javadoc-1.7.15.1-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66453.html * https://bugzilla.suse.com/show_bug.cgi?id=1254481 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:21 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:21 -0000 Subject: SUSE-RU-2026:20602-1: important: Recommended update for smc-tools Message-ID: <177272864133.1967.17937398824460651595@df8f6ab05d2e> # Recommended update for smc-tools Announcement ID: SUSE-RU-2026:20602-1 Release Date: 2026-03-02T13:17:40Z Rating: important References: * bsc#1230052 * jsc#PED-14601 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature and has one fix can now be installed. ## Description: This update for smc-tools fixes the following issues: * Upgrade smc-tools to v1.8.7 (jsc#PED-14601, bsc#1230052): * Bug fixes: * smc_rnics: fix regression when PFT not available * smcd/smcr: prevent DoS on statistics workfile present in /tmp/ * Upgrade smc-tools to v1.8.6 (jsc#PED-14601): * Bug fixes: * man pages: Update man page for smc_pnet * smc-tools: Display sndbuf/RMB stats only if supported by the kernel * Upgrade smc-tools to v1.8.5: * Changes: * smc_rnics: Add support for Network Express RNIC in smc_rnics * smc_rnics: Add PFT and VF columns to smc_rnics output * Bug fixes: * libnetlink..: Fix function declaration to use a void prototype * smc_rnics: Update smc_chk to extract PNetID from column 9 * man pages: Update man page for --rawids option and PFT and VF columns * smc_rnics: Fix missing PPrt values in smc_rnics -r output * fix build with gcc15 * Makefile: Make sure to show the right release number ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-334=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-334=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * smc-tools-completion-1.8.7-160000.1.1 * smc-tools-debugsource-1.8.7-160000.1.1 * smc-tools-1.8.7-160000.1.1 * smc-tools-debuginfo-1.8.7-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * smc-tools-completion-1.8.7-160000.1.1 * smc-tools-debugsource-1.8.7-160000.1.1 * smc-tools-1.8.7-160000.1.1 * smc-tools-debuginfo-1.8.7-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230052 * https://jira.suse.com/browse/PED-14601 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:22 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:22 -0000 Subject: SUSE-RU-2026:20601-1: moderate: Recommended update for maven, maven-archiver, maven-dependency-plugin, maven-dependency-analyzer, maven-compiler-plugin, maven-assembly-plugin, byte-buddy, bouncycastle, apache-parent, maven-parent, maven-resolver, maven-resources-plugin, objectweb-asm, truth, xmlunit, xz-java Message-ID: <177272864282.1967.16869221015441858215@df8f6ab05d2e> # Recommended update for maven, maven-archiver, maven-dependency-plugin, maven- dependency-analyzer, maven-compiler-plugin, maven-assembly-plugin, byte-buddy, bouncycastle, apache-parent, maven-parent, maven-resolver, maven-resources- plugin, objectweb-asm, truth, xmlunit, xz-java Announcement ID: SUSE-RU-2026:20601-1 Release Date: 2026-03-02T12:51:58Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for maven, maven-archiver, maven-dependency-plugin, maven- dependency-analyzer, maven-compiler-plugin, maven-assembly-plugin, byte-buddy, bouncycastle, apache-parent, maven-parent, maven-resolver, maven-resources- plugin, objectweb-asm, truth, xmlunit, xz-java fixes the following issues: Changes in maven: Specify required maven-resolver version since the maven-resolver-provider requires methods added in 1.9.25 Upgrade to upstream version 3.9.12 * New features and improvements * Apply resolver changes and improvements * Update formatting of prerequisites-requirements error to improve readability * Allow a Maven plugin to require a Java version * Use MavenRepositorySystem in ProjectBuildingHelper instead of deprecated RepositorySystem * Make maven.config use UTF8 * Simplify prefix resolution * Bug Fixes * Add default implementation for new method in MavenPluginManager * Repository layout should be used in MavenRepositorySystem * Fix plugin prefix resolution when metadata is not available from repository * Improve source root modification warning message * Bug: bad cache isolation between two sessions * Set Guice class loading to CHILD - avoid using terminally deprecated methods * Avoid parsing MAVEN_OPTS (3.9.x) * Documentation updates * clarify repository vs deployment repository * add maintained branches * Maintenance * Add IntelliJ icon * Build by JDK 25 * Deprecate org.apache.maven.repository.RepositorySystem in 3.9.x * Build * Bump actions/download-artifact from 5.0.0 to 6.0.0 * Bump actions/upload-artifact from 4.6.2 to 5.0.0 * Dependency updates * Bump actions/cache from 4.2.3 to 5.0.0 * Bump resolverVersion from 1.9.24 to 1.9.25 * Bump actions/checkout from 5.0.0 to 6.0.1 * Bump actions/setup-java from 5.0.0 to 5.1.0 * Bump commons-cli:commons-cli from 1.9.0 to 1.11.0 * Bump org.codehaus.plexus:plexus-interpolation from 1.28 to 1.29 * Bump commons-io:commons-io from 2.19.0 to 2.21.0 * Bump xmlunitVersion from 2.10.3 to 2.11.0 * Bump org.codehaus.mojo:animal-sniffer-maven-plugin from 1.24 to 1.26 * Bump org.ow2.asm:asm from 9.8 to 9.9 * Bump com.google.guava:guava from 33.4.8-jre to 33.5.0-jre Changes in maven-archiver: * Upgrade to maven-archiver 3.6.6 * New features and improvements * Backport sorting of properties to maven archiver 3.x * Maintenance * Convert to MARKDOWN with doxia-converter * Add more timestamp tests * Dependency updates * Bump Maven to 3.9.12 * Bump org.codehaus.plexus:plexus-archiver from 4.10.2 to 4.10.4 * Bump org.codehaus.plexus:plexus-interpolation from 1.28 to 1.29 Changes in maven-dependency-plugin: * Upgrade to version 3.9.0 * New features and improvements * Use Resolver API in go-offline for dependencies resolving * Use Resolver API in go-offline for plugins resolving * Fixes #1522, add render-dependencies mojo * Use Resolver API in resolve-plugin * MDEP-964: unconditionally ignore dependencies known to be loaded by reflection * Update maven-dependency-analyzer to support Java24 * MDEP-972: copy-dependencies: copy signatures alongside artifacts * MDEP-776: Warn when multiple dependencies have the same file name * MDEP-966: Migrate AnalyzeDepMgt to Sisu * MDEP-957: By default, don't report slf4j-simple as unused * Bug Fixes * ProjectBuildingRequest should not be modified * Fix: markersDirectory is not working when unpack goal is executed from command line * Fix broken link for analyze-exclusions-mojo on usage-page * MDEP-839: Avoid extra blank lines in file * Update collect URL * MDEP-689: Fixes ignored dependency filtering in go-offline goal * MDEP-960: Repair silent logging * Documentation updates * MDEP-933: Document dependency tree output formats * Add additional comment to clarify the minimal supported version of outputing dependency tree in JSON fromat. * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Unix file separators * Maintenance * Simplify usage of RepositoryManager and DependencyResolver * Use Resolver API in copy and unpack * Update site descriptor to 2.0.0 * Enable prevent branch protection rules * Fix [MDEP-931: Replace PrintWriter with Writer in AbstractSerializing Visitor and subclasses * Cleanups dependencies * Copy edit parameter descriptions * Small Javadoc clarifications * MDEP-967: Change info to debug logging in AbstractFromConfigurationMojo * fix: remove duplicate maven-resolver-api and maven-resolver-util dependencies in pom.xml * Enable GH issues * Remove redundant/unneeded code * Add PR Automation and Stale actions * Keep files in temporary directory to be deleted after test * Drop unnecessary call * Avoid deprecated ArtifactFactory * MDEP-966: Convert remaining Mojos to Guice injection * MDEP-966: Convert Analyze Mojos to Guice constructor injection * MDEP-966: Prefer Guice injection * MDEP-966: Migrate TreeMojo/CopyMojo/AnalyzeExclusionsMojo/ /UnpackMojo/CopyDependenciesMojo from Plexus to Sisu Guice * MDEP-966: @component --> @Inject for DisplayAncestorsMojo * Fixing flaky test in TestCopyDependenciesMojo * MNG-2961: Remove workaround for fixed bug * Build * Build by Maven 4 * Dependency updates * Bump Maven in dependencies to 3.9.11 * Bump commons-io:commons-io from 2.16.1 to 2.20.0 * Bump jettyVersion from 9.4.56.v20240826 to 9.4.58.v20250814 * Bump org.apache.commons:commons-lang3 from 3.17.0 to 3.19.0 * Bump org.apache.maven.plugins:maven-plugins from 43 to 45 * Bump org.codehaus.mojo:mrm-maven-plugin from 1.6.0 to 1.7.0 * Bump org.codehaus.plexus:plexus-archiver from 4.10.0 to 4.10.1 * Bump org.codehaus.plexus:plexus-i18n from 1.0-beta-10 to 1.0.0 * Bump org.jsoup:jsoup from 1.18.1 to 1.21.2 * MDEP-963: Bump org.apache.maven.shared:maven-dependency-analyzer from 1.15.0 to 1.15.1 Changes in maven-dependency-analyzer: * Upgrade to upstream version 1.17.0 * New features and improvements * Recognize classes used in web.xml as main classes * Introduced a DependencyClassesProvider service * Maintenance * Update site descriptor to 2.0 * Fix badges in README * Exclude slf4j 2.x and mockito 5.x from dependabot * feat: enable prevent branch protection rules * Catch exceptions on all paths * Add Apache 2.0 LICENSE file * Handle corrupt constant pools * Remove redundant code * move default to end * Build * Build on GH also by Maven 4 * Dependency updates * Bump org.assertj:assertj-bom from 3.27.3 to 3.27.7 * Bump org.apache.maven.shared:maven-shared-components from 44 to 47 * Bump mavenVersion from 3.9.9 to 3.9.12 * Bump org.ow2.asm:asm from 9.8 to 9.9.1 * Update Invoker Plugin and Plugin tools to support Java 25 * Bump org.assertj:assertj-bom from 3.26.3 to 3.27.3 Changes in maven-compiler-plugin: * Upgrade to upsteam release 3.15.0 * Bug Fixes * Fix Java 25 compatibility during integration tests * MCOMPILER-540: useIncrementalCompilation=false may add generated sources to the sources list * Maintenance * Bump org.apache.maven.plugins:maven-plugins from 45 to 46 * Remove declaration of "plexus-snapshots" repository * Works only with Maven 4.0.0 rc4 * Enable Java 25 and Maven 4 in CI * Dependency updates * Bump maven-plugin-testing-harness to 3.5.0 * Bump plexusCompilerVersion from 2.15.0 to 2.16.2 * Bump org.apache.maven.plugins:maven-plugins from 46 to 47 * Bump org.codehaus.plexus:plexus-java from 1.5.0 to 1.5.2 * Bump org.ow2.asm:asm from 9.8 to 9.9.1 * Bump mavenVersion from 3.9.11 to 3.9.12 Changes in maven-assembly-plugin: * Update to version 3.8.0 * Bug Fixes * MASSEMBLY-1030: Manifest entries from archive configuration are not added in final MANIFEST * MASSEMBLY-1029: Use minimal level for model validation * Documentation updates * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Maintenance * chore: migrate junit3/4 to junit5 * feat: enable prevent branch protection rules * Enable Github Issues * Dependency updates * MASSEMBLY-1028: Bump org.apache.maven:maven-archiver from 3.6.1 to 3.6.2 * Bump org.apache.maven:maven-archiver from 3.6.2 to 3.6.5 * MASSEMBLY-1027: Bump commons-io:commons-io from 2.15.1 to 2.16.0 * Bump commons-io:commons-io from 2.16.0 to 2.21.0 * Bump Maven to 3.9.11. Prerequisite still 3.6.3 * Bump org.apache.commons:commons-lang3 from 3.19.0 to 3.20.0 * Bump org.codehaus.plexus:plexus-io from 3.4.2 to 3.6.0 * Bump org.codehaus.plexus:plexus-interpolation from 1.27 to 1.29 * Bump org.codehaus.plexus:plexus-archiver from 4.9.2 to 4.10.4 * Bump com.github.luben:zstd-jni from 1.5.5-11 to 1.5.7-6 * Bump m-invoker-p to 3.9.1 for Java 25 * Bump org.apache.maven.plugins:maven-plugins from 41 to 45 * Bump org.apache.commons:commons-compress from 1.26.1 to 1.28.0 * Bump commons-fileupload:commons-fileupload from 1.5 to 1.6.0 in /src/it/projects/bugs/massembly-580 * Bump org.codehaus.plexus:plexus-archiver from to 4.10.0 * Bump org.apache.maven.shared:maven-common-artifact-filters from 3.3.2 to 3.4.0 * Bump org.apache.maven.shared:maven-filtering from 3.3.2 to 3.4.0 * Bump org.hamcrest:hamcrest from 2.2 to 3.0 Changes in byte-buddy: * Update to v1.18.3 * Changes of v1.18.3 * Avoid using Class File API when Byte Buddy is loaded on the boot loader where multi-release jars are not available. * Add additional safety when processing class files with illegally formed parameters. * Update to latest ASM. * Changes of v1.18.2 * Support modifiers for value classes in Valhalla builds. * Improve use of build cache in Gradle. * Update to v1.18.1 * Changes of v1.18.1 * Fix generated module-info to include new package. * Changes of v1.18.0 * Add support for module-info class files and ModuleDescriptions. * Allow for manipulating module information using the ByteBuddy API. * Changes of v1.17.8 * Avoid use of types that are deprecated as of Java 26. * Include ASM 9.9 that offers ASM support for Java 26. * Make sure that generated code internal to Byte Buddy supports CDS if available. * Update version of ASM to JDK Class File API bridge to fix some minor bugs related to type annotations. * Changes of v1.17.7 * Specify correct JVM environment for Android builds when using the Gradle plugin. * Avoid recomputing the size of a parameter list for performance reasons after measuring the significant impact. * Correct validation of JVM names to avoid breaking when Java names are not allowed while JVM names are, with Kotlin and others. * Require for build objectweb-asm >= 9.8 for Opcodes.V25 Changes in bouncycastle: * Update to 1.83: * Defects Fixed: * Attempting to check a password on a stripped PGP would throw an exception. Checking the password on such a key will now always return false. * Fixed an issue in KangarooTwelve where premature absorption caused erroneous 168-byte padding; absorption is now delayed so correct final-byte padding is applied. * BCJSSE: Fix supported_versions creation for renegotiation handshake. * (D)TLS: Reneg info now oly offered with pre-1.3. * Additional Features and Functionality: * A generic "COMPOSITE" algorithm name has been added as a JCA Signature algorithm. The algorithm will identify the composite signature to use from the composite key passed in. * The composite signatures implementation has been updated to the final draft and now follows the submitted standard. * Support for the generation and use as trust anchors has been added for certificate signatures with id-alg-unsigned as the signature type. * Support for CMP direct POP for encryption keys using challenge/response has been added to the CMP/CRMF APIs. * Support for SupportedCurves attribute to the BC provider * BCJSSE: Added support for SLH-DSA signature schemes in TLS 1.3 per draft-reddy-tls-slhdsa-01. * Support has been added for the Java 25 KDF API (current algorithms, PBKDF2, SCRYPT, and HKDF). * Support for composite signatures is now included in CMS and timestamping. * It is now possible to disable the Lenstra check in RSA where the public key is not available via the system/security property "org.bouncycastle.rsa.no_lenstra_check". Changes in apache-parent: * Update to 37: * New features and improvements * Disable parallel PUT on release * Update to 36: * Breaking changes * Update minimum maven version to match current stable version (3.6.3 -> 3.9) * Introduce javaVersion property for maven.compiler.* configuration * Switch JDK >= 9 to only use maven.compiler.release * New features and improvements * Add default specification and implementation for javadoc and source manifest entries * Documentation updates * Clarify how to use Apache Snapshot repository * activate Fluido skin's anchorJs * Maintenance * Avoid - WARNING: Use of the three-letter time zone ID ... on JDK 25 for RAT plugin * feat: enable prevent branch protection rules Changes in maven-parent: * Upgrade to Apache Maven parent POM version 47 * Dependency updates * Bump parent to 37 * Bump org.junit:junit-bom from 5.14.1 to 5.14.2 * Upgrade to Apache Maven parent POM version 46 * Breaking changes * Require Maven 3.6.3+ from plugins * Update rat plugin configuration * Use spotless 3 when running on JDK >= 17 * Drop Doxia Tools parent pom * New features and improvements * MPOM-387: Exclude test scope from enforcedBytecodeVersion * feat: activate Fluido skin's anchorJs * Enhance target JDK definition for JDK >= 9 * Always render a GitHub ribbon on the right-hand side * Maintenance * MPOM-277: Move maven-invoker-plugin configuration to one place * Remove doxia-tools from documentations * feat: enable prevent branch protection rules * Add Apache 2.0 LICENSE file Changes in maven-resolver: * Update to upstream version 1.9.25 * New features and improvements * Add scope support for trusted checksums * Name mappers cleanup and new GAECV mapper * Proper metadata locking support * Ability to augment metadata nature for version range request * Bug Fixes * TrackingFileManager changes * Maven filters daemon friendly * Remove hack from Basic connector * Fix locking issues * Documentation updates * Updated the documentation to reflect the current list of name mappers * Maintenance * Mild backport: support same properties as Resolver 2.x * Maven resolver lockrepro * Bugfix: Java 25 broke test * Dependency updates * Bump com.github.siom79.japicmp:japicmp-maven-plugin from 0.23.1 to 0.25.0 * Bump org.codehaus.mojo:animal-sniffer-maven-plugin from 1.24 to 1.26 * Bump commons-codec:commons-codec from 1.18.0 to 1.20.0 * Bump org.redisson:redisson from 3.50.0 to 3.52.0 * Bump com.google.guava:guava from 33.4.8-jre to 33.5.0-jre * Bump com.google.code.gson:gson from 2.13.1 to 2.13.2 * Bump jettyVersion from 9.4.57.v20241219 to 9.4.58.v20250814 * Bump mavenVersion from 3.9.10 to 3.9.11 Changes in maven-resolver: * Update to upstream version 1.9.25 * New features and improvements * Add scope support for trusted checksums * Name mappers cleanup and new GAECV mapper * Proper metadata locking support * Ability to augment metadata nature for version range request * Bug Fixes * TrackingFileManager changes * Maven filters daemon friendly * Remove hack from Basic connector * Fix locking issues * Documentation updates * Updated the documentation to reflect the current list of name mappers * Maintenance * Mild backport: support same properties as Resolver 2.x * Maven resolver lockrepro * Bugfix: Java 25 broke test * Dependency updates * Bump com.github.siom79.japicmp:japicmp-maven-plugin from 0.23.1 to 0.25.0 * Bump org.codehaus.mojo:animal-sniffer-maven-plugin from 1.24 to 1.26 * Bump commons-codec:commons-codec from 1.18.0 to 1.20.0 * Bump org.redisson:redisson from 3.50.0 to 3.52.0 * Bump com.google.guava:guava from 33.4.8-jre to 33.5.0-jre * Bump com.google.code.gson:gson from 2.13.1 to 2.13.2 * Bump jettyVersion from 9.4.57.v20241219 to 9.4.58.v20250814 * Bump mavenVersion from 3.9.10 to 3.9.11 Changes in maven-resources-plugin: * Upgrade to version 3.4.0 * New features and improvements * Enable GitHub Issues * Documentation updates * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * MRESOURCES-299: Be more accurate on using filtering element * Don't bother with very old versions * Maintenance * Migrate site to Doxia 2 * PlexusFileUtils Refaster recipes * Add PR Automation action * Improve release-drafter configuration * Add dependency to slf4j-simple for test scope * Use try with resources in integration test * reduce dependency scope of plexus-utils and commons-io * Dependency updates * Bump org.apache.commons:commons-lang3 from 3.12.0 to 3.20.0 * Bump org.apache.maven.resolver:maven-resolver-api from 1.6.3 to 1.9.24 * Bump Maven to 3.9.11 while keep prerequisites on 3.6.3 * MRESOURCES-304: Bump org.codehaus.plexus:plexus-interpolation from 1.26 to 1.27 * Bump org.codehaus.plexus:plexus-interpolation from 1.27 to 1.29 * Bump m-invoker-p to 3.9.1 * Bump org.apache.maven.plugins:maven-plugins from 39 to 45 * Bump org.apache.maven.plugin-testing:maven-plugin-testing-harness from 3.3.0 to 3.4.0 * MRESOURCES-302: Bump commons-io:commons-io from 2.11.0 to 2.16.0 * Bump commons-io:commons-io from 2.16.0 to 2.20.0 * MRESOURCES-303: Bump org.apache.maven.shared:maven-filtering from 3.3.1 to 3.3.2 * Bump org.apache.maven.shared:maven-filtering from 3.3.2 to 3.4.0 * MRESOURCES-305: Bump org.codehaus.plexus:plexus-utils from 3.5.1 to 4.0.0 * Bump apache/maven-gh-actions-shared from 3 to 4 * MRESOURCES-171: ISO8859-1 properties files get changed into * MRESOURCES-210: copy-resources erases file permissions * MRESOURCES-236: Copying of files with permissions broken * MRESOURCES-257: property from list element in pom model * MRESOURCES-251: Upgrade plexus-interpolation 1.26 * MRESOURCES-252: Add m2e lifecycle Metadata to plugin * MRESOURCES-256: make build Reproducible * MRESOURCES-258: Only overwrite filtered resources when * MRESOURCES-249: Upgrade maven-plugins parent to version 32 * MRESOURCES-255: Upgrade plexus-utils 3.3.0 * MRESOURCES-261: Make Maven 3.1.0 the minimum version * MRESOURCES-263: Update to maven-filtering 3.2.0 Changes in objectweb-asm: * Upgrade to version 9.9.1 * bug fixes * 318036: OutOfMemoryError when reading invalid class * 318037: Version ranges too wide on Import-Package Changes in truth: * Force annotation processing, since it is needed with Java 25 Changes in xmlunit: * Upgrade to 2.11.0 * XMLUnit 2.x is a complete rewrite of XMLUnit and actually doesn't share any code with XMLUnit for Java 1.x. * Some goals for XMLUnit 2.x: * create .NET and Java versions that are compatible in design while trying to be idiomatic for each platform * remove all static configuration (the old XMLUnit class setter methods) * focus on the parts that are useful for testing * XPath * (Schema) validation * comparisons * be independent of any test framework * XMLUnit 1.x is no longer maintained * Use directly the xalan-j2 jar instead of the jaxp_transform_impl Changes in xz-java: * Upgrade to version 1.11 * Fix a data corruption bug when encoding with the rarely-used option LZMA2Options.MODE_UNCOMPRESSED. To trigger the bug, a write call must cross an offset that is a multiple of 65536 bytes. For example, one write of 70000 bytes or two write calls of 50000 bytes each would trigger the bug. The bug isn't triggered if there are ten write calls of 8192 bytes each followed by one 123-byte write. * If encoding to a .xz file, a decoder would catch the issue because the integrity check wouldn't match. * The binaries of 1.10 in the Maven Central require Java 8 and contain optimized classes for Java >= 9 as multi-release JAR. They were built with OpenJDK 21.0.9 on GNU/Linux and can be reproduced using the following command: SOURCE_DATE_EPOCH=1763575020 TZ=UTC0 ant maven ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-331=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-331=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * maven-lib-3.9.12-160000.1.1 * xmvn-4.3.0-160000.3.2 * xmvn-minimal-4.3.0-160000.3.2 * maven-3.9.12-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * maven-resources-plugin-javadoc-3.4.0-160000.1.1 * byte-buddy-javadoc-1.18.3-160000.1.1 * maven-resolver-spi-1.9.25-160000.1.1 * maven-resolver-transport-file-1.9.25-160000.1.1 * maven-resolver-connector-basic-1.9.25-160000.1.1 * xmvn-api-4.3.0-160000.3.1 * byte-buddy-maven-plugin-1.18.3-160000.1.1 * bouncycastle-tls-1.83-160000.1.1 * maven-resources-plugin-3.4.0-160000.1.1 * truth-javadoc-0.24-160000.3.1 * xmlunit-placeholders-2.11.0-160000.1.1 * maven-javadoc-3.9.12-160000.1.1 * truth-0.24-160000.3.1 * xmlunit-javadoc-2.11.0-160000.1.1 * maven-resolver-impl-1.9.25-160000.1.1 * xmvn-mojo-4.3.0-160000.3.1 * xmvn-install-4.3.0-160000.3.1 * xz-java-1.11-160000.1.1 * maven-resolver-named-locks-1.9.25-160000.1.1 * xmvn-core-4.3.0-160000.3.1 * maven-resolver-transport-classpath-1.9.25-160000.1.1 * xmvn-tools-javadoc-4.3.0-160000.3.1 * xmvn-connector-4.3.0-160000.3.1 * maven-assembly-plugin-javadoc-3.8.0-160000.1.1 * bouncycastle-util-1.83-160000.1.1 * maven-resolver-javadoc-1.9.25-160000.1.1 * xz-java-javadoc-1.11-160000.1.1 * maven-archiver-javadoc-3.6.6-160000.1.1 * maven-assembly-plugin-3.8.0-160000.1.1 * apache-parent-37-160000.1.1 * xmvn-parent-4.3.0-160000.3.1 * xmvn-resolve-4.3.0-160000.3.1 * xmvn-connector-javadoc-4.3.0-160000.3.1 * maven-resolver-test-util-1.9.25-160000.1.1 * bouncycastle-mail-1.83-160000.1.1 * maven-compiler-plugin-javadoc-3.15.0-160000.1.1 * maven-archiver-3.6.6-160000.1.1 * bouncycastle-pkix-1.83-160000.1.1 * maven-resolver-transport-wagon-1.9.25-160000.1.1 * byte-buddy-agent-1.18.3-160000.1.1 * bouncycastle-jmail-1.83-160000.1.1 * maven-resolver-transport-http-1.9.25-160000.1.1 * maven-parent-47-160000.1.1 * bouncycastle-pg-1.83-160000.1.1 * maven-resolver-1.9.25-160000.1.1 * xmvn-mojo-javadoc-4.3.0-160000.3.1 * byte-buddy-1.18.3-160000.1.1 * xmlunit-assertj-2.11.0-160000.1.1 * bouncycastle-1.83-160000.1.1 * maven-dependency-analyzer-1.17.0-160000.1.1 * xmlunit-core-2.11.0-160000.1.1 * xmlunit-matchers-2.11.0-160000.1.1 * maven-resolver-util-1.9.25-160000.1.1 * xmvn-subst-4.3.0-160000.3.1 * maven-compiler-plugin-3.15.0-160000.1.1 * xmlunit-legacy-2.11.0-160000.1.1 * xmlunit-jakarta-jaxb-impl-2.11.0-160000.1.1 * objectweb-asm-9.9.1-160000.1.1 * maven-resolver-api-1.9.25-160000.1.1 * objectweb-asm-javadoc-9.9.1-160000.1.1 * bouncycastle-javadoc-1.83-160000.1.1 * maven-dependency-analyzer-javadoc-1.17.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * maven-lib-3.9.12-160000.1.1 * xmvn-4.3.0-160000.3.2 * xmvn-minimal-4.3.0-160000.3.2 * maven-3.9.12-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * maven-resources-plugin-javadoc-3.4.0-160000.1.1 * byte-buddy-javadoc-1.18.3-160000.1.1 * maven-resolver-spi-1.9.25-160000.1.1 * maven-resolver-transport-file-1.9.25-160000.1.1 * maven-resolver-connector-basic-1.9.25-160000.1.1 * xmvn-api-4.3.0-160000.3.1 * byte-buddy-maven-plugin-1.18.3-160000.1.1 * bouncycastle-tls-1.83-160000.1.1 * maven-resources-plugin-3.4.0-160000.1.1 * truth-javadoc-0.24-160000.3.1 * xmlunit-placeholders-2.11.0-160000.1.1 * maven-javadoc-3.9.12-160000.1.1 * truth-0.24-160000.3.1 * xmlunit-javadoc-2.11.0-160000.1.1 * maven-resolver-impl-1.9.25-160000.1.1 * xmvn-mojo-4.3.0-160000.3.1 * xmvn-install-4.3.0-160000.3.1 * xz-java-1.11-160000.1.1 * maven-resolver-named-locks-1.9.25-160000.1.1 * xmvn-core-4.3.0-160000.3.1 * maven-resolver-transport-classpath-1.9.25-160000.1.1 * xmvn-tools-javadoc-4.3.0-160000.3.1 * xmvn-connector-4.3.0-160000.3.1 * maven-assembly-plugin-javadoc-3.8.0-160000.1.1 * bouncycastle-util-1.83-160000.1.1 * maven-resolver-javadoc-1.9.25-160000.1.1 * xz-java-javadoc-1.11-160000.1.1 * maven-archiver-javadoc-3.6.6-160000.1.1 * maven-assembly-plugin-3.8.0-160000.1.1 * apache-parent-37-160000.1.1 * xmvn-parent-4.3.0-160000.3.1 * xmvn-resolve-4.3.0-160000.3.1 * xmvn-connector-javadoc-4.3.0-160000.3.1 * maven-resolver-test-util-1.9.25-160000.1.1 * bouncycastle-mail-1.83-160000.1.1 * maven-compiler-plugin-javadoc-3.15.0-160000.1.1 * maven-archiver-3.6.6-160000.1.1 * bouncycastle-pkix-1.83-160000.1.1 * maven-resolver-transport-wagon-1.9.25-160000.1.1 * byte-buddy-agent-1.18.3-160000.1.1 * bouncycastle-jmail-1.83-160000.1.1 * maven-resolver-transport-http-1.9.25-160000.1.1 * maven-parent-47-160000.1.1 * bouncycastle-pg-1.83-160000.1.1 * maven-resolver-1.9.25-160000.1.1 * xmvn-mojo-javadoc-4.3.0-160000.3.1 * byte-buddy-1.18.3-160000.1.1 * xmlunit-assertj-2.11.0-160000.1.1 * bouncycastle-1.83-160000.1.1 * maven-dependency-analyzer-1.17.0-160000.1.1 * xmlunit-core-2.11.0-160000.1.1 * xmlunit-matchers-2.11.0-160000.1.1 * maven-resolver-util-1.9.25-160000.1.1 * xmvn-subst-4.3.0-160000.3.1 * maven-compiler-plugin-3.15.0-160000.1.1 * xmlunit-legacy-2.11.0-160000.1.1 * xmlunit-jakarta-jaxb-impl-2.11.0-160000.1.1 * objectweb-asm-9.9.1-160000.1.1 * maven-resolver-api-1.9.25-160000.1.1 * objectweb-asm-javadoc-9.9.1-160000.1.1 * bouncycastle-javadoc-1.83-160000.1.1 * maven-dependency-analyzer-javadoc-1.17.0-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:37:27 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:37:27 -0000 Subject: SUSE-SU-2026:20600-1: important: Security update for cpp-httplib Message-ID: <177272864703.1967.16482245779788960539@df8f6ab05d2e> # Security update for cpp-httplib Announcement ID: SUSE-SU-2026:20600-1 Release Date: 2026-03-02T10:20:20Z Rating: important References: * bsc#1246468 * bsc#1246471 Cross-References: * CVE-2025-53628 * CVE-2025-53629 CVSS scores: * CVE-2025-53628 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-53628 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L * CVE-2025-53628 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-53628 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-53629 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-53629 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-53629 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for cpp-httplib fixes the following issues: * CVE-2025-53629: header can allocate memory arbitrarily in the server, potentially leading to its exhaustion (bsc#1246471). * CVE-2025-53628: HTTP header smuggling due to insecure trailers merge (bsc#1246468). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-333=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-333=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libcpp-httplib0_22-debuginfo-0.22.0-160000.4.1 * cpp-httplib-debugsource-0.22.0-160000.4.1 * libcpp-httplib0_22-0.22.0-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libcpp-httplib0_22-debuginfo-0.22.0-160000.4.1 * cpp-httplib-debugsource-0.22.0-160000.4.1 * libcpp-httplib0_22-0.22.0-160000.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53628.html * https://www.suse.com/security/cve/CVE-2025-53629.html * https://bugzilla.suse.com/show_bug.cgi?id=1246468 * https://bugzilla.suse.com/show_bug.cgi?id=1246471 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:18 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:18 -0000 Subject: SUSE-SU-2026:20599-1: important: Security update for the Linux Kernel Message-ID: <177272899841.1967.2292880833212861206@df8f6ab05d2e> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20599-1 Release Date: 2026-02-27T13:03:55Z Rating: important References: * bsc#1205462 * bsc#1214285 * bsc#1215199 * bsc#1235905 * bsc#1242505 * bsc#1242974 * bsc#1242986 * bsc#1243452 * bsc#1243507 * bsc#1243662 * bsc#1246184 * bsc#1246282 * bsc#1247030 * bsc#1247292 * bsc#1247712 * bsc#1248166 * bsc#1248175 * bsc#1248178 * bsc#1248179 * bsc#1248185 * bsc#1248188 * bsc#1248196 * bsc#1248206 * bsc#1248208 * bsc#1248209 * bsc#1248211 * bsc#1248212 * bsc#1248213 * bsc#1248214 * bsc#1248216 * bsc#1248217 * bsc#1248222 * bsc#1248227 * bsc#1248228 * bsc#1248229 * bsc#1248232 * bsc#1248234 * bsc#1248240 * bsc#1248360 * bsc#1248366 * bsc#1248384 * bsc#1248626 * bsc#1249307 * bsc#1249609 * bsc#1249895 * bsc#1249998 * bsc#1250032 * bsc#1250082 * bsc#1250388 * bsc#1250705 * bsc#1250738 * bsc#1250748 * bsc#1252712 * bsc#1252773 * bsc#1252784 * bsc#1252891 * bsc#1252900 * bsc#1253049 * bsc#1253078 * bsc#1253079 * bsc#1253087 * bsc#1253344 * bsc#1253500 * bsc#1253739 * bsc#1254244 * bsc#1254308 * bsc#1254447 * bsc#1254839 * bsc#1254842 * bsc#1254845 * bsc#1254977 * bsc#1255102 * bsc#1255128 * bsc#1255157 * bsc#1255164 * bsc#1255172 * bsc#1255216 * bsc#1255232 * bsc#1255241 * bsc#1255245 * bsc#1255266 * bsc#1255268 * bsc#1255269 * bsc#1255319 * bsc#1255327 * bsc#1255346 * bsc#1255403 * bsc#1255417 * bsc#1255459 * bsc#1255482 * bsc#1255506 * bsc#1255526 * bsc#1255527 * bsc#1255529 * bsc#1255530 * bsc#1255536 * bsc#1255537 * bsc#1255542 * bsc#1255544 * bsc#1255547 * bsc#1255569 * bsc#1255593 * bsc#1255622 * bsc#1255694 * bsc#1255695 * bsc#1255703 * bsc#1255708 * bsc#1255811 * bsc#1255930 * bsc#1256579 * bsc#1256582 * bsc#1256584 * bsc#1256586 * bsc#1256591 * bsc#1256592 * bsc#1256593 * bsc#1256594 * bsc#1256597 * bsc#1256605 * bsc#1256607 * bsc#1256608 * bsc#1256609 * bsc#1256610 * bsc#1256611 * bsc#1256612 * bsc#1256613 * bsc#1256616 * bsc#1256617 * bsc#1256619 * bsc#1256622 * bsc#1256623 * bsc#1256625 * bsc#1256627 * bsc#1256628 * bsc#1256630 * bsc#1256632 * bsc#1256638 * bsc#1256641 * bsc#1256643 * bsc#1256645 * bsc#1256646 * bsc#1256650 * bsc#1256651 * bsc#1256653 * bsc#1256654 * bsc#1256655 * bsc#1256656 * bsc#1256659 * bsc#1256660 * bsc#1256661 * bsc#1256664 * bsc#1256665 * bsc#1256667 * bsc#1256668 * bsc#1256674 * bsc#1256677 * bsc#1256680 * bsc#1256682 * bsc#1256683 * bsc#1256688 * bsc#1256689 * bsc#1256716 * bsc#1256726 * bsc#1256728 * bsc#1256730 * bsc#1256733 * bsc#1256737 * bsc#1256741 * bsc#1256742 * bsc#1256744 * bsc#1256748 * bsc#1256749 * bsc#1256752 * bsc#1256754 * bsc#1256755 * bsc#1256756 * bsc#1256757 * bsc#1256759 * bsc#1256760 * bsc#1256761 * bsc#1256763 * bsc#1256770 * bsc#1256773 * bsc#1256774 * bsc#1256777 * bsc#1256779 * bsc#1256781 * bsc#1256785 * bsc#1256792 * bsc#1256793 * bsc#1256794 * bsc#1256864 * bsc#1256865 * bsc#1256867 * bsc#1256975 * bsc#1257015 * bsc#1257035 * bsc#1257053 * bsc#1257154 * bsc#1257155 * bsc#1257158 * bsc#1257159 * bsc#1257163 * bsc#1257164 * bsc#1257167 * bsc#1257168 * bsc#1257179 * bsc#1257180 * bsc#1257202 * bsc#1257204 * bsc#1257207 * bsc#1257208 * bsc#1257215 * bsc#1257217 * bsc#1257218 * bsc#1257220 * bsc#1257221 * bsc#1257225 * bsc#1257227 * bsc#1257232 * bsc#1257234 * bsc#1257236 * bsc#1257243 * bsc#1257245 * bsc#1257276 * bsc#1257277 * bsc#1257279 * bsc#1257282 * bsc#1257296 * bsc#1257309 * bsc#1257473 * bsc#1257504 * bsc#1257603 * jsc#PED-10906 * jsc#PED-13728 * jsc#PED-14156 Cross-References: * CVE-2024-54031 * CVE-2025-37744 * CVE-2025-37751 * CVE-2025-37841 * CVE-2025-37845 * CVE-2025-37904 * CVE-2025-37955 * CVE-2025-38243 * CVE-2025-38262 * CVE-2025-38297 * CVE-2025-38298 * CVE-2025-38379 * CVE-2025-38423 * CVE-2025-38505 * CVE-2025-38507 * CVE-2025-38510 * CVE-2025-38511 * CVE-2025-38512 * CVE-2025-38513 * CVE-2025-38515 * CVE-2025-38516 * CVE-2025-38520 * CVE-2025-38521 * CVE-2025-38529 * CVE-2025-38530 * CVE-2025-38535 * CVE-2025-38537 * CVE-2025-38538 * CVE-2025-38539 * CVE-2025-38540 * CVE-2025-38541 * CVE-2025-38543 * CVE-2025-38547 * CVE-2025-38548 * CVE-2025-38550 * CVE-2025-38551 * CVE-2025-38569 * CVE-2025-38589 * CVE-2025-38590 * CVE-2025-38645 * CVE-2025-39689 * CVE-2025-39795 * CVE-2025-39813 * CVE-2025-39814 * CVE-2025-39817 * CVE-2025-39829 * CVE-2025-39880 * CVE-2025-39913 * CVE-2025-39927 * CVE-2025-40030 * CVE-2025-40045 * CVE-2025-40097 * CVE-2025-40106 * CVE-2025-40147 * CVE-2025-40195 * CVE-2025-40257 * CVE-2025-40259 * CVE-2025-40261 * CVE-2025-40363 * CVE-2025-68174 * CVE-2025-68178 * CVE-2025-68188 * CVE-2025-68200 * CVE-2025-68211 * CVE-2025-68218 * CVE-2025-68227 * CVE-2025-68241 * CVE-2025-68245 * CVE-2025-68261 * CVE-2025-68296 * CVE-2025-68297 * CVE-2025-68320 * CVE-2025-68325 * CVE-2025-68337 * CVE-2025-68341 * CVE-2025-68348 * CVE-2025-68349 * CVE-2025-68356 * CVE-2025-68359 * CVE-2025-68360 * CVE-2025-68361 * CVE-2025-68366 * CVE-2025-68367 * CVE-2025-68368 * CVE-2025-68372 * CVE-2025-68374 * CVE-2025-68376 * CVE-2025-68379 * CVE-2025-68725 * CVE-2025-68735 * CVE-2025-68741 * CVE-2025-68743 * CVE-2025-68764 * CVE-2025-68768 * CVE-2025-68770 * CVE-2025-68771 * CVE-2025-68773 * CVE-2025-68775 * CVE-2025-68776 * CVE-2025-68777 * CVE-2025-68778 * CVE-2025-68783 * CVE-2025-68784 * CVE-2025-68788 * CVE-2025-68789 * CVE-2025-68792 * CVE-2025-68795 * CVE-2025-68797 * CVE-2025-68798 * CVE-2025-68799 * CVE-2025-68800 * CVE-2025-68801 * CVE-2025-68802 * CVE-2025-68803 * CVE-2025-68804 * CVE-2025-68808 * CVE-2025-68811 * CVE-2025-68813 * CVE-2025-68814 * CVE-2025-68815 * CVE-2025-68816 * CVE-2025-68819 * CVE-2025-68820 * CVE-2025-68821 * CVE-2025-68822 * CVE-2025-71064 * CVE-2025-71066 * CVE-2025-71073 * CVE-2025-71076 * CVE-2025-71077 * CVE-2025-71078 * CVE-2025-71079 * CVE-2025-71080 * CVE-2025-71081 * CVE-2025-71082 * CVE-2025-71083 * CVE-2025-71084 * CVE-2025-71085 * CVE-2025-71086 * CVE-2025-71087 * CVE-2025-71088 * CVE-2025-71089 * CVE-2025-71091 * CVE-2025-71093 * CVE-2025-71094 * CVE-2025-71095 * CVE-2025-71097 * CVE-2025-71098 * CVE-2025-71099 * CVE-2025-71100 * CVE-2025-71101 * CVE-2025-71108 * CVE-2025-71111 * CVE-2025-71112 * CVE-2025-71113 * CVE-2025-71114 * CVE-2025-71116 * CVE-2025-71118 * CVE-2025-71119 * CVE-2025-71120 * CVE-2025-71123 * CVE-2025-71126 * CVE-2025-71130 * CVE-2025-71131 * CVE-2025-71132 * CVE-2025-71133 * CVE-2025-71135 * CVE-2025-71136 * CVE-2025-71137 * CVE-2025-71138 * CVE-2025-71141 * CVE-2025-71142 * CVE-2025-71143 * CVE-2025-71145 * CVE-2025-71147 * CVE-2025-71148 * CVE-2025-71149 * CVE-2025-71154 * CVE-2025-71156 * CVE-2025-71157 * CVE-2025-71162 * CVE-2025-71163 * CVE-2026-22976 * CVE-2026-22977 * CVE-2026-22978 * CVE-2026-22981 * CVE-2026-22982 * CVE-2026-22984 * CVE-2026-22985 * CVE-2026-22986 * CVE-2026-22988 * CVE-2026-22989 * CVE-2026-22990 * CVE-2026-22991 * CVE-2026-22992 * CVE-2026-22993 * CVE-2026-22996 * CVE-2026-22997 * CVE-2026-22999 * CVE-2026-23000 * CVE-2026-23001 * CVE-2026-23002 * CVE-2026-23005 * CVE-2026-23006 * CVE-2026-23011 CVSS scores: * CVE-2024-54031 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54031 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37744 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37744 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37845 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37904 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37955 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38243 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38243 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38262 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38297 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38298 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38379 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38423 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38505 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38507 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38510 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38511 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-38512 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38513 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38515 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38516 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38520 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38521 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38529 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-38530 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38537 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38538 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38539 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38540 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38541 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38543 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38547 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-38547 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-38547 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38550 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38551 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39689 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39795 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39813 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39814 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39829 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39880 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39913 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39927 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39927 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39927 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40045 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40045 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40195 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40363 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40363 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68188 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68188 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68211 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68348 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68366 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68379 ( SUSE ): 5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68725 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68735 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68735 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68741 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68741 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68743 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68743 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68764 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-68764 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-68768 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68768 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68770 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68770 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68775 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68776 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68777 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68777 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68778 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68778 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68783 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-68788 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-68789 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68792 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68792 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68795 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68795 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68798 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68798 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68799 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68799 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2025-68800 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68801 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68802 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68802 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68803 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-68803 ( SUSE ): 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N * CVE-2025-68804 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68804 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68813 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68820 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71066 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71073 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71080 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-71080 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-71081 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71084 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71084 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71085 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71086 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71086 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71087 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71087 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71088 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71088 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71089 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71089 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71091 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71091 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71093 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-71093 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71094 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71094 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71097 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71099 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71099 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71100 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71100 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71101 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71101 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2025-71108 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71112 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71112 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71113 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71114 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71114 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-71116 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-71118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71119 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71119 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-71120 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71123 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71123 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-71126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71145 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71147 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71147 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71148 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71148 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-71149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-71149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-71149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71157 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71157 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71162 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22976 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22977 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22978 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-22981 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22984 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-22985 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22985 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22985 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22986 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22986 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22988 ( SUSE ): 6.0 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-22988 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2026-22988 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22990 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22990 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22992 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22999 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-22999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-22999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23000 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23001 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23001 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23002 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23005 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-23005 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2026-23006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 205 vulnerabilities, contains three features and has 28 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344). * CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842). * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845). * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839). * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102). * CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327). * CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266). * CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269). * CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241). * CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319). * CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245). * CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216). * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157). * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268). * CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164). * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128). * CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403). * CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172). * CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417). * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482). * CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506). * CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694). * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544). * CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593). * CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542). * CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536). * CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526). * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622). * CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547). * CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527). * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537). * CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530). * CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529). * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure (bsc#1255695). * CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811). * CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703). * CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708). * CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930). * CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579). * CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584). * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582). * CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665). * CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659). * CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793). * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638). * CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656). * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688). * CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689). * CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643). * CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646). * CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653). * CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770). * CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677). * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641). * CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651). * CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680). * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674). * CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754). * CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667). * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654). * CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645). * CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613). * CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608). * CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622). * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623). * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628). * CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630). * CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612). * CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773). * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777). * CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597). * CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605). * CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607). * CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591). * CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726). * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744). * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779). * CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757). * CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755). * CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737). * CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733). * CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761). * CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760). * CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159). * CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164). * CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167). * CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168). * CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035). * CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053). * CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225). * CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179). * CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217). * CVE-2026-22986: gpiolib: fix race condition for gdev->srcu (bsc#1257276). * CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221). * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220). * CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218). * CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180). * CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv. * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236). * CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234). * CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232). * CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245). * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207). The following non security issues were fixed: * ALSA: usb-audio: Update for native DSD support quirks (stable-fixes). * Add bugnumber to an existing hv_netvsc change (bsc#1257473). * Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977). * Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792) * arm64: Update config files. Disable DEVPORT (bsc#1256792) * bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603). * bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569). * btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes). * btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes). * bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes). * drm/imagination: Wait for FW trace update command completion (git-fixes). * drm/msm/a6xx: fix bogus hwcg register updates (git-fixes). * ice: use netif_get_num_default_rss_queues() (bsc#1247712). * libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309). * mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087). * net: mana: Fix incorrect speed reported by debugfs (bsc#1255232). * net: mana: Support HW link state events (bsc#1253049). * nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015). * nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes). * powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199). * sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459). * scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864). * scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864). * scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156). * scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296). * selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346). * slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes). * smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154). * smb: client: update cfid->last_access_time in open_cached_dir_by_dentry() (git-fixes). * smb: improve directory cache reuse for readdir operations (bsc#1252712). * tsm-mr: Add TVM Measurement Register support (bsc#1257504). * tsm-mr: Add tsm-mr sample code (bsc#1257504). * virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504). * virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504). * virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504). * wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes). * x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504). * x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-325=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-325=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * kernel-devel-6.12.0-160000.26.1 * kernel-source-6.12.0-160000.26.1 * kernel-source-vanilla-6.12.0-160000.26.1 * kernel-macros-6.12.0-160000.26.1 * kernel-docs-html-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-devel-6.12.0-160000.26.1 * kernel-kvmsmall-debugsource-6.12.0-160000.26.1 * kernel-default-base-6.12.0-160000.26.1.160000.2.7 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64) * kernel-64kb-debuginfo-6.12.0-160000.26.1 * kernel-64kb-extra-debuginfo-6.12.0-160000.26.1 * kernel-64kb-extra-6.12.0-160000.26.1 * kernel-64kb-devel-6.12.0-160000.26.1 * kernel-64kb-debugsource-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc x86_64) * kernel-azure-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * kernel-azure-extra-debuginfo-6.12.0-160000.26.1 * kernel-azure-devel-6.12.0-160000.26.1 * kernel-azure-extra-6.12.0-160000.26.1 * kernel-azure-debugsource-6.12.0-160000.26.1 * kernel-azure-debuginfo-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * kernel-default-extra-debuginfo-6.12.0-160000.26.1 * kernel-default-debuginfo-6.12.0-160000.26.1 * kernel-default-extra-6.12.0-160000.26.1 * kernel-syms-6.12.0-160000.26.1 * kernel-obs-qa-6.12.0-160000.26.1 * kernel-default-devel-6.12.0-160000.26.1 * kernel-default-debugsource-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * kernel-azure-vdso-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.26.1 * kernel-azure-devel-debuginfo-6.12.0-160000.26.1 * kernel-azure-vdso-6.12.0-160000.26.1 * kernel-default-vdso-6.12.0-160000.26.1 * kernel-default-devel-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-vdso-6.12.0-160000.26.1 * kernel-default-vdso-debuginfo-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (nosrc s390x) * kernel-zfcpdump-6.12.0-160000.26.1 * SUSE Linux Enterprise Server 16.0 (s390x) * kernel-zfcpdump-debugsource-6.12.0-160000.26.1 * kernel-zfcpdump-debuginfo-6.12.0-160000.26.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * kernel-devel-6.12.0-160000.26.1 * kernel-source-6.12.0-160000.26.1 * kernel-source-vanilla-6.12.0-160000.26.1 * kernel-macros-6.12.0-160000.26.1 * kernel-docs-html-6.12.0-160000.26.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * kernel-kvmsmall-devel-6.12.0-160000.26.1 * kernel-default-extra-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-debugsource-6.12.0-160000.26.1 * gfs2-kmp-default-6.12.0-160000.26.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.26.1 * dlm-kmp-default-6.12.0-160000.26.1 * kernel-default-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.26.1 * kernel-default-extra-6.12.0-160000.26.1 * kernel-syms-6.12.0-160000.26.1 * kernel-default-livepatch-6.12.0-160000.26.1 * kernel-default-base-6.12.0-160000.26.1.160000.2.7 * cluster-md-kmp-default-6.12.0-160000.26.1 * kernel-obs-qa-6.12.0-160000.26.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.26.1 * dlm-kmp-default-debuginfo-6.12.0-160000.26.1 * kernel-default-devel-6.12.0-160000.26.1 * kernel-default-debugsource-6.12.0-160000.26.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc x86_64) * kernel-azure-6.12.0-160000.26.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * kernel-azure-vdso-debuginfo-6.12.0-160000.26.1 * kernel-azure-extra-debuginfo-6.12.0-160000.26.1 * kernel-azure-devel-6.12.0-160000.26.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.26.1 * kernel-azure-devel-debuginfo-6.12.0-160000.26.1 * kernel-azure-extra-6.12.0-160000.26.1 * kernel-azure-debugsource-6.12.0-160000.26.1 * kernel-azure-vdso-6.12.0-160000.26.1 * kernel-azure-debuginfo-6.12.0-160000.26.1 * kernel-default-vdso-6.12.0-160000.26.1 * kernel-default-devel-debuginfo-6.12.0-160000.26.1 * kernel-kvmsmall-vdso-6.12.0-160000.26.1 * kernel-default-vdso-debuginfo-6.12.0-160000.26.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc ppc64le x86_64) * kernel-default-6.12.0-160000.26.1 * kernel-kvmsmall-6.12.0-160000.26.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.26.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54031.html * https://www.suse.com/security/cve/CVE-2025-37744.html * https://www.suse.com/security/cve/CVE-2025-37751.html * https://www.suse.com/security/cve/CVE-2025-37841.html * https://www.suse.com/security/cve/CVE-2025-37845.html * https://www.suse.com/security/cve/CVE-2025-37904.html * https://www.suse.com/security/cve/CVE-2025-37955.html * https://www.suse.com/security/cve/CVE-2025-38243.html * https://www.suse.com/security/cve/CVE-2025-38262.html * https://www.suse.com/security/cve/CVE-2025-38297.html * https://www.suse.com/security/cve/CVE-2025-38298.html * https://www.suse.com/security/cve/CVE-2025-38379.html * https://www.suse.com/security/cve/CVE-2025-38423.html * https://www.suse.com/security/cve/CVE-2025-38505.html * https://www.suse.com/security/cve/CVE-2025-38507.html * https://www.suse.com/security/cve/CVE-2025-38510.html * https://www.suse.com/security/cve/CVE-2025-38511.html * https://www.suse.com/security/cve/CVE-2025-38512.html * https://www.suse.com/security/cve/CVE-2025-38513.html * https://www.suse.com/security/cve/CVE-2025-38515.html * https://www.suse.com/security/cve/CVE-2025-38516.html * https://www.suse.com/security/cve/CVE-2025-38520.html * https://www.suse.com/security/cve/CVE-2025-38521.html * https://www.suse.com/security/cve/CVE-2025-38529.html * https://www.suse.com/security/cve/CVE-2025-38530.html * https://www.suse.com/security/cve/CVE-2025-38535.html * https://www.suse.com/security/cve/CVE-2025-38537.html * https://www.suse.com/security/cve/CVE-2025-38538.html * https://www.suse.com/security/cve/CVE-2025-38539.html * https://www.suse.com/security/cve/CVE-2025-38540.html * https://www.suse.com/security/cve/CVE-2025-38541.html * https://www.suse.com/security/cve/CVE-2025-38543.html * https://www.suse.com/security/cve/CVE-2025-38547.html * https://www.suse.com/security/cve/CVE-2025-38548.html * https://www.suse.com/security/cve/CVE-2025-38550.html * https://www.suse.com/security/cve/CVE-2025-38551.html * https://www.suse.com/security/cve/CVE-2025-38569.html * https://www.suse.com/security/cve/CVE-2025-38589.html * https://www.suse.com/security/cve/CVE-2025-38590.html * https://www.suse.com/security/cve/CVE-2025-38645.html * https://www.suse.com/security/cve/CVE-2025-39689.html * https://www.suse.com/security/cve/CVE-2025-39795.html * https://www.suse.com/security/cve/CVE-2025-39813.html * https://www.suse.com/security/cve/CVE-2025-39814.html * https://www.suse.com/security/cve/CVE-2025-39817.html * https://www.suse.com/security/cve/CVE-2025-39829.html * https://www.suse.com/security/cve/CVE-2025-39880.html * https://www.suse.com/security/cve/CVE-2025-39913.html * https://www.suse.com/security/cve/CVE-2025-39927.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40045.html * https://www.suse.com/security/cve/CVE-2025-40097.html * https://www.suse.com/security/cve/CVE-2025-40106.html * https://www.suse.com/security/cve/CVE-2025-40147.html * https://www.suse.com/security/cve/CVE-2025-40195.html * https://www.suse.com/security/cve/CVE-2025-40257.html * https://www.suse.com/security/cve/CVE-2025-40259.html * https://www.suse.com/security/cve/CVE-2025-40261.html * https://www.suse.com/security/cve/CVE-2025-40363.html * https://www.suse.com/security/cve/CVE-2025-68174.html * https://www.suse.com/security/cve/CVE-2025-68178.html * https://www.suse.com/security/cve/CVE-2025-68188.html * https://www.suse.com/security/cve/CVE-2025-68200.html * https://www.suse.com/security/cve/CVE-2025-68211.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68227.html * https://www.suse.com/security/cve/CVE-2025-68241.html * https://www.suse.com/security/cve/CVE-2025-68245.html * https://www.suse.com/security/cve/CVE-2025-68261.html * https://www.suse.com/security/cve/CVE-2025-68296.html * https://www.suse.com/security/cve/CVE-2025-68297.html * https://www.suse.com/security/cve/CVE-2025-68320.html * https://www.suse.com/security/cve/CVE-2025-68325.html * https://www.suse.com/security/cve/CVE-2025-68337.html * https://www.suse.com/security/cve/CVE-2025-68341.html * https://www.suse.com/security/cve/CVE-2025-68348.html * https://www.suse.com/security/cve/CVE-2025-68349.html * https://www.suse.com/security/cve/CVE-2025-68356.html * https://www.suse.com/security/cve/CVE-2025-68359.html * https://www.suse.com/security/cve/CVE-2025-68360.html * https://www.suse.com/security/cve/CVE-2025-68361.html * https://www.suse.com/security/cve/CVE-2025-68366.html * https://www.suse.com/security/cve/CVE-2025-68367.html * https://www.suse.com/security/cve/CVE-2025-68368.html * https://www.suse.com/security/cve/CVE-2025-68372.html * https://www.suse.com/security/cve/CVE-2025-68374.html * https://www.suse.com/security/cve/CVE-2025-68376.html * https://www.suse.com/security/cve/CVE-2025-68379.html * https://www.suse.com/security/cve/CVE-2025-68725.html * https://www.suse.com/security/cve/CVE-2025-68735.html * https://www.suse.com/security/cve/CVE-2025-68741.html * https://www.suse.com/security/cve/CVE-2025-68743.html * https://www.suse.com/security/cve/CVE-2025-68764.html * https://www.suse.com/security/cve/CVE-2025-68768.html * https://www.suse.com/security/cve/CVE-2025-68770.html * https://www.suse.com/security/cve/CVE-2025-68771.html * https://www.suse.com/security/cve/CVE-2025-68773.html * https://www.suse.com/security/cve/CVE-2025-68775.html * https://www.suse.com/security/cve/CVE-2025-68776.html * https://www.suse.com/security/cve/CVE-2025-68777.html * https://www.suse.com/security/cve/CVE-2025-68778.html * https://www.suse.com/security/cve/CVE-2025-68783.html * https://www.suse.com/security/cve/CVE-2025-68784.html * https://www.suse.com/security/cve/CVE-2025-68788.html * https://www.suse.com/security/cve/CVE-2025-68789.html * https://www.suse.com/security/cve/CVE-2025-68792.html * https://www.suse.com/security/cve/CVE-2025-68795.html * https://www.suse.com/security/cve/CVE-2025-68797.html * https://www.suse.com/security/cve/CVE-2025-68798.html * https://www.suse.com/security/cve/CVE-2025-68799.html * https://www.suse.com/security/cve/CVE-2025-68800.html * https://www.suse.com/security/cve/CVE-2025-68801.html * https://www.suse.com/security/cve/CVE-2025-68802.html * https://www.suse.com/security/cve/CVE-2025-68803.html * https://www.suse.com/security/cve/CVE-2025-68804.html * https://www.suse.com/security/cve/CVE-2025-68808.html * https://www.suse.com/security/cve/CVE-2025-68811.html * https://www.suse.com/security/cve/CVE-2025-68813.html * https://www.suse.com/security/cve/CVE-2025-68814.html * https://www.suse.com/security/cve/CVE-2025-68815.html * https://www.suse.com/security/cve/CVE-2025-68816.html * https://www.suse.com/security/cve/CVE-2025-68819.html * https://www.suse.com/security/cve/CVE-2025-68820.html * https://www.suse.com/security/cve/CVE-2025-68821.html * https://www.suse.com/security/cve/CVE-2025-68822.html * https://www.suse.com/security/cve/CVE-2025-71064.html * https://www.suse.com/security/cve/CVE-2025-71066.html * https://www.suse.com/security/cve/CVE-2025-71073.html * https://www.suse.com/security/cve/CVE-2025-71076.html * https://www.suse.com/security/cve/CVE-2025-71077.html * https://www.suse.com/security/cve/CVE-2025-71078.html * https://www.suse.com/security/cve/CVE-2025-71079.html * https://www.suse.com/security/cve/CVE-2025-71080.html * https://www.suse.com/security/cve/CVE-2025-71081.html * https://www.suse.com/security/cve/CVE-2025-71082.html * https://www.suse.com/security/cve/CVE-2025-71083.html * https://www.suse.com/security/cve/CVE-2025-71084.html * https://www.suse.com/security/cve/CVE-2025-71085.html * https://www.suse.com/security/cve/CVE-2025-71086.html * https://www.suse.com/security/cve/CVE-2025-71087.html * https://www.suse.com/security/cve/CVE-2025-71088.html * https://www.suse.com/security/cve/CVE-2025-71089.html * https://www.suse.com/security/cve/CVE-2025-71091.html * https://www.suse.com/security/cve/CVE-2025-71093.html * https://www.suse.com/security/cve/CVE-2025-71094.html * https://www.suse.com/security/cve/CVE-2025-71095.html * https://www.suse.com/security/cve/CVE-2025-71097.html * https://www.suse.com/security/cve/CVE-2025-71098.html * https://www.suse.com/security/cve/CVE-2025-71099.html * https://www.suse.com/security/cve/CVE-2025-71100.html * https://www.suse.com/security/cve/CVE-2025-71101.html * https://www.suse.com/security/cve/CVE-2025-71108.html * https://www.suse.com/security/cve/CVE-2025-71111.html * https://www.suse.com/security/cve/CVE-2025-71112.html * https://www.suse.com/security/cve/CVE-2025-71113.html * https://www.suse.com/security/cve/CVE-2025-71114.html * https://www.suse.com/security/cve/CVE-2025-71116.html * https://www.suse.com/security/cve/CVE-2025-71118.html * https://www.suse.com/security/cve/CVE-2025-71119.html * https://www.suse.com/security/cve/CVE-2025-71120.html * https://www.suse.com/security/cve/CVE-2025-71123.html * https://www.suse.com/security/cve/CVE-2025-71126.html * https://www.suse.com/security/cve/CVE-2025-71130.html * https://www.suse.com/security/cve/CVE-2025-71131.html * https://www.suse.com/security/cve/CVE-2025-71132.html * https://www.suse.com/security/cve/CVE-2025-71133.html * https://www.suse.com/security/cve/CVE-2025-71135.html * https://www.suse.com/security/cve/CVE-2025-71136.html * https://www.suse.com/security/cve/CVE-2025-71137.html * https://www.suse.com/security/cve/CVE-2025-71138.html * https://www.suse.com/security/cve/CVE-2025-71141.html * https://www.suse.com/security/cve/CVE-2025-71142.html * https://www.suse.com/security/cve/CVE-2025-71143.html * https://www.suse.com/security/cve/CVE-2025-71145.html * https://www.suse.com/security/cve/CVE-2025-71147.html * https://www.suse.com/security/cve/CVE-2025-71148.html * https://www.suse.com/security/cve/CVE-2025-71149.html * https://www.suse.com/security/cve/CVE-2025-71154.html * https://www.suse.com/security/cve/CVE-2025-71156.html * https://www.suse.com/security/cve/CVE-2025-71157.html * https://www.suse.com/security/cve/CVE-2025-71162.html * https://www.suse.com/security/cve/CVE-2025-71163.html * https://www.suse.com/security/cve/CVE-2026-22976.html * https://www.suse.com/security/cve/CVE-2026-22977.html * https://www.suse.com/security/cve/CVE-2026-22978.html * https://www.suse.com/security/cve/CVE-2026-22981.html * https://www.suse.com/security/cve/CVE-2026-22982.html * https://www.suse.com/security/cve/CVE-2026-22984.html * https://www.suse.com/security/cve/CVE-2026-22985.html * https://www.suse.com/security/cve/CVE-2026-22986.html * https://www.suse.com/security/cve/CVE-2026-22988.html * https://www.suse.com/security/cve/CVE-2026-22989.html * https://www.suse.com/security/cve/CVE-2026-22990.html * https://www.suse.com/security/cve/CVE-2026-22991.html * https://www.suse.com/security/cve/CVE-2026-22992.html * https://www.suse.com/security/cve/CVE-2026-22993.html * https://www.suse.com/security/cve/CVE-2026-22996.html * https://www.suse.com/security/cve/CVE-2026-22997.html * https://www.suse.com/security/cve/CVE-2026-22999.html * https://www.suse.com/security/cve/CVE-2026-23000.html * https://www.suse.com/security/cve/CVE-2026-23001.html * https://www.suse.com/security/cve/CVE-2026-23002.html * https://www.suse.com/security/cve/CVE-2026-23005.html * https://www.suse.com/security/cve/CVE-2026-23006.html * https://www.suse.com/security/cve/CVE-2026-23011.html * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1235905 * https://bugzilla.suse.com/show_bug.cgi?id=1242505 * https://bugzilla.suse.com/show_bug.cgi?id=1242974 * https://bugzilla.suse.com/show_bug.cgi?id=1242986 * https://bugzilla.suse.com/show_bug.cgi?id=1243452 * https://bugzilla.suse.com/show_bug.cgi?id=1243507 * https://bugzilla.suse.com/show_bug.cgi?id=1243662 * https://bugzilla.suse.com/show_bug.cgi?id=1246184 * https://bugzilla.suse.com/show_bug.cgi?id=1246282 * https://bugzilla.suse.com/show_bug.cgi?id=1247030 * https://bugzilla.suse.com/show_bug.cgi?id=1247292 * https://bugzilla.suse.com/show_bug.cgi?id=1247712 * https://bugzilla.suse.com/show_bug.cgi?id=1248166 * https://bugzilla.suse.com/show_bug.cgi?id=1248175 * https://bugzilla.suse.com/show_bug.cgi?id=1248178 * https://bugzilla.suse.com/show_bug.cgi?id=1248179 * https://bugzilla.suse.com/show_bug.cgi?id=1248185 * https://bugzilla.suse.com/show_bug.cgi?id=1248188 * https://bugzilla.suse.com/show_bug.cgi?id=1248196 * https://bugzilla.suse.com/show_bug.cgi?id=1248206 * https://bugzilla.suse.com/show_bug.cgi?id=1248208 * https://bugzilla.suse.com/show_bug.cgi?id=1248209 * https://bugzilla.suse.com/show_bug.cgi?id=1248211 * https://bugzilla.suse.com/show_bug.cgi?id=1248212 * https://bugzilla.suse.com/show_bug.cgi?id=1248213 * https://bugzilla.suse.com/show_bug.cgi?id=1248214 * https://bugzilla.suse.com/show_bug.cgi?id=1248216 * https://bugzilla.suse.com/show_bug.cgi?id=1248217 * https://bugzilla.suse.com/show_bug.cgi?id=1248222 * https://bugzilla.suse.com/show_bug.cgi?id=1248227 * https://bugzilla.suse.com/show_bug.cgi?id=1248228 * https://bugzilla.suse.com/show_bug.cgi?id=1248229 * https://bugzilla.suse.com/show_bug.cgi?id=1248232 * https://bugzilla.suse.com/show_bug.cgi?id=1248234 * https://bugzilla.suse.com/show_bug.cgi?id=1248240 * https://bugzilla.suse.com/show_bug.cgi?id=1248360 * https://bugzilla.suse.com/show_bug.cgi?id=1248366 * https://bugzilla.suse.com/show_bug.cgi?id=1248384 * https://bugzilla.suse.com/show_bug.cgi?id=1248626 * https://bugzilla.suse.com/show_bug.cgi?id=1249307 * https://bugzilla.suse.com/show_bug.cgi?id=1249609 * https://bugzilla.suse.com/show_bug.cgi?id=1249895 * https://bugzilla.suse.com/show_bug.cgi?id=1249998 * https://bugzilla.suse.com/show_bug.cgi?id=1250032 * https://bugzilla.suse.com/show_bug.cgi?id=1250082 * https://bugzilla.suse.com/show_bug.cgi?id=1250388 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250738 * https://bugzilla.suse.com/show_bug.cgi?id=1250748 * https://bugzilla.suse.com/show_bug.cgi?id=1252712 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252784 * https://bugzilla.suse.com/show_bug.cgi?id=1252891 * https://bugzilla.suse.com/show_bug.cgi?id=1252900 * https://bugzilla.suse.com/show_bug.cgi?id=1253049 * https://bugzilla.suse.com/show_bug.cgi?id=1253078 * https://bugzilla.suse.com/show_bug.cgi?id=1253079 * https://bugzilla.suse.com/show_bug.cgi?id=1253087 * https://bugzilla.suse.com/show_bug.cgi?id=1253344 * https://bugzilla.suse.com/show_bug.cgi?id=1253500 * https://bugzilla.suse.com/show_bug.cgi?id=1253739 * https://bugzilla.suse.com/show_bug.cgi?id=1254244 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254447 * https://bugzilla.suse.com/show_bug.cgi?id=1254839 * https://bugzilla.suse.com/show_bug.cgi?id=1254842 * https://bugzilla.suse.com/show_bug.cgi?id=1254845 * https://bugzilla.suse.com/show_bug.cgi?id=1254977 * https://bugzilla.suse.com/show_bug.cgi?id=1255102 * https://bugzilla.suse.com/show_bug.cgi?id=1255128 * https://bugzilla.suse.com/show_bug.cgi?id=1255157 * https://bugzilla.suse.com/show_bug.cgi?id=1255164 * https://bugzilla.suse.com/show_bug.cgi?id=1255172 * https://bugzilla.suse.com/show_bug.cgi?id=1255216 * https://bugzilla.suse.com/show_bug.cgi?id=1255232 * https://bugzilla.suse.com/show_bug.cgi?id=1255241 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255266 * https://bugzilla.suse.com/show_bug.cgi?id=1255268 * https://bugzilla.suse.com/show_bug.cgi?id=1255269 * https://bugzilla.suse.com/show_bug.cgi?id=1255319 * https://bugzilla.suse.com/show_bug.cgi?id=1255327 * https://bugzilla.suse.com/show_bug.cgi?id=1255346 * https://bugzilla.suse.com/show_bug.cgi?id=1255403 * https://bugzilla.suse.com/show_bug.cgi?id=1255417 * https://bugzilla.suse.com/show_bug.cgi?id=1255459 * https://bugzilla.suse.com/show_bug.cgi?id=1255482 * https://bugzilla.suse.com/show_bug.cgi?id=1255506 * https://bugzilla.suse.com/show_bug.cgi?id=1255526 * https://bugzilla.suse.com/show_bug.cgi?id=1255527 * https://bugzilla.suse.com/show_bug.cgi?id=1255529 * https://bugzilla.suse.com/show_bug.cgi?id=1255530 * https://bugzilla.suse.com/show_bug.cgi?id=1255536 * https://bugzilla.suse.com/show_bug.cgi?id=1255537 * https://bugzilla.suse.com/show_bug.cgi?id=1255542 * https://bugzilla.suse.com/show_bug.cgi?id=1255544 * https://bugzilla.suse.com/show_bug.cgi?id=1255547 * https://bugzilla.suse.com/show_bug.cgi?id=1255569 * https://bugzilla.suse.com/show_bug.cgi?id=1255593 * https://bugzilla.suse.com/show_bug.cgi?id=1255622 * https://bugzilla.suse.com/show_bug.cgi?id=1255694 * https://bugzilla.suse.com/show_bug.cgi?id=1255695 * https://bugzilla.suse.com/show_bug.cgi?id=1255703 * https://bugzilla.suse.com/show_bug.cgi?id=1255708 * https://bugzilla.suse.com/show_bug.cgi?id=1255811 * https://bugzilla.suse.com/show_bug.cgi?id=1255930 * https://bugzilla.suse.com/show_bug.cgi?id=1256579 * https://bugzilla.suse.com/show_bug.cgi?id=1256582 * https://bugzilla.suse.com/show_bug.cgi?id=1256584 * https://bugzilla.suse.com/show_bug.cgi?id=1256586 * https://bugzilla.suse.com/show_bug.cgi?id=1256591 * https://bugzilla.suse.com/show_bug.cgi?id=1256592 * https://bugzilla.suse.com/show_bug.cgi?id=1256593 * https://bugzilla.suse.com/show_bug.cgi?id=1256594 * https://bugzilla.suse.com/show_bug.cgi?id=1256597 * https://bugzilla.suse.com/show_bug.cgi?id=1256605 * https://bugzilla.suse.com/show_bug.cgi?id=1256607 * https://bugzilla.suse.com/show_bug.cgi?id=1256608 * https://bugzilla.suse.com/show_bug.cgi?id=1256609 * https://bugzilla.suse.com/show_bug.cgi?id=1256610 * https://bugzilla.suse.com/show_bug.cgi?id=1256611 * https://bugzilla.suse.com/show_bug.cgi?id=1256612 * https://bugzilla.suse.com/show_bug.cgi?id=1256613 * https://bugzilla.suse.com/show_bug.cgi?id=1256616 * https://bugzilla.suse.com/show_bug.cgi?id=1256617 * https://bugzilla.suse.com/show_bug.cgi?id=1256619 * https://bugzilla.suse.com/show_bug.cgi?id=1256622 * https://bugzilla.suse.com/show_bug.cgi?id=1256623 * https://bugzilla.suse.com/show_bug.cgi?id=1256625 * https://bugzilla.suse.com/show_bug.cgi?id=1256627 * https://bugzilla.suse.com/show_bug.cgi?id=1256628 * https://bugzilla.suse.com/show_bug.cgi?id=1256630 * https://bugzilla.suse.com/show_bug.cgi?id=1256632 * https://bugzilla.suse.com/show_bug.cgi?id=1256638 * https://bugzilla.suse.com/show_bug.cgi?id=1256641 * https://bugzilla.suse.com/show_bug.cgi?id=1256643 * https://bugzilla.suse.com/show_bug.cgi?id=1256645 * https://bugzilla.suse.com/show_bug.cgi?id=1256646 * https://bugzilla.suse.com/show_bug.cgi?id=1256650 * https://bugzilla.suse.com/show_bug.cgi?id=1256651 * https://bugzilla.suse.com/show_bug.cgi?id=1256653 * https://bugzilla.suse.com/show_bug.cgi?id=1256654 * https://bugzilla.suse.com/show_bug.cgi?id=1256655 * https://bugzilla.suse.com/show_bug.cgi?id=1256656 * https://bugzilla.suse.com/show_bug.cgi?id=1256659 * https://bugzilla.suse.com/show_bug.cgi?id=1256660 * https://bugzilla.suse.com/show_bug.cgi?id=1256661 * https://bugzilla.suse.com/show_bug.cgi?id=1256664 * https://bugzilla.suse.com/show_bug.cgi?id=1256665 * https://bugzilla.suse.com/show_bug.cgi?id=1256667 * https://bugzilla.suse.com/show_bug.cgi?id=1256668 * https://bugzilla.suse.com/show_bug.cgi?id=1256674 * https://bugzilla.suse.com/show_bug.cgi?id=1256677 * https://bugzilla.suse.com/show_bug.cgi?id=1256680 * https://bugzilla.suse.com/show_bug.cgi?id=1256682 * https://bugzilla.suse.com/show_bug.cgi?id=1256683 * https://bugzilla.suse.com/show_bug.cgi?id=1256688 * https://bugzilla.suse.com/show_bug.cgi?id=1256689 * https://bugzilla.suse.com/show_bug.cgi?id=1256716 * https://bugzilla.suse.com/show_bug.cgi?id=1256726 * https://bugzilla.suse.com/show_bug.cgi?id=1256728 * https://bugzilla.suse.com/show_bug.cgi?id=1256730 * https://bugzilla.suse.com/show_bug.cgi?id=1256733 * https://bugzilla.suse.com/show_bug.cgi?id=1256737 * https://bugzilla.suse.com/show_bug.cgi?id=1256741 * https://bugzilla.suse.com/show_bug.cgi?id=1256742 * https://bugzilla.suse.com/show_bug.cgi?id=1256744 * https://bugzilla.suse.com/show_bug.cgi?id=1256748 * https://bugzilla.suse.com/show_bug.cgi?id=1256749 * https://bugzilla.suse.com/show_bug.cgi?id=1256752 * https://bugzilla.suse.com/show_bug.cgi?id=1256754 * https://bugzilla.suse.com/show_bug.cgi?id=1256755 * https://bugzilla.suse.com/show_bug.cgi?id=1256756 * https://bugzilla.suse.com/show_bug.cgi?id=1256757 * https://bugzilla.suse.com/show_bug.cgi?id=1256759 * https://bugzilla.suse.com/show_bug.cgi?id=1256760 * https://bugzilla.suse.com/show_bug.cgi?id=1256761 * https://bugzilla.suse.com/show_bug.cgi?id=1256763 * https://bugzilla.suse.com/show_bug.cgi?id=1256770 * https://bugzilla.suse.com/show_bug.cgi?id=1256773 * https://bugzilla.suse.com/show_bug.cgi?id=1256774 * https://bugzilla.suse.com/show_bug.cgi?id=1256777 * https://bugzilla.suse.com/show_bug.cgi?id=1256779 * https://bugzilla.suse.com/show_bug.cgi?id=1256781 * https://bugzilla.suse.com/show_bug.cgi?id=1256785 * https://bugzilla.suse.com/show_bug.cgi?id=1256792 * https://bugzilla.suse.com/show_bug.cgi?id=1256793 * https://bugzilla.suse.com/show_bug.cgi?id=1256794 * https://bugzilla.suse.com/show_bug.cgi?id=1256864 * https://bugzilla.suse.com/show_bug.cgi?id=1256865 * https://bugzilla.suse.com/show_bug.cgi?id=1256867 * https://bugzilla.suse.com/show_bug.cgi?id=1256975 * https://bugzilla.suse.com/show_bug.cgi?id=1257015 * https://bugzilla.suse.com/show_bug.cgi?id=1257035 * https://bugzilla.suse.com/show_bug.cgi?id=1257053 * https://bugzilla.suse.com/show_bug.cgi?id=1257154 * https://bugzilla.suse.com/show_bug.cgi?id=1257155 * https://bugzilla.suse.com/show_bug.cgi?id=1257158 * https://bugzilla.suse.com/show_bug.cgi?id=1257159 * https://bugzilla.suse.com/show_bug.cgi?id=1257163 * https://bugzilla.suse.com/show_bug.cgi?id=1257164 * https://bugzilla.suse.com/show_bug.cgi?id=1257167 * https://bugzilla.suse.com/show_bug.cgi?id=1257168 * https://bugzilla.suse.com/show_bug.cgi?id=1257179 * https://bugzilla.suse.com/show_bug.cgi?id=1257180 * https://bugzilla.suse.com/show_bug.cgi?id=1257202 * https://bugzilla.suse.com/show_bug.cgi?id=1257204 * https://bugzilla.suse.com/show_bug.cgi?id=1257207 * https://bugzilla.suse.com/show_bug.cgi?id=1257208 * https://bugzilla.suse.com/show_bug.cgi?id=1257215 * https://bugzilla.suse.com/show_bug.cgi?id=1257217 * https://bugzilla.suse.com/show_bug.cgi?id=1257218 * https://bugzilla.suse.com/show_bug.cgi?id=1257220 * https://bugzilla.suse.com/show_bug.cgi?id=1257221 * https://bugzilla.suse.com/show_bug.cgi?id=1257225 * https://bugzilla.suse.com/show_bug.cgi?id=1257227 * https://bugzilla.suse.com/show_bug.cgi?id=1257232 * https://bugzilla.suse.com/show_bug.cgi?id=1257234 * https://bugzilla.suse.com/show_bug.cgi?id=1257236 * https://bugzilla.suse.com/show_bug.cgi?id=1257243 * https://bugzilla.suse.com/show_bug.cgi?id=1257245 * https://bugzilla.suse.com/show_bug.cgi?id=1257276 * https://bugzilla.suse.com/show_bug.cgi?id=1257277 * https://bugzilla.suse.com/show_bug.cgi?id=1257279 * https://bugzilla.suse.com/show_bug.cgi?id=1257282 * https://bugzilla.suse.com/show_bug.cgi?id=1257296 * https://bugzilla.suse.com/show_bug.cgi?id=1257309 * https://bugzilla.suse.com/show_bug.cgi?id=1257473 * https://bugzilla.suse.com/show_bug.cgi?id=1257504 * https://bugzilla.suse.com/show_bug.cgi?id=1257603 * https://jira.suse.com/browse/PED-10906 * https://jira.suse.com/browse/PED-13728 * https://jira.suse.com/browse/PED-14156 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:31 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:31 -0000 Subject: SUSE-RU-2026:20598-1: important: Recommended update for aaa_base Message-ID: <177272901110.1967.3369302431384638183@df8f6ab05d2e> # Recommended update for aaa_base Announcement ID: SUSE-RU-2026:20598-1 Release Date: 2026-02-27T10:34:41Z Rating: important References: * bsc#1247286 * bsc#1247495 * bsc#1248158 * bsc#1249686 * bsc#1250513 * bsc#1257875 * jsc#PED-13807 * jsc#PED-14803 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains two features and has six fixes can now be installed. ## Description: This update for aaa_base fixes the following issues: * Update to version 84.87+git20260210.ecce285: * For boo#1257875 get intrinsic DEFAULT_WM back * DIR_COLORS: add vt220 and .jxl * Update to version 84.87+git20260112.8f614f3: * add ghost entries for the removed dirs * Revert list directories above all normal files. * Update to version 84.87+git20251217.34fd7bc: * add tmpfiles template adm-backup.conf (jsc#PED-14803) * Fix old script to support copy mode as well * Support for XDG environment variables for the su, * adapted sugggestions * Patching nsswitch.conf only if it has not been generated by nsswitch-config (jsc#PED-13807). * Avoid nasty exceptions running tput * Update to version 84.87+git20251111.509a363: * Avoid escape sequences on dump terminal of s390 * Update to version 84.87+git20251111.16d9d43: * Set XDG environment variables consistently without trailing slash * Update to version 84.87+git20251110.af063e6: * Avoid escape sequences on dump terminal of s390 * Set erase character from kbs entry of terminfo * Update to version 84.87+git20251030.441f926: * Add systemd to /etc/nsswitch.conf (bsc#1250513) * Add group-directories-first option * prevent normal users from accessing dmesg (bsc#1249686) * Use explicit defaults for XDG environment variables * Update to version 84.87+git20250903.33e5ba4: * Correct fix for (bsc#1247495, bsc#1248158) * Update to version 84.87+git20250805.3069494: * Remove initviocons for tcsh as well and * Update csh.login * Add missing quoting and remove unneeded uses of eval * Update to version 84.87+git20250801.f305627: * Remove sysconfig.language (bsc#1247286) * Update to version 84.87+git20250801.b2fa3fe: * Allow /etc/locale.conf to have no newline ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-327=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-327=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * aaa_base-extras-84.87+git20260210.ecce285-160000.1.1 * aaa_base-malloccheck-84.87+git20260210.ecce285-160000.1.1 * aaa_base-wsl-84.87+git20260210.ecce285-160000.1.1 * aaa_base-debugsource-84.87+git20260210.ecce285-160000.1.1 * aaa_base-yama-enable-ptrace-84.87+git20260210.ecce285-160000.1.1 * aaa_base-84.87+git20260210.ecce285-160000.1.1 * aaa_base-debuginfo-84.87+git20260210.ecce285-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * aaa_base-extras-84.87+git20260210.ecce285-160000.1.1 * aaa_base-malloccheck-84.87+git20260210.ecce285-160000.1.1 * aaa_base-wsl-84.87+git20260210.ecce285-160000.1.1 * aaa_base-debugsource-84.87+git20260210.ecce285-160000.1.1 * aaa_base-yama-enable-ptrace-84.87+git20260210.ecce285-160000.1.1 * aaa_base-84.87+git20260210.ecce285-160000.1.1 * aaa_base-debuginfo-84.87+git20260210.ecce285-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1247286 * https://bugzilla.suse.com/show_bug.cgi?id=1247495 * https://bugzilla.suse.com/show_bug.cgi?id=1248158 * https://bugzilla.suse.com/show_bug.cgi?id=1249686 * https://bugzilla.suse.com/show_bug.cgi?id=1250513 * https://bugzilla.suse.com/show_bug.cgi?id=1257875 * https://jira.suse.com/browse/PED-13807 * https://jira.suse.com/browse/PED-14803 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:34 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:34 -0000 Subject: SUSE-RU-2026:20597-1: moderate: Recommended update for open-vm-tools Message-ID: <177272901423.1967.5129800178693189576@df8f6ab05d2e> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2026:20597-1 Release Date: 2026-02-27T08:56:21Z Rating: moderate References: * bsc#1257357 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * update to 13.0.10 based on build 25056151: (boo#1257357): * There are no new features in the open-vm-tools 13.0.10 release. * This is primarily a maintenance release that addresses a fix. * A minor enhancement has been made for Guest OS Customization. * The DeployPkg plugin has been updated to handle a new cloud-init error code that signals a recoverable error and allow cloud-init to finish running. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-320=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-320=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * open-vm-tools-desktop-13.0.10-160000.1.1 * open-vm-tools-sdmp-debuginfo-13.0.10-160000.1.1 * open-vm-tools-containerinfo-debuginfo-13.0.10-160000.1.1 * open-vm-tools-desktop-debuginfo-13.0.10-160000.1.1 * open-vm-tools-debugsource-13.0.10-160000.1.1 * libvmtools0-13.0.10-160000.1.1 * open-vm-tools-sdmp-13.0.10-160000.1.1 * libvmtools0-debuginfo-13.0.10-160000.1.1 * libvmtools-devel-13.0.10-160000.1.1 * open-vm-tools-containerinfo-13.0.10-160000.1.1 * open-vm-tools-13.0.10-160000.1.1 * open-vm-tools-debuginfo-13.0.10-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * open-vm-tools-desktop-13.0.10-160000.1.1 * open-vm-tools-sdmp-debuginfo-13.0.10-160000.1.1 * open-vm-tools-containerinfo-debuginfo-13.0.10-160000.1.1 * open-vm-tools-desktop-debuginfo-13.0.10-160000.1.1 * open-vm-tools-debugsource-13.0.10-160000.1.1 * libvmtools0-13.0.10-160000.1.1 * open-vm-tools-sdmp-13.0.10-160000.1.1 * libvmtools0-debuginfo-13.0.10-160000.1.1 * libvmtools-devel-13.0.10-160000.1.1 * open-vm-tools-containerinfo-13.0.10-160000.1.1 * open-vm-tools-13.0.10-160000.1.1 * open-vm-tools-debuginfo-13.0.10-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257357 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:37 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:37 -0000 Subject: SUSE-RU-2026:20596-1: important: Recommended update for google-guest-configs Message-ID: <177272901741.1967.2793190367085945548@df8f6ab05d2e> # Recommended update for google-guest-configs Announcement ID: SUSE-RU-2026:20596-1 Release Date: 2026-02-27T08:51:11Z Rating: important References: * bsc#1254266 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for google-guest-configs fixes the following issues: * Install NetworkManager disptacher for SLE-16 and newer only * Add NetworkManager-devel to BuildRequires * Install NetworkManager dispatcher script (bsc#1254266) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-323=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-323=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * google-guest-configs-20241205.00-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * google-guest-configs-20241205.00-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254266 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:41 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:41 -0000 Subject: SUSE-RU-2026:20594-1: moderate: Recommended update for gcc15 Message-ID: <177272902117.1967.2838591989542184394@df8f6ab05d2e> # Recommended update for gcc15 Announcement ID: SUSE-RU-2026:20594-1 Release Date: 2026-02-26T16:51:31Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for gcc15 fixes the following issues: Update to GCC 15.2 release * the GCC 15.2 release contains regression fixes accumulated since the GCC 15.1 release * Fixes PR120714, RISC-V: incorrect frame pointer CFA address for stack-clash protection loops ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-314=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-314=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libgfortran5-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-locale-15.2.0+git10201-160000.1.1 * libgomp1-debuginfo-15.2.0+git10201-160000.1.1 * libitm1-15.2.0+git10201-160000.1.1 * gcc15-debuginfo-15.2.0+git10201-160000.1.1 * libasan8-15.2.0+git10201-160000.1.1 * libgomp1-15.2.0+git10201-160000.1.1 * gcc15-15.2.0+git10201-160000.1.1 * libasan8-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-fortran-debuginfo-15.2.0+git10201-160000.1.1 * libstdc++6-debuginfo-15.2.0+git10201-160000.1.1 * libitm1-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-c++-debuginfo-15.2.0+git10201-160000.1.1 * cpp15-15.2.0+git10201-160000.1.1 * gcc15-debugsource-15.2.0+git10201-160000.1.1 * libobjc4-debuginfo-15.2.0+git10201-160000.1.1 * libobjc4-15.2.0+git10201-160000.1.1 * libstdc++6-devel-gcc15-15.2.0+git10201-160000.1.1 * libstdc++6-pp-15.2.0+git10201-160000.1.1 * gcc15-fortran-15.2.0+git10201-160000.1.1 * libgcc_s1-debuginfo-15.2.0+git10201-160000.1.1 * cpp15-debuginfo-15.2.0+git10201-160000.1.1 * libgccjit0-debuginfo-15.2.0+git10201-160000.1.1 * libtsan2-debuginfo-15.2.0+git10201-160000.1.1 * libgfortran5-15.2.0+git10201-160000.1.1 * libstdc++6-15.2.0+git10201-160000.1.1 * liblsan0-15.2.0+git10201-160000.1.1 * libgccjit0-15.2.0+git10201-160000.1.1 * libatomic1-debuginfo-15.2.0+git10201-160000.1.1 * libatomic1-15.2.0+git10201-160000.1.1 * libstdc++6-locale-15.2.0+git10201-160000.1.1 * libubsan1-15.2.0+git10201-160000.1.1 * libubsan1-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-c++-15.2.0+git10201-160000.1.1 * libtsan2-15.2.0+git10201-160000.1.1 * libgcc_s1-15.2.0+git10201-160000.1.1 * libgccjit0-devel-gcc15-15.2.0+git10201-160000.1.1 * gcc15-PIE-15.2.0+git10201-160000.1.1 * liblsan0-debuginfo-15.2.0+git10201-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * gcc15-info-15.2.0+git10201-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * libhwasan0-debuginfo-15.2.0+git10201-160000.1.1 * libhwasan0-15.2.0+git10201-160000.1.1 * SUSE Linux Enterprise Server 16.0 (ppc64le x86_64) * libquadmath0-debuginfo-15.2.0+git10201-160000.1.1 * libquadmath0-15.2.0+git10201-160000.1.1 * libquadmath0-devel-gcc15-15.2.0+git10201-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libgfortran5-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-locale-15.2.0+git10201-160000.1.1 * libgomp1-debuginfo-15.2.0+git10201-160000.1.1 * libitm1-15.2.0+git10201-160000.1.1 * gcc15-debuginfo-15.2.0+git10201-160000.1.1 * libasan8-15.2.0+git10201-160000.1.1 * libgomp1-15.2.0+git10201-160000.1.1 * gcc15-15.2.0+git10201-160000.1.1 * libasan8-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-fortran-debuginfo-15.2.0+git10201-160000.1.1 * libstdc++6-debuginfo-15.2.0+git10201-160000.1.1 * libitm1-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-c++-debuginfo-15.2.0+git10201-160000.1.1 * libquadmath0-debuginfo-15.2.0+git10201-160000.1.1 * cpp15-15.2.0+git10201-160000.1.1 * gcc15-debugsource-15.2.0+git10201-160000.1.1 * libobjc4-debuginfo-15.2.0+git10201-160000.1.1 * libobjc4-15.2.0+git10201-160000.1.1 * libquadmath0-devel-gcc15-15.2.0+git10201-160000.1.1 * libstdc++6-devel-gcc15-15.2.0+git10201-160000.1.1 * libstdc++6-pp-15.2.0+git10201-160000.1.1 * gcc15-fortran-15.2.0+git10201-160000.1.1 * libgcc_s1-debuginfo-15.2.0+git10201-160000.1.1 * cpp15-debuginfo-15.2.0+git10201-160000.1.1 * libgccjit0-debuginfo-15.2.0+git10201-160000.1.1 * libtsan2-debuginfo-15.2.0+git10201-160000.1.1 * libgfortran5-15.2.0+git10201-160000.1.1 * libquadmath0-15.2.0+git10201-160000.1.1 * libstdc++6-15.2.0+git10201-160000.1.1 * liblsan0-15.2.0+git10201-160000.1.1 * libgccjit0-15.2.0+git10201-160000.1.1 * libatomic1-debuginfo-15.2.0+git10201-160000.1.1 * libatomic1-15.2.0+git10201-160000.1.1 * libstdc++6-locale-15.2.0+git10201-160000.1.1 * libubsan1-15.2.0+git10201-160000.1.1 * libubsan1-debuginfo-15.2.0+git10201-160000.1.1 * gcc15-c++-15.2.0+git10201-160000.1.1 * libtsan2-15.2.0+git10201-160000.1.1 * libgcc_s1-15.2.0+git10201-160000.1.1 * libgccjit0-devel-gcc15-15.2.0+git10201-160000.1.1 * gcc15-PIE-15.2.0+git10201-160000.1.1 * liblsan0-debuginfo-15.2.0+git10201-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * gcc15-info-15.2.0+git10201-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * libhwasan0-debuginfo-15.2.0+git10201-160000.1.1 * libhwasan0-15.2.0+git10201-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:40 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:40 -0000 Subject: SUSE-RU-2026:20595-1: important: Recommended update for fde-tools Message-ID: <177272902012.1967.1105019512777204928@df8f6ab05d2e> # Recommended update for fde-tools Announcement ID: SUSE-RU-2026:20595-1 Release Date: 2026-02-27T08:51:11Z Rating: important References: * bsc#1248516 * jsc#PED-14754 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature and has one fix can now be installed. ## Description: This update for fde-tools fixes the following issues: * Add support for persistent SRK (bsc#1248516) * Add fde-tools.conf to create /var/log/fde with tmpfiles.d (jsc#PED-14754) * Build with distro flags ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-322=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-322=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * fde-tpm-helper-0.7.3-160000.3.1 * fde-tools-bash-completion-0.7.3-160000.3.1 * fde-firstboot-0.7.3-160000.3.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * fde-tools-0.7.3-160000.3.1 * fde-tools-debuginfo-0.7.3-160000.3.1 * fde-tools-debugsource-0.7.3-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * fde-tpm-helper-0.7.3-160000.3.1 * fde-tools-bash-completion-0.7.3-160000.3.1 * fde-firstboot-0.7.3-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * fde-tools-0.7.3-160000.3.1 * fde-tools-debuginfo-0.7.3-160000.3.1 * fde-tools-debugsource-0.7.3-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1248516 * https://jira.suse.com/browse/PED-14754 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:43 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:43 -0000 Subject: SUSE-RU-2026:20593-1: moderate: Recommended update for syslogd Message-ID: <177272902388.1967.9868997607980211071@df8f6ab05d2e> # Recommended update for syslogd Announcement ID: SUSE-RU-2026:20593-1 Release Date: 2026-02-26T15:52:02Z Rating: moderate References: * bsc#1243035 * jsc#PED-13698 * jsc#PED-14864 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains two features and has one fix can now be installed. ## Description: This update for syslogd fixes the following issues: Changes in syslogd: * Avoid restarting klog.service and klogd.service in postun as both services should be started once (boo#1243035#c14) * Install tmpfile correctly as syslogd.conf (instead of sendmail.conf), * Fix tmpfile handling for transactional updates (jsc#PED-14864) * Drop last sysvinit Requirement/Provide (PED-13698) * Add -std=gnu89 to compile flags to fix gcc-15 errors ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-318=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-318=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * syslog-service-2.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * syslog-service-2.0-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243035 * https://jira.suse.com/browse/PED-13698 * https://jira.suse.com/browse/PED-14864 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:50 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:50 -0000 Subject: SUSE-SU-2026:20592-1: moderate: Security update for 7zip Message-ID: <177272903077.1967.8749823701185574424@df8f6ab05d2e> # Security update for 7zip Announcement ID: SUSE-SU-2026:20592-1 Release Date: 2026-02-26T11:53:30Z Rating: moderate References: * bsc#1246706 * bsc#1246707 * bsc#1249130 Cross-References: * CVE-2025-53816 * CVE-2025-53817 CVSS scores: * CVE-2025-53816 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-53816 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-53816 ( NVD ): 5.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-53816 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-53817 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-53817 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-53817 ( NVD ): 5.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-53817 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for 7zip fixes the following issues: * Update to 25.01 (boo#1249130) * The code for handling symbolic links has been changed to provide greater security when extracting files from archives * Command line switch -snld20 can be used to bypass default security checks when creating symbolic links. * Update to 25.00: * bzip2 compression speed was increased by 15-40%. * deflate (zip/gz) compression speed was increased by 1-3%. * improved support for zip, cpio and fat archives. * CVE-2025-53816: Fixed input manipulation leading to heap buffer overflow (bsc#1246706) * CVE-2025-53817: Fixed null pointer dereference leading to denial of service (bsc#1246707) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-315=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-315=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * 7zip-25.01-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * 7zip-25.01-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-53816.html * https://www.suse.com/security/cve/CVE-2025-53817.html * https://bugzilla.suse.com/show_bug.cgi?id=1246706 * https://bugzilla.suse.com/show_bug.cgi?id=1246707 * https://bugzilla.suse.com/show_bug.cgi?id=1249130 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:43:59 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:43:59 -0000 Subject: SUSE-SU-2026:20591-1: moderate: Security update for python-urllib3_1 Message-ID: <177272903933.1967.5750054951911203260@df8f6ab05d2e> # Security update for python-urllib3_1 Announcement ID: SUSE-SU-2026:20591-1 Release Date: 2026-02-26T09:43:17Z Rating: moderate References: * bsc#1254866 * bsc#1254867 * bsc#1256331 Cross-References: * CVE-2025-66418 * CVE-2025-66471 * CVE-2026-21441 CVSS scores: * CVE-2025-66418 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-66418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-66418 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-66418 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-66471 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-66471 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-66471 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-66471 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-21441 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-21441 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2026-21441 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-21441 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-urllib3_1 fixes the following issues: * CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API (bsc#1254867). * CVE-2025-66418: resource exhaustion via unbounded number of links in the decompression chain (bsc#1254866). * CVE-2026-21441: excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-313=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-313=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * python313-urllib3_1-1.26.20-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * python313-urllib3_1-1.26.20-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66418.html * https://www.suse.com/security/cve/CVE-2025-66471.html * https://www.suse.com/security/cve/CVE-2026-21441.html * https://bugzilla.suse.com/show_bug.cgi?id=1254866 * https://bugzilla.suse.com/show_bug.cgi?id=1254867 * https://bugzilla.suse.com/show_bug.cgi?id=1256331 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:44:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:44:02 -0000 Subject: SUSE-SU-2026:20590-1: low: Security update for autogen Message-ID: <177272904286.1967.11499959264913480924@df8f6ab05d2e> # Security update for autogen Announcement ID: SUSE-SU-2026:20590-1 Release Date: 2026-02-26T09:10:10Z Rating: low References: * bsc#1247921 Cross-References: * CVE-2025-8746 CVSS scores: * CVE-2025-8746 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-8746 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-8746 ( NVD ): 1.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-8746 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-8746 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for autogen fixes the following issues: * CVE-2025-8746: Fixed improper input validation and memory bounds checking when processing certain malformed configuration files (bsc#1247921) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-312=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-312=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libopts25-debuginfo-5.18.16-160000.3.1 * autogen-debugsource-5.18.16-160000.3.1 * autogen-debuginfo-5.18.16-160000.3.1 * autogen-5.18.16-160000.3.1 * libopts25-5.18.16-160000.3.1 * autoopts-5.18.16-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libopts25-debuginfo-5.18.16-160000.3.1 * autogen-debugsource-5.18.16-160000.3.1 * autogen-debuginfo-5.18.16-160000.3.1 * autogen-5.18.16-160000.3.1 * libopts25-5.18.16-160000.3.1 * autoopts-5.18.16-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-8746.html * https://bugzilla.suse.com/show_bug.cgi?id=1247921 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:44:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:44:04 -0000 Subject: SUSE-RU-2026:20589-1: low: Recommended update for openssl-3 Message-ID: <177272904421.1967.5674474420181869390@df8f6ab05d2e> # Recommended update for openssl-3 Announcement ID: SUSE-RU-2026:20589-1 Release Date: 2026-02-26T07:38:22Z Rating: low References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for openssl-3 fixes the following issues: * removed test patches because they are not needed. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-310=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-310=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * openssl-3-debugsource-3.5.0-160000.6.1 * libopenssl-3-devel-3.5.0-160000.6.1 * libopenssl-3-fips-provider-3.5.0-160000.6.1 * libopenssl3-3.5.0-160000.6.1 * openssl-3-3.5.0-160000.6.1 * libopenssl-3-fips-provider-debuginfo-3.5.0-160000.6.1 * libopenssl3-debuginfo-3.5.0-160000.6.1 * openssl-3-debuginfo-3.5.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (noarch) * openssl-3-doc-3.5.0-160000.6.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.6.1 * libopenssl3-x86-64-v3-debuginfo-3.5.0-160000.6.1 * libopenssl3-x86-64-v3-3.5.0-160000.6.1 * libopenssl-3-fips-provider-x86-64-v3-debuginfo-3.5.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * openssl-3-debugsource-3.5.0-160000.6.1 * libopenssl-3-devel-3.5.0-160000.6.1 * libopenssl-3-fips-provider-3.5.0-160000.6.1 * libopenssl3-3.5.0-160000.6.1 * openssl-3-3.5.0-160000.6.1 * libopenssl-3-fips-provider-debuginfo-3.5.0-160000.6.1 * libopenssl3-debuginfo-3.5.0-160000.6.1 * openssl-3-debuginfo-3.5.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.6.1 * libopenssl3-x86-64-v3-debuginfo-3.5.0-160000.6.1 * libopenssl3-x86-64-v3-3.5.0-160000.6.1 * libopenssl-3-fips-provider-x86-64-v3-debuginfo-3.5.0-160000.6.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * openssl-3-doc-3.5.0-160000.6.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:44:15 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:44:15 -0000 Subject: SUSE-SU-2026:20588-1: important: Security update for postgresql15 Message-ID: <177272905517.1967.5432557412591081040@df8f6ab05d2e> # Security update for postgresql15 Announcement ID: SUSE-SU-2026:20588-1 Release Date: 2026-02-20T16:18:08Z Rating: important References: * bsc#1253332 * bsc#1253333 * bsc#1258008 * bsc#1258009 * bsc#1258010 * bsc#1258011 Cross-References: * CVE-2025-12817 * CVE-2025-12818 * CVE-2026-2003 * CVE-2026-2004 * CVE-2026-2005 * CVE-2026-2006 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-2003 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2003 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2004 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2004 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for postgresql15 fixes the following issues: Update to version 15.16. Security issues fixed: * CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008). * CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code execution (bsc#1258009). * CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution (bsc#1258010). * CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution (bsc#1258011). * CVE-2025-12817: missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332). * CVE-2025-12818: integer overflow in allocation-size calculations within libpq (bsc#1253333). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-308=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-308=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * postgresql15-server-15.16-160000.1.1 * postgresql15-plpython-debuginfo-15.16-160000.1.1 * postgresql15-contrib-15.16-160000.1.1 * postgresql15-debuginfo-15.16-160000.1.1 * postgresql15-contrib-debuginfo-15.16-160000.1.1 * postgresql15-pltcl-15.16-160000.1.1 * postgresql15-server-debuginfo-15.16-160000.1.1 * postgresql15-plperl-debuginfo-15.16-160000.1.1 * postgresql15-server-devel-debuginfo-15.16-160000.1.1 * postgresql15-devel-15.16-160000.1.1 * postgresql15-debugsource-15.16-160000.1.1 * postgresql15-plpython-15.16-160000.1.1 * postgresql15-plperl-15.16-160000.1.1 * postgresql15-pltcl-debuginfo-15.16-160000.1.1 * postgresql15-devel-debuginfo-15.16-160000.1.1 * postgresql15-15.16-160000.1.1 * postgresql15-server-devel-15.16-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * postgresql15-docs-15.16-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * postgresql15-server-15.16-160000.1.1 * postgresql15-plpython-debuginfo-15.16-160000.1.1 * postgresql15-contrib-15.16-160000.1.1 * postgresql15-debuginfo-15.16-160000.1.1 * postgresql15-contrib-debuginfo-15.16-160000.1.1 * postgresql15-pltcl-15.16-160000.1.1 * postgresql15-server-debuginfo-15.16-160000.1.1 * postgresql15-plperl-debuginfo-15.16-160000.1.1 * postgresql15-server-devel-debuginfo-15.16-160000.1.1 * postgresql15-devel-15.16-160000.1.1 * postgresql15-debugsource-15.16-160000.1.1 * postgresql15-plpython-15.16-160000.1.1 * postgresql15-plperl-15.16-160000.1.1 * postgresql15-pltcl-debuginfo-15.16-160000.1.1 * postgresql15-devel-debuginfo-15.16-160000.1.1 * postgresql15-15.16-160000.1.1 * postgresql15-server-devel-15.16-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * postgresql15-docs-15.16-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://www.suse.com/security/cve/CVE-2026-2003.html * https://www.suse.com/security/cve/CVE-2026-2004.html * https://www.suse.com/security/cve/CVE-2026-2005.html * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 * https://bugzilla.suse.com/show_bug.cgi?id=1258008 * https://bugzilla.suse.com/show_bug.cgi?id=1258009 * https://bugzilla.suse.com/show_bug.cgi?id=1258010 * https://bugzilla.suse.com/show_bug.cgi?id=1258011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:44:46 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:44:46 -0000 Subject: SUSE-SU-2026:20587-1: important: Security update for postgresql14 Message-ID: <177272908625.1967.17515827419360207641@df8f6ab05d2e> # Security update for postgresql14 Announcement ID: SUSE-SU-2026:20587-1 Release Date: 2026-02-20T16:14:27Z Rating: important References: * bsc#1253332 * bsc#1253333 * bsc#1258008 * bsc#1258009 * bsc#1258010 * bsc#1258011 Cross-References: * CVE-2025-12817 * CVE-2025-12818 * CVE-2026-2003 * CVE-2026-2004 * CVE-2026-2005 * CVE-2026-2006 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-2003 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2003 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2026-2004 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2004 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2005 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2006 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves six vulnerabilities can now be installed. ## Description: This update for postgresql14 fixes the following issues: Update to version 14.21. Security issues fixed: * CVE-2026-2003: improper validation of type "oidvector" may allow disclose a few bytes of server memory (bsc#1258008). * CVE-2026-2004: intarray missing validation of type of input to selectivity estimator could lead to arbitrary code execution (bsc#1258009). * CVE-2026-2005: buffer overrun in contrib/pgcrypto's PGP decryption functions could lead to arbitrary code execution (bsc#1258010). * CVE-2026-2006: inadequate validation of multibyte character lengths could lead to arbitrary code execution (bsc#1258011). * CVE-2025-12817: missing check for CREATE privileges on the schema in CREATE STATISTICS (bsc#1253332). * CVE-2025-12818: integer overflow in allocation-size calculations within libpq (bsc#1253333). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-307=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-307=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * postgresql14-contrib-debuginfo-14.21-160000.1.1 * postgresql14-debuginfo-14.21-160000.1.1 * postgresql14-devel-debuginfo-14.21-160000.1.1 * postgresql14-plperl-debuginfo-14.21-160000.1.1 * postgresql14-pltcl-14.21-160000.1.1 * postgresql14-server-devel-debuginfo-14.21-160000.1.1 * postgresql14-server-debuginfo-14.21-160000.1.1 * postgresql14-server-devel-14.21-160000.1.1 * postgresql14-server-14.21-160000.1.1 * postgresql14-contrib-14.21-160000.1.1 * postgresql14-debugsource-14.21-160000.1.1 * postgresql14-14.21-160000.1.1 * postgresql14-pltcl-debuginfo-14.21-160000.1.1 * postgresql14-plpython-14.21-160000.1.1 * postgresql14-plperl-14.21-160000.1.1 * postgresql14-devel-14.21-160000.1.1 * postgresql14-plpython-debuginfo-14.21-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * postgresql14-docs-14.21-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * postgresql14-contrib-debuginfo-14.21-160000.1.1 * postgresql14-debuginfo-14.21-160000.1.1 * postgresql14-devel-debuginfo-14.21-160000.1.1 * postgresql14-plperl-debuginfo-14.21-160000.1.1 * postgresql14-pltcl-14.21-160000.1.1 * postgresql14-server-devel-debuginfo-14.21-160000.1.1 * postgresql14-server-debuginfo-14.21-160000.1.1 * postgresql14-server-devel-14.21-160000.1.1 * postgresql14-server-14.21-160000.1.1 * postgresql14-contrib-14.21-160000.1.1 * postgresql14-debugsource-14.21-160000.1.1 * postgresql14-14.21-160000.1.1 * postgresql14-pltcl-debuginfo-14.21-160000.1.1 * postgresql14-plpython-14.21-160000.1.1 * postgresql14-plperl-14.21-160000.1.1 * postgresql14-devel-14.21-160000.1.1 * postgresql14-plpython-debuginfo-14.21-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * postgresql14-docs-14.21-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://www.suse.com/security/cve/CVE-2026-2003.html * https://www.suse.com/security/cve/CVE-2026-2004.html * https://www.suse.com/security/cve/CVE-2026-2005.html * https://www.suse.com/security/cve/CVE-2026-2006.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 * https://bugzilla.suse.com/show_bug.cgi?id=1258008 * https://bugzilla.suse.com/show_bug.cgi?id=1258009 * https://bugzilla.suse.com/show_bug.cgi?id=1258010 * https://bugzilla.suse.com/show_bug.cgi?id=1258011 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:02 -0000 Subject: SUSE-RU-2026:20586-1: important: Recommended update for lvm2 Message-ID: <177272910240.1967.3718264392881122734@df8f6ab05d2e> # Recommended update for lvm2 Announcement ID: SUSE-RU-2026:20586-1 Release Date: 2026-02-20T15:44:31Z Rating: important References: * bsc#1257661 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for lvm2 fixes the following issues: * L3: LVM_SUPPRESS_FD_WARNINGS is no longer effective (bsc#1257661) * libdaemon: fix suppressing stray fd warnings ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-305=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-305=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * lvm2-devel-2.03.29-160000.3.1 * libdevmapper1_03-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-2.03.29-160000.3.1 * liblvm2cmd2_03-2.03.29-160000.3.1 * lvm2-device-mapper-debugsource-2.03.29-160000.3.1 * libdevmapper-event1_03-2.03.29_1.02.203-160000.3.1 * libdevmapper-event1_03-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-debugsource-2.03.29-160000.3.1 * device-mapper-2.03.29_1.02.203-160000.3.1 * device-mapper-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-debuginfo-2.03.29-160000.3.1 * liblvm2cmd2_03-debuginfo-2.03.29-160000.3.1 * libdevmapper1_03-2.03.29_1.02.203-160000.3.1 * device-mapper-devel-2.03.29_1.02.203-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * lvm2-devel-2.03.29-160000.3.1 * libdevmapper1_03-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-2.03.29-160000.3.1 * lvm2-lockd-2.03.29-160000.3.1 * liblvm2cmd2_03-2.03.29-160000.3.1 * lvm2-lvmlockd-debugsource-2.03.29-160000.3.1 * lvm2-device-mapper-debugsource-2.03.29-160000.3.1 * libdevmapper-event1_03-2.03.29_1.02.203-160000.3.1 * libdevmapper-event1_03-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-lockd-debuginfo-2.03.29-160000.3.1 * lvm2-debugsource-2.03.29-160000.3.1 * device-mapper-2.03.29_1.02.203-160000.3.1 * device-mapper-debuginfo-2.03.29_1.02.203-160000.3.1 * lvm2-debuginfo-2.03.29-160000.3.1 * liblvm2cmd2_03-debuginfo-2.03.29-160000.3.1 * libdevmapper1_03-2.03.29_1.02.203-160000.3.1 * device-mapper-devel-2.03.29_1.02.203-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1257661 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:10 -0000 Subject: SUSE-SU-2026:20585-1: moderate: Security update for docker-stable Message-ID: <177272911066.1967.16884318265815292199@df8f6ab05d2e> # Security update for docker-stable Announcement ID: SUSE-SU-2026:20585-1 Release Date: 2026-02-20T15:40:19Z Rating: moderate References: * bsc#1250508 * bsc#1250596 * bsc#1252290 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has three fixes can now be installed. ## Description: This update for docker-stable fixes the following issues: * Enable SELinux in default daemon.json config (--selinux-enabled). This has no practical impact on non-SELinux systems (bsc#1252290). * Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes by default and thus end up installing git with Docker (bsc#1250508). * Include historical changelog data from before the docker-stable fork. This includes CVE numbers for security tracking reasons (bsc#1250596). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-304=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-304=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * docker-stable-buildx-0.25.0-160000.3.1 * docker-stable-debuginfo-24.0.9_ce-160000.3.1 * docker-stable-buildx-debuginfo-0.25.0-160000.3.1 * docker-stable-24.0.9_ce-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * docker-stable-zsh-completion-24.0.9_ce-160000.3.1 * docker-stable-bash-completion-24.0.9_ce-160000.3.1 * docker-stable-rootless-extras-24.0.9_ce-160000.3.1 * docker-stable-fish-completion-24.0.9_ce-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * docker-stable-buildx-0.25.0-160000.3.1 * docker-stable-debuginfo-24.0.9_ce-160000.3.1 * docker-stable-buildx-debuginfo-0.25.0-160000.3.1 * docker-stable-24.0.9_ce-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * docker-stable-zsh-completion-24.0.9_ce-160000.3.1 * docker-stable-bash-completion-24.0.9_ce-160000.3.1 * docker-stable-rootless-extras-24.0.9_ce-160000.3.1 * docker-stable-fish-completion-24.0.9_ce-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1250508 * https://bugzilla.suse.com/show_bug.cgi?id=1250596 * https://bugzilla.suse.com/show_bug.cgi?id=1252290 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:16 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:16 -0000 Subject: SUSE-RU-2026:20584-1: important: Recommended update for zypper, libzypp, libsolv, zypp-plugin Message-ID: <177272911676.1967.4373219816824901668@df8f6ab05d2e> # Recommended update for zypper, libzypp, libsolv, zypp-plugin Announcement ID: SUSE-RU-2026:20584-1 Release Date: 2026-02-20T10:28:32Z Rating: important References: * bsc#1230267 * bsc#1249435 * bsc#1257068 * jsc#PED-14658 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature and has three fixes can now be installed. ## Description: This update for zypper, libzypp, libsolv, zypp-plugin fixes the following issues: Changes in zypper: * upgrade version to 1.14.94: * Fixed `bash-completion`: zypper refresh now ignores repository priority lines. * Changes to support building against restructured libzypp in stack build (bsc#1230267) Changes in libzypp: * upgrade version to 17.38.2: * Prepare a legacy /etc/zypp/zypp.conf to be installed on old distros. See the ZYPP.CONF(5) man page for details. * Fix runtime check for broken rpm --runposttrans (bsc#1257068) * upgrade version to 17.38.1: * Avoid libcurl-mini4 when building as it does not support ftp protocol. * Translation: updated .pot file. * upgrade version to 17.38.0: * zypp.conf: follow the UAPI configuration file specification (PED-14658) In short terms it means we will no longer ship an /etc/zypp/zypp.conf, but store our own defaults in /usr/etc/zypp/zypp.conf. The systems administrator may choose to keep a full copy in /etc/zypp/zypp.conf ignoring our config file settings completely, or the preferred way - to overwrite specific settings via /etc/zypp/zypp.conf.d/*.conf overlay files. See the ZYPP.CONF(5) man page for details. * cmake: correctly detect rpm6 * Use 'zypp.tmp' as temp directory component to ease setting up SELinux policies (bsc#1249435) * zyppng: Update Provider to current MediaCurl2 download approach, drop Metalink Changes in libsolv: * bump version to 0.7.35: * fixed rare crash in the handling of allowuninstall in combination with forcebest updates * new pool_satisfieddep_map feature to test if a set of packages satisfies a dependency Changes in zypp-plugin: * upgrade version 0.6.6: * Fix link to libzypp plugins documentation: https://opensuse.github.io/libzypp/zypp-plugins.html ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-303=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-303=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libsolv-demo-0.7.35-160000.1.1 * libsolv-debugsource-0.7.35-160000.1.1 * libzypp-devel-17.38.2-160000.1.1 * python313-solv-0.7.35-160000.1.1 * libzypp-17.38.2-160000.1.1 * ruby-solv-0.7.35-160000.1.1 * zypper-debugsource-1.14.94-160000.1.1 * libsolv1-debuginfo-0.7.35-160000.1.1 * ruby-solv-debuginfo-0.7.35-160000.1.1 * libzypp-debuginfo-17.38.2-160000.1.1 * libzypp-devel-doc-17.38.2-160000.1.1 * libsolv-devel-static-0.7.35-160000.1.1 * libsolv-tools-base-debuginfo-0.7.35-160000.1.1 * python313-solv-debuginfo-0.7.35-160000.1.1 * libsolv1-0.7.35-160000.1.1 * libsolv-devel-debuginfo-0.7.35-160000.1.1 * perl-solv-debuginfo-0.7.35-160000.1.1 * libsolv-debuginfo-0.7.35-160000.1.1 * libsolv-tools-0.7.35-160000.1.1 * zypper-debuginfo-1.14.94-160000.1.1 * libsolv-tools-base-0.7.35-160000.1.1 * libsolv-tools-debuginfo-0.7.35-160000.1.1 * libzypp-debugsource-17.38.2-160000.1.1 * libsolv-devel-0.7.35-160000.1.1 * zypper-1.14.94-160000.1.1 * perl-solv-0.7.35-160000.1.1 * libsolv-demo-debuginfo-0.7.35-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * zypper-needs-restarting-1.14.94-160000.1.1 * zypper-aptitude-1.14.94-160000.1.1 * python313-zypp-plugin-0.6.6-160000.1.1 * zypper-log-1.14.94-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libsolv-demo-0.7.35-160000.1.1 * libsolv-debugsource-0.7.35-160000.1.1 * libzypp-devel-17.38.2-160000.1.1 * python313-solv-0.7.35-160000.1.1 * libzypp-17.38.2-160000.1.1 * ruby-solv-0.7.35-160000.1.1 * zypper-debugsource-1.14.94-160000.1.1 * libsolv1-debuginfo-0.7.35-160000.1.1 * ruby-solv-debuginfo-0.7.35-160000.1.1 * libzypp-debuginfo-17.38.2-160000.1.1 * libzypp-devel-doc-17.38.2-160000.1.1 * libsolv-devel-static-0.7.35-160000.1.1 * libsolv-tools-base-debuginfo-0.7.35-160000.1.1 * python313-solv-debuginfo-0.7.35-160000.1.1 * libsolv1-0.7.35-160000.1.1 * libsolv-devel-debuginfo-0.7.35-160000.1.1 * perl-solv-debuginfo-0.7.35-160000.1.1 * libsolv-debuginfo-0.7.35-160000.1.1 * libsolv-tools-0.7.35-160000.1.1 * zypper-debuginfo-1.14.94-160000.1.1 * libsolv-tools-base-0.7.35-160000.1.1 * libsolv-tools-debuginfo-0.7.35-160000.1.1 * libzypp-debugsource-17.38.2-160000.1.1 * libsolv-devel-0.7.35-160000.1.1 * zypper-1.14.94-160000.1.1 * perl-solv-0.7.35-160000.1.1 * libsolv-demo-debuginfo-0.7.35-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * zypper-needs-restarting-1.14.94-160000.1.1 * zypper-aptitude-1.14.94-160000.1.1 * python313-zypp-plugin-0.6.6-160000.1.1 * zypper-log-1.14.94-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230267 * https://bugzilla.suse.com/show_bug.cgi?id=1249435 * https://bugzilla.suse.com/show_bug.cgi?id=1257068 * https://jira.suse.com/browse/PED-14658 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:17 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:17 -0000 Subject: SUSE-OU-2026:20583-1: moderate: Optional update for nvidia-open-driver-G07-signed Message-ID: <177272911781.1967.9284846407328069781@df8f6ab05d2e> # Optional update for nvidia-open-driver-G07-signed Announcement ID: SUSE-OU-2026:20583-1 Release Date: 2026-02-20T09:38:47Z Rating: moderate References: * jsc#PED-15510 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature can now be installed. ## Description: This update for nvidia-open-driver-G07-signed fixes the following issues: The G07 opensource NVidia driver is being added. (jsc#PED-15510) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-302=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-302=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64) * nvidia-open-driver-G07-signed-kmp-default-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-64kb-devel-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-kmp-64kb-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-64kb-devel-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-kmp-64kb-debuginfo-590.48.01_k6.12.0_160000.9-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-590.48.01_k6.12.0_160000.9-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * nvidia-open-driver-G07-signed-debugsource-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-cuda-debugsource-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-default-devel-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-cuda-default-devel-590.48.01-160000.1.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * nvidia-open-driver-G07-signed-cuda-kmp-default-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-debuginfo-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-debuginfo-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-590.48.01_k6.12.0_160000.25-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * nvidia-open-driver-G07-signed-debugsource-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-debuginfo-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-cuda-debugsource-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-default-devel-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-cuda-default-devel-590.48.01-160000.1.1 * nvidia-open-driver-G07-signed-kmp-default-590.48.01_k6.12.0_160000.25-160000.1.1 * nvidia-open-driver-G07-signed-cuda-kmp-default-debuginfo-590.48.01_k6.12.0_160000.25-160000.1.1 ## References: * https://jira.suse.com/browse/PED-15510 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:20 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:20 -0000 Subject: SUSE-SU-2026:20582-1: moderate: Security update for MozillaFirefox Message-ID: <177272912062.1967.7681399593269039020@df8f6ab05d2e> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2026:20582-1 Release Date: 2026-02-19T11:09:58Z Rating: moderate References: * bsc#1258231 Cross-References: * CVE-2026-2447 CVSS scores: * CVE-2026-2447 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-2447 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-2447 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Changes in MozillaFirefox: Firefox Extended Support Release 140.7.1 ESR was released: * Fixed: Security fix. MFSA 2026-10 (bsc#1258231): * CVE-2026-2447: Heap buffer overflow in libvpx. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-299=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-299=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-140.7.1-160000.1.1 * MozillaFirefox-debuginfo-140.7.1-160000.1.1 * MozillaFirefox-debugsource-140.7.1-160000.1.1 * MozillaFirefox-translations-common-140.7.1-160000.1.1 * MozillaFirefox-translations-other-140.7.1-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * MozillaFirefox-devel-140.7.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * MozillaFirefox-140.7.1-160000.1.1 * MozillaFirefox-debuginfo-140.7.1-160000.1.1 * MozillaFirefox-debugsource-140.7.1-160000.1.1 * MozillaFirefox-translations-common-140.7.1-160000.1.1 * MozillaFirefox-translations-other-140.7.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * MozillaFirefox-devel-140.7.1-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-2447.html * https://bugzilla.suse.com/show_bug.cgi?id=1258231 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:29 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:29 -0000 Subject: SUSE-SU-2026:20581-1: important: Security update for python313 Message-ID: <177272912981.1967.13463118898941007386@df8f6ab05d2e> # Security update for python313 Announcement ID: SUSE-SU-2026:20581-1 Release Date: 2026-02-19T10:31:04Z Rating: important References: * bsc#1257029 * bsc#1257031 * bsc#1257042 * bsc#1257046 * bsc#1257181 Cross-References: * CVE-2025-11468 * CVE-2025-15282 * CVE-2026-0672 * CVE-2026-0865 * CVE-2026-1299 CVSS scores: * CVE-2025-11468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-11468 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-11468 ( NVD ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-15282 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15282 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2025-15282 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0672 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-0672 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0672 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-0865 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0865 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2026-0865 ( NVD ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-1299 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2026-1299 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-1299 ( NVD ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for python313 fixes the following issues: Update to version 3.13.12. Security issues fixed: * CVE-2025-11468: header injection when folding a long comment in an email header containing exclusively unfoldable characters (bsc#1257029). * CVE-2025-15282: user-controlled data URLs parsed may allow injecting headers (bsc#1257046). * CVE-2026-0672: HTTP header injection via user-controlled cookie values and parameters when using http.cookies.Morsel (bsc#1257031). * CVE-2026-0865: user-controlled header containing newlines can allow injecting HTTP headers (bsc#1257042). * CVE-2026-1299: header injection when an email is serialized due to improper newline quoting in `BytesGenerator` (bsc#1257181). Other updates and bugfixes: * Update to version 3.13.12. * Library * gh-144380: Improve performance of io.BufferedReader line iteration by ~49%. * gh-144169: Fix three crashes when non-string keyword arguments are supplied to objects in the ast module. * gh-144100: Fixed a crash in ctypes when using a deprecated POINTER(str) type in argtypes. Instead of aborting, ctypes now raises a proper Python exception when the pointer target type is unresolved. * gh-144050: Fix stat.filemode() in the pure-Python implementation to avoid misclassifying invalid mode values as block devices. * gh-144023: Fixed validation of file descriptor 0 in posix functions when used with follow_symlinks parameter. * gh-143999: Fix an issue where inspect.getgeneratorstate() and inspect.getcoroutinestate() could fail for generators wrapped by types.coroutine() in the suspended state. * gh-143706: Fix multiprocessing forkserver so that sys.argv is correctly set before **main** is preloaded. Previously, sys.argv was empty during main module import in forkserver child processes. This fixes a regression introduced in 3.13.8 and 3.14.1. Root caused by Aaron Wieczorek, test provided by Thomas Watson, thanks! * gh-143638: Forbid reentrant calls of the pickle.Pickler and pickle.Unpickler methods for the C implementation. Previously, this could cause crash or data corruption, now concurrent calls of methods of the same object raise RuntimeError. * gh-78724: Raise RuntimeError's when user attempts to call methods on half-initialized Struct objects, For example, created by Struct. **new** (Struct). Patch by Sergey B Kirpichev. * gh-143602: Fix a inconsistency issue in write() that leads to unexpected buffer overwrite by deduplicating the buffer exports. * gh-143547: Fix sys.unraisablehook() when the hook raises an exception and changes sys.unraisablehook(): hold a strong reference to the old hook. Patch by Victor Stinner. * gh-143378: Fix use-after-free crashes when a BytesIO object is concurrently mutated during write() or writelines(). * gh-143346: Fix incorrect wrapping of the Base64 data in plistlib._PlistWriter when the indent contains a mix of tabs and spaces. * gh-143310: tkinter: fix a crash when a Python list is mutated during the conversion to a Tcl object (e.g., when setting a Tcl variable). Patch by Benedikt Tran. * gh-143309: Fix a crash in os.execve() on non-Windows platforms when given a custom environment mapping which is then mutated during parsing. Patch by Benedikt Tran. * gh-143308: pickle: fix use-after-free crashes when a PickleBuffer is concurrently mutated by a custom buffer callback during pickling. Patch by Benedikt Tran and Aaron Wieczorek. * gh-143237: Fix support of named pipes in the rotating logging handlers. * gh-143249: Fix possible buffer leaks in Windows overlapped I/O on error handling. * gh-143241: zoneinfo: fix infinite loop in ZoneInfo.from_file when parsing a malformed TZif file. Patch by Fatih Celik. * gh-142830: sqlite3: fix use-after-free crashes when the connection's callbacks are mutated during a callback execution. Patch by Benedikt Tran. * gh-143200: xml.etree.ElementTree: fix use-after-free crashes in **getitem** () and **setitem** () methods of Element when the element is concurrently mutated. Patch by Benedikt Tran. * gh-142195: Updated timeout evaluation logic in subprocess to be compatible with deterministic environments like Shadow where time moves exactly as requested. * gh-143145: Fixed a possible reference leak in ctypes when constructing results with multiple output parameters on error. * gh-122431: Corrected the error message in readline.append_history_file() to state that nelements must be non-negative instead of positive. * gh-143004: Fix a potential use-after-free in collections.Counter.update() when user code mutates the Counter during an update. * gh-143046: The asyncio REPL no longer prints copyright and version messages in the quiet mode (-q). Patch by Bartosz Slawecki. * gh-140648: The asyncio REPL now respects the -I flag (isolated mode). Previously, it would load and execute PYTHONSTARTUP even if the flag was set. Contributed by Bartosz Slawecki. * gh-142991: Fixed socket operations such as recvfrom() and sendto() for FreeBSD divert(4) socket. * gh-143010: Fixed a bug in mailbox where the precise timing of an external event could result in the library opening an existing file instead of a file it expected to create. * gh-142881: Fix concurrent and reentrant call of atexit.unregister(). * gh-112127: Fix possible use-after-free in atexit.unregister() when the callback is unregistered during comparison. * gh-142783: Fix zoneinfo use-after-free with descriptor _weak_cache. a descriptor as _weak_cache could cause crashes during object creation. The fix ensures proper reference counting for descriptor-provided objects. * gh-142754: Add the ownerDocument attribute to xml.dom.minidom elements and attributes created by directly instantiating the Element or Attr class. Note that this way of creating nodes is not supported; creator functions like xml.dom.Document.documentElement() should be used instead. * gh-142784: The asyncio REPL now properly closes the loop upon the end of interactive session. Previously, it could cause surprising warnings. Contributed by Bartosz Slawecki. * gh-142555: array: fix a crash in a[i] = v when converting i to an index via i. **index** or i. **float** mutates the array. * gh-142594: Fix crash in TextIOWrapper.close() when the underlying buffer's closed property calls detach(). * gh-142451: hmac: Ensure that the HMAC.block_size attribute is correctly copied by HMAC.copy. Patch by Benedikt Tran. * gh-142495: collections.defaultdict now prioritizes **setitem** () when inserting default values from default_factory. This prevents race conditions where a default value would overwrite a value set before default_factory returns. * gh-142651: unittest.mock: fix a thread safety issue where Mock.call_count may return inaccurate values when the mock is called concurrently from multiple threads. * gh-142595: Added type check during initialization of the decimal module to prevent a crash in case of broken stdlib. Patch by Sergey B Kirpichev. * gh-142517: The non-compat32 email policies now correctly handle refolding encoded words that contain bytes that can not be decoded in their specified character set. Previously this resulted in an encoding exception during folding. * gh-112527: The help text for required options in argparse no longer extended with "(default: None)". * gh-142315: Pdb can now run scripts from anonymous pipes used in process substitution. Patch by Bartosz Slawecki. * gh-142282: Fix winreg.QueryValueEx() to not accidentally read garbage buffer under race condition. * gh-75949: Fix argparse to preserve | separators in mutually exclusive groups when the usage line wraps due to length. * gh-68552: MisplacedEnvelopeHeaderDefect and Missing header name defects are now correctly passed to the handle_defect method of policy in FeedParser. * gh-142006: Fix a bug in the email.policy.default folding algorithm which incorrectly resulted in a doubled newline when a line ending at exactly max_line_length was followed by an unfoldable token. * gh-105836: Fix asyncio.run_coroutine_threadsafe() leaving underlying cancelled asyncio task running. * gh-139971: pydoc: Ensure that the link to the online documentation of a stdlib module is correct. * gh-139262: Some keystrokes can be swallowed in the new PyREPL on Windows, especially when used together with the ALT key. Fix by Chris Eibl. * gh-138897: Improved license/copyright/credits display in the REPL: now uses a pager. * gh-79986: Add parsing for References and In-Reply-To headers to the email library that parses the header content as lists of message id tokens. This prevents them from being folded incorrectly. * gh-109263: Starting a process from spawn context in multiprocessing no longer sets the start method globally. * gh-90871: Fixed an off by one error concerning the backlog parameter in create_unix_server(). Contributed by Christian Harries. * gh-133253: Fix thread-safety issues in linecache. * gh-132715: Skip writing objects during marshalling once a failure has occurred. * gh-127529: Correct behavior of asyncio.selector_events.BaseSelectorEventLoop._accept_connection() in handling ConnectionAbortedError in a loop. This improves performance on OpenBSD. * IDLE * gh-143774: Better explain the operation of Format / Format Paragraph. * Core and Builtins * gh-144307: Prevent a reference leak in module teardown at interpreter finalization. * gh-144194: Fix error handling in perf jitdump initialization on memory allocation failure. * gh-141805: Fix crash in set when objects with the same hash are concurrently added to the set after removing an element with the same hash while the set still contains elements with the same hash. * gh-143670: Fixes a crash in ga_repr_items_list function. * gh-143377: Fix a crash in _interpreters.capture_exception() when the exception is incorrectly formatted. Patch by Benedikt Tran. * gh-143189: Fix crash when inserting a non-str key into a split table dictionary when the key matches an existing key in the split table but has no corresponding value in the dict. * gh-143228: Fix use-after-free in perf trampoline when toggling profiling while threads are running or during interpreter finalization with daemon threads active. The fix uses reference counting to ensure trampolines are not freed while any code object could still reference them. Pach by Pablo Galindo * gh-142664: Fix a use-after-free crash in memoryview. **hash** when the **hash** method of the referenced object mutates that object or the view. Patch by Benedikt Tran. * gh-142557: Fix a use-after-free crash in bytearray. **mod** when the bytearray is mutated while formatting the %-style arguments. Patch by Benedikt Tran. * gh-143195: Fix use-after-free crashes in bytearray.hex() and memoryview.hex() when the separator's **len** () mutates the original object. Patch by Benedikt Tran. * gh-143135: Set sys.flags.inspect to 1 when PYTHONINSPECT is * Previously, it was set to 0 in this case. * gh-143003: Fix an overflow of the shared empty buffer in bytearray.extend() when **length_hint** () returns 0 for non-empty iterator. * gh-143006: Fix a possible assertion error when comparing negative non-integer float and int with the same number of bits in the integer part. * gh-142776: Fix a file descriptor leak in import.c * gh-142829: Fix a use-after-free crash in contextvars.Context comparison when a custom **eq** method modifies the context via set(). * gh-142766: Clear the frame of a generator when generator.close() is called. * gh-142737: Tracebacks will be displayed in fallback mode even if io.open() is lost. Previously, this would crash the interpreter. Patch by Bartosz Slawecki. * gh-142554: Fix a crash in divmod() when _pylong.int_divmod() does not return a tuple of length two exactly. Patch by Benedikt Tran. * gh-142560: Fix use-after-free in bytearray search-like methods (find(), count(), index(), rindex(), and rfind()) by marking the storage as exported which causes reallocation attempts to raise BufferError. For contains(), split(), and rsplit() the buffer protocol is used for this. * gh-142343: Fix SIGILL crash on m68k due to incorrect assembly constraint. * gh-141732: Ensure the **repr** () for ExceptionGroup and BaseExceptionGroup does not change when the exception sequence that was original passed in to its constructor is subsequently mutated. * gh-100964: Fix reference cycle in exhausted generator frames. Patch by Savannah Ostrowski. * gh-140373: Correctly emit PY_UNWIND event when generator object is closed. Patch by Mikhail Efimov. * gh-138568: Adjusted the built-in help() function so that empty inputs are ignored in interactive mode. * gh-127773: Do not use the type attribute cache for types with incompatible MRO. * C API * gh-142571: PyUnstable_CopyPerfMapFile() now checks that opening the file succeeded before flushing. * Build * gh-142454: When calculating the digest of the JIT stencils input, sort the hashed files by filenames before adding their content to the hasher. This ensures deterministic hash input and hence deterministic hash, independent on filesystem order. * gh-141808: When running make clean-retain-profile, keep the generated JIT stencils. That way, the stencils are not generated twice when Profile-guided optimization (PGO) is used. It also allows distributors to supply their own pre-built JIT stencils. * gh-138061: Ensure reproducible builds by making JIT stencil header generation deterministic. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-300=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-300=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * python313-tools-3.13.12-160000.1.1 * python313-3.13.12-160000.1.1 * python313-dbm-3.13.12-160000.1.1 * python313-dbm-debuginfo-3.13.12-160000.1.1 * python313-debuginfo-3.13.12-160000.1.1 * python313-idle-3.13.12-160000.1.1 * libpython3_13-1_0-debuginfo-3.13.12-160000.1.1 * python313-curses-debuginfo-3.13.12-160000.1.1 * python313-debugsource-3.13.12-160000.1.1 * python313-tk-debuginfo-3.13.12-160000.1.1 * libpython3_13-1_0-3.13.12-160000.1.1 * python313-base-3.13.12-160000.1.1 * python313-base-debuginfo-3.13.12-160000.1.1 * python313-devel-debuginfo-3.13.12-160000.1.1 * python313-tk-3.13.12-160000.1.1 * python313-doc-3.13.12-160000.1.1 * python313-doc-devhelp-3.13.12-160000.1.1 * python313-curses-3.13.12-160000.1.1 * python313-core-debugsource-3.13.12-160000.1.1 * python313-devel-3.13.12-160000.1.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * python313-x86-64-v3-3.13.12-160000.1.1 * libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 * libpython3_13-1_0-x86-64-v3-debuginfo-3.13.12-160000.1.1 * python313-x86-64-v3-debuginfo-3.13.12-160000.1.1 * python313-base-x86-64-v3-debuginfo-3.13.12-160000.1.1 * python313-base-x86-64-v3-3.13.12-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * python313-tools-3.13.12-160000.1.1 * python313-3.13.12-160000.1.1 * python313-dbm-3.13.12-160000.1.1 * python313-dbm-debuginfo-3.13.12-160000.1.1 * python313-debuginfo-3.13.12-160000.1.1 * python313-idle-3.13.12-160000.1.1 * libpython3_13-1_0-debuginfo-3.13.12-160000.1.1 * python313-curses-debuginfo-3.13.12-160000.1.1 * python313-debugsource-3.13.12-160000.1.1 * python313-tk-debuginfo-3.13.12-160000.1.1 * libpython3_13-1_0-3.13.12-160000.1.1 * python313-base-3.13.12-160000.1.1 * python313-base-debuginfo-3.13.12-160000.1.1 * python313-devel-debuginfo-3.13.12-160000.1.1 * python313-tk-3.13.12-160000.1.1 * python313-doc-3.13.12-160000.1.1 * python313-doc-devhelp-3.13.12-160000.1.1 * python313-curses-3.13.12-160000.1.1 * python313-core-debugsource-3.13.12-160000.1.1 * python313-devel-3.13.12-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * python313-x86-64-v3-3.13.12-160000.1.1 * libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 * libpython3_13-1_0-x86-64-v3-debuginfo-3.13.12-160000.1.1 * python313-x86-64-v3-debuginfo-3.13.12-160000.1.1 * python313-base-x86-64-v3-debuginfo-3.13.12-160000.1.1 * python313-base-x86-64-v3-3.13.12-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11468.html * https://www.suse.com/security/cve/CVE-2025-15282.html * https://www.suse.com/security/cve/CVE-2026-0672.html * https://www.suse.com/security/cve/CVE-2026-0865.html * https://www.suse.com/security/cve/CVE-2026-1299.html * https://bugzilla.suse.com/show_bug.cgi?id=1257029 * https://bugzilla.suse.com/show_bug.cgi?id=1257031 * https://bugzilla.suse.com/show_bug.cgi?id=1257042 * https://bugzilla.suse.com/show_bug.cgi?id=1257046 * https://bugzilla.suse.com/show_bug.cgi?id=1257181 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:34 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:34 -0000 Subject: SUSE-SU-2026:20580-1: important: Security update for cockpit-repos Message-ID: <177272913444.1967.16930593237945783393@df8f6ab05d2e> # Security update for cockpit-repos Announcement ID: SUSE-SU-2026:20580-1 Release Date: 2026-02-18T11:26:24Z Rating: important References: * bsc#1255425 * bsc#1257325 Cross-References: * CVE-2025-13465 * CVE-2025-64718 CVSS scores: * CVE-2025-13465 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13465 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-13465 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13465 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-64718 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-64718 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2025-64718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for cockpit-repos fixes the following issues: Update to version 4.7. Security issues fixed: * CVE-2025-13465: prototype pollution in the _.unset and_.omit functions can lead to deletion of methods from global (bsc#1257325). * CVE-2025-64718: js-yaml prototype pollution in merge (bsc#1255425). Other updates and bugfixes: * version update to 4.7 * Translation updates * version update to 4.6: * Translation updates * Dependency updates * Fix translations pot file not being update * version update to 4.5: * Dependency updates * version update to 4.4: * Translation updates * Dependency updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-296=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-296=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * cockpit-repos-4.7-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * cockpit-repos-4.7-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13465.html * https://www.suse.com/security/cve/CVE-2025-64718.html * https://bugzilla.suse.com/show_bug.cgi?id=1255425 * https://bugzilla.suse.com/show_bug.cgi?id=1257325 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:37 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:37 -0000 Subject: SUSE-RU-2026:20579-1: moderate: Recommended update for ibmtss Message-ID: <177272913728.1967.8428206826043531564@df8f6ab05d2e> # Recommended update for ibmtss Announcement ID: SUSE-RU-2026:20579-1 Release Date: 2026-02-18T10:09:12Z Rating: moderate References: * bsc#1239985 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for ibmtss fixes the following issues: * Remove test data: certs and keys (bsc#1239985) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-295=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-295=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libibmtss2-2.4.1-160000.3.1 * ibmtss-2.4.1-160000.3.1 * ibmtss-debuginfo-2.4.1-160000.3.1 * ibmtss-devel-2.4.1-160000.3.1 * ibmtss-debugsource-2.4.1-160000.3.1 * libibmtss2-debuginfo-2.4.1-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * ibmtss-base-2.4.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libibmtss2-2.4.1-160000.3.1 * ibmtss-2.4.1-160000.3.1 * ibmtss-debuginfo-2.4.1-160000.3.1 * ibmtss-devel-2.4.1-160000.3.1 * ibmtss-debugsource-2.4.1-160000.3.1 * libibmtss2-debuginfo-2.4.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * ibmtss-base-2.4.1-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239985 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:40 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:40 -0000 Subject: SUSE-SU-2026:20578-1: moderate: Security update for docker Message-ID: <177272914019.1967.18325000064379714833@df8f6ab05d2e> # Security update for docker Announcement ID: SUSE-SU-2026:20578-1 Release Date: 2026-02-18T09:41:33Z Rating: moderate References: * bsc#1253904 Cross-References: * CVE-2025-58181 CVSS scores: * CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-58181 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for docker fixes the following issues: * CVE-2025-58181: not validating the number of mechanisms can cause unlimited memory consumption (bsc#1253904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-294=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-294=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * docker-buildx-0.29.0-160000.5.1 * docker-28.5.1_ce-160000.5.1 * docker-buildx-debuginfo-0.29.0-160000.5.1 * docker-debuginfo-28.5.1_ce-160000.5.1 * SUSE Linux Enterprise Server 16.0 (noarch) * docker-zsh-completion-28.5.1_ce-160000.5.1 * docker-fish-completion-28.5.1_ce-160000.5.1 * docker-bash-completion-28.5.1_ce-160000.5.1 * docker-rootless-extras-28.5.1_ce-160000.5.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * docker-buildx-0.29.0-160000.5.1 * docker-28.5.1_ce-160000.5.1 * docker-buildx-debuginfo-0.29.0-160000.5.1 * docker-debuginfo-28.5.1_ce-160000.5.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * docker-zsh-completion-28.5.1_ce-160000.5.1 * docker-fish-completion-28.5.1_ce-160000.5.1 * docker-bash-completion-28.5.1_ce-160000.5.1 * docker-rootless-extras-28.5.1_ce-160000.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58181.html * https://bugzilla.suse.com/show_bug.cgi?id=1253904 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:43 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:43 -0000 Subject: SUSE-RU-2026:20577-1: moderate: Recommended update for LibVNCServer Message-ID: <177272914301.1967.12935320647562965705@df8f6ab05d2e> # Recommended update for LibVNCServer Announcement ID: SUSE-RU-2026:20577-1 Release Date: 2026-02-17T14:52:02Z Rating: moderate References: * bsc#1247887 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for LibVNCServer fixes the following issues: * Fix devel package dependencies (bsc#1247887) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-293=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-293=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * LibVNCServer-debugsource-0.9.14-160000.3.1 * libvncclient1-debuginfo-0.9.14-160000.3.1 * libvncclient1-0.9.14-160000.3.1 * libvncserver1-0.9.14-160000.3.1 * libvncserver1-debuginfo-0.9.14-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * LibVNCServer-debugsource-0.9.14-160000.3.1 * libvncclient1-debuginfo-0.9.14-160000.3.1 * libvncclient1-0.9.14-160000.3.1 * libvncserver1-0.9.14-160000.3.1 * libvncserver1-debuginfo-0.9.14-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1247887 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:55 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:55 -0000 Subject: SUSE-SU-2026:20576-1: important: Security update for cockpit-machines, cockpit Message-ID: <177272915568.1967.18186505685737070335@df8f6ab05d2e> # Security update for cockpit-machines, cockpit Announcement ID: SUSE-SU-2026:20576-1 Release Date: 2026-02-17T14:20:44Z Rating: important References: * bsc#1221342 * bsc#1236149 * bsc#1239759 * bsc#1248250 * bsc#1249828 * bsc#1249830 * bsc#1257324 * bsc#1257325 Cross-References: * CVE-2025-13465 CVSS scores: * CVE-2025-13465 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13465 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-13465 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13465 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability and has seven fixes can now be installed. ## Description: This update for cockpit-machines, cockpit fixes the following issues: * CVE-2025-13465: Update the lodash dependencie to avoid prototype pollution. (bsc#1257324) Changes in cockpit-machines: * Update to 346 * 346 * Performance improvements * Translation updates * 345 * New virtual machines don't get SPICE graphics anymore * Support for network port forwarding * Bug fixes and translation updates * Update to 344 * 344 * Port forwarding for user session VMs * "Shutdown and restart" action * Faster startup * 343 * Memory usage now shows numbers reported by the guest (RHEL-116731) * Update to 342 * 342 * Bug fixes and translation updates * 341 * Improved UX for Disks and Network interface tables * Bug fixes and translation updates * 340 * Use exclusive VNC connections with "Remote resizing" * Update to 339 * 339 * Serial consoles now keep their content and stay alive * No longer copies qemu.conf values into VM definitions * 338 * Translation and dependency updates * Detachable VNC console * Update to 337 * 337 * Bug fixes and translation updates * 336 * Graphical VNC and serial consoles improvements * Control VNC console resizing and scaling * Bug fixes and translation updates * 335 * Bug fixes and translation updates * 334 * Bug fixes and translation updates Changes in cockpit: * Update to 354 * changes since 351 * 354 * Convert documentation to AsciiDoc * Work around Firefox 146/147 bug (rhbz#2422331) * Bug fixes * 353 * Networking: Suggest prefix length and gateway address * Bug fixes and translation updates * 352 * Shown a warning if the last shutdown/reboot was unclean * Bug fixes and translation updates * Update to 351 * Changes since 349 * 351 * Firewall ports can be deleted individually * 350 * networking: fix renaming of bridges and other groups (RHEL-117883) * bridge: fix OpenSSH_10.2p1 host key detection * Update to 349 * Changes since 346 * 349 * Package manifests: add any test * Bug fixes and translation updates * 348 * Bug fixes and translation updates * 347 * Site-specific branding support * Update to 346 * Changes since 344 * 346 * Support branding Cockpit pages * Storage: Support for Stratis "V2" pools * 345 * Translation and dependency updates * Shorter IPv6 addresses * IPv6 addresses for WireGuard * Update to 344 * Changes since 340 * 344 * Bug fixes and translation updates * 343 * login: Improve error message for unsupported shells * cockpit: Handle file access issues with files in machines.d * Translation updates * 342 * systemd: ensure update() is called at least once for tuned-dialog * Translation updates * 341 * services: show link to podman page for quadlets * Bug fixes and translation updates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-291=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-291=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * cockpit-system-354-160000.1.1 * cockpit-doc-354-160000.1.1 * cockpit-kdump-354-160000.1.1 * cockpit-machines-346-160000.1.1 * cockpit-firewalld-354-160000.1.1 * cockpit-packagekit-354-160000.1.1 * cockpit-storaged-354-160000.1.1 * cockpit-selinux-354-160000.1.1 * cockpit-networkmanager-354-160000.1.1 * cockpit-bridge-354-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * cockpit-ws-debuginfo-354-160000.1.1 * cockpit-debugsource-354-160000.1.1 * cockpit-ws-selinux-354-160000.1.1 * cockpit-devel-354-160000.1.1 * cockpit-ws-354-160000.1.1 * cockpit-354-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * cockpit-system-354-160000.1.1 * cockpit-doc-354-160000.1.1 * cockpit-kdump-354-160000.1.1 * cockpit-machines-346-160000.1.1 * cockpit-firewalld-354-160000.1.1 * cockpit-packagekit-354-160000.1.1 * cockpit-storaged-354-160000.1.1 * cockpit-selinux-354-160000.1.1 * cockpit-networkmanager-354-160000.1.1 * cockpit-bridge-354-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * cockpit-ws-debuginfo-354-160000.1.1 * cockpit-debugsource-354-160000.1.1 * cockpit-ws-selinux-354-160000.1.1 * cockpit-devel-354-160000.1.1 * cockpit-ws-354-160000.1.1 * cockpit-354-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13465.html * https://bugzilla.suse.com/show_bug.cgi?id=1221342 * https://bugzilla.suse.com/show_bug.cgi?id=1236149 * https://bugzilla.suse.com/show_bug.cgi?id=1239759 * https://bugzilla.suse.com/show_bug.cgi?id=1248250 * https://bugzilla.suse.com/show_bug.cgi?id=1249828 * https://bugzilla.suse.com/show_bug.cgi?id=1249830 * https://bugzilla.suse.com/show_bug.cgi?id=1257324 * https://bugzilla.suse.com/show_bug.cgi?id=1257325 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:45:58 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:45:58 -0000 Subject: SUSE-SU-2026:20575-1: important: Security update for wicked2nm Message-ID: <177272915870.1967.9130707935574230118@df8f6ab05d2e> # Security update for wicked2nm Announcement ID: SUSE-SU-2026:20575-1 Release Date: 2026-02-17T14:08:05Z Rating: important References: * bsc#1257911 Cross-References: * CVE-2026-25727 CVSS scores: * CVE-2026-25727 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25727 ( NVD ): 6.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-25727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for wicked2nm fixes the following issues: * Update to version 1.4.1 * CVE-2026-25727: time: parsing of user-provided input by the RFC 2822 date parser can lead to stack exhaustion (bsc#1257908). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-292=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-292=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * wicked2nm-debuginfo-1.4.1-160000.1.1 * wicked2nm-debugsource-1.4.1-160000.1.1 * wicked2nm-1.4.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * wicked2nm-debuginfo-1.4.1-160000.1.1 * wicked2nm-debugsource-1.4.1-160000.1.1 * wicked2nm-1.4.1-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2026-25727.html * https://bugzilla.suse.com/show_bug.cgi?id=1257911 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:46:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:46:04 -0000 Subject: SUSE-SU-2026:20574-1: critical: Security update for golang-github-prometheus-prometheus Message-ID: <177272916458.1967.18423976613871461541@df8f6ab05d2e> # Security update for golang-github-prometheus-prometheus Announcement ID: SUSE-SU-2026:20574-1 Release Date: 2026-02-17T09:54:15Z Rating: critical References: * bsc#1257442 * bsc#1257841 * bsc#1257897 Cross-References: * CVE-2025-61140 * CVE-2026-1615 * CVE-2026-25547 CVSS scores: * CVE-2025-61140 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-61140 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-61140 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-1615 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-1615 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-1615 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-1615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-25547 ( NVD ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for golang-github-prometheus-prometheus fixes the following issues: * CVE-2026-25547: Fixed an unbounded brace range expansion leading to excessive CPU and memory consumption. (bsc#1257841) * CVE-2026-1615: Fixed arbitrary code injection due to unsafe evaluation of user-supplied JSON Path expressions in jsonpath. (bsc#1257897) * CVE-2025-61140: Fixed a function vulnerable to prototype pollution in jsonpath. (bsc#1257442) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-290=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-290=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * golang-github-prometheus-prometheus-3.5.0-160000.2.1 * golang-github-prometheus-prometheus-debuginfo-3.5.0-160000.2.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * golang-github-prometheus-prometheus-3.5.0-160000.2.1 * golang-github-prometheus-prometheus-debuginfo-3.5.0-160000.2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61140.html * https://www.suse.com/security/cve/CVE-2026-1615.html * https://www.suse.com/security/cve/CVE-2026-25547.html * https://bugzilla.suse.com/show_bug.cgi?id=1257442 * https://bugzilla.suse.com/show_bug.cgi?id=1257841 * https://bugzilla.suse.com/show_bug.cgi?id=1257897 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:46:06 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:46:06 -0000 Subject: SUSE-OU-2026:20572-1: moderate: Optional update for nodejs24 Message-ID: <177272916699.1967.17498789740936273029@df8f6ab05d2e> # Optional update for nodejs24 Announcement ID: SUSE-OU-2026:20572-1 Release Date: 2026-02-16T18:46:53Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for nodejs24 fixes the following issues: nodejs24 is added in version 24.12.0. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-288=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-288=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * nodejs24-debugsource-24.13.0-160000.1.1 * nodejs24-debuginfo-24.13.0-160000.1.1 * nodejs24-24.13.0-160000.1.1 * corepack24-24.13.0-160000.1.1 * nodejs24-devel-24.13.0-160000.1.1 * npm24-24.13.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * nodejs24-docs-24.13.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * nodejs24-debugsource-24.13.0-160000.1.1 * nodejs24-debuginfo-24.13.0-160000.1.1 * nodejs24-24.13.0-160000.1.1 * corepack24-24.13.0-160000.1.1 * nodejs24-devel-24.13.0-160000.1.1 * npm24-24.13.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * nodejs24-docs-24.13.0-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 16:46:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 16:46:05 -0000 Subject: SUSE-OU-2026:20573-1: moderate: Optional update for go1.26 Message-ID: <177272916590.1967.17820614313940314219@df8f6ab05d2e> # Optional update for go1.26 Announcement ID: SUSE-OU-2026:20573-1 Release Date: 2026-02-17T08:54:31Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for go1.26 fixes the following issues: This update adds go1.26. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-289=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-289=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * go1.26-race-1.26rc3-160000.1.1 * go1.26-doc-1.26rc3-160000.1.1 * go1.26-1.26rc3-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * go1.26-libstd-1.26rc3-160000.1.1 * go1.26-debuginfo-1.26rc3-160000.1.1 * go1.26-libstd-debuginfo-1.26rc3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * go1.26-race-1.26rc3-160000.1.1 * go1.26-doc-1.26rc3-160000.1.1 * go1.26-1.26rc3-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * go1.26-libstd-1.26rc3-160000.1.1 * go1.26-debuginfo-1.26rc3-160000.1.1 * go1.26-libstd-debuginfo-1.26rc3-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:06 -0000 Subject: SUSE-SU-2026:0831-1: important: Security update for openvpn Message-ID: <177274260614.2224.14901955693889720572@13ea24840d99> # Security update for openvpn Announcement ID: SUSE-SU-2026:0831-1 Release Date: 2026-03-05T15:18:18Z Rating: important References: * bsc#1254486 Cross-References: * CVE-2025-13086 CVSS scores: * CVE-2025-13086 ( SUSE ): 4.6 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13086 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13086 ( NVD ): 4.6 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13086 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * Updated to version 2.6.10 that fixes: * CVE-2025-13086: improper validation of IP addresses that can cause denial of service (bsc#1254486) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-831=1 openSUSE-SLE-15.6-2026-831=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-831=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-831=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-831=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * openvpn-dco-devel-2.6.10-150600.3.20.1 * openvpn-devel-2.6.10-150600.3.20.1 * openvpn-2.6.10-150600.3.20.1 * openvpn-debugsource-2.6.10-150600.3.20.1 * openvpn-down-root-plugin-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-2.6.10-150600.3.20.1 * openvpn-dco-debuginfo-2.6.10-150600.3.20.1 * openvpn-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-2.6.10-150600.3.20.1 * openvpn-down-root-plugin-debuginfo-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debugsource-2.6.10-150600.3.20.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openvpn-dco-devel-2.6.10-150600.3.20.1 * openvpn-devel-2.6.10-150600.3.20.1 * openvpn-2.6.10-150600.3.20.1 * openvpn-debugsource-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-2.6.10-150600.3.20.1 * openvpn-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debugsource-2.6.10-150600.3.20.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * openvpn-dco-devel-2.6.10-150600.3.20.1 * openvpn-devel-2.6.10-150600.3.20.1 * openvpn-2.6.10-150600.3.20.1 * openvpn-debugsource-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-2.6.10-150600.3.20.1 * openvpn-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debugsource-2.6.10-150600.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * openvpn-dco-devel-2.6.10-150600.3.20.1 * openvpn-devel-2.6.10-150600.3.20.1 * openvpn-2.6.10-150600.3.20.1 * openvpn-debugsource-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-2.6.10-150600.3.20.1 * openvpn-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-2.6.10-150600.3.20.1 * openvpn-auth-pam-plugin-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debuginfo-2.6.10-150600.3.20.1 * openvpn-dco-debugsource-2.6.10-150600.3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13086.html * https://bugzilla.suse.com/show_bug.cgi?id=1254486 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:09 -0000 Subject: SUSE-SU-2026:0830-1: important: Security update for ocaml Message-ID: <177274260944.2224.11099884105185234761@13ea24840d99> # Security update for ocaml Announcement ID: SUSE-SU-2026:0830-1 Release Date: 2026-03-05T15:17:46Z Rating: important References: * bsc#1258992 Cross-References: * CVE-2026-28364 CVSS scores: * CVE-2026-28364 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-28364 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-28364 ( NVD ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for ocaml fixes the following issues: * CVE-2026-28364: missing bounds validation in readblock() can lead to arbitrary code execution (bsc#1258992). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-830=1 SUSE-2026-830=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-830=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-830=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-830=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ocaml-debugsource-4.14.2-150600.3.3.1 * ocaml-4.14.2-150600.3.3.1 * ocaml-runtime-debuginfo-4.14.2-150600.3.3.1 * ocaml-debuginfo-4.14.2-150600.3.3.1 * ocaml-ocamldoc-4.14.2-150600.3.3.1 * ocaml-source-4.14.2-150600.3.3.1 * ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1 * ocaml-compiler-libs-4.14.2-150600.3.3.1 * ocaml-compiler-libs-devel-4.14.2-150600.3.3.1 * ocaml-runtime-4.14.2-150600.3.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ocaml-debugsource-4.14.2-150600.3.3.1 * ocaml-4.14.2-150600.3.3.1 * ocaml-runtime-debuginfo-4.14.2-150600.3.3.1 * ocaml-debuginfo-4.14.2-150600.3.3.1 * ocaml-ocamldoc-4.14.2-150600.3.3.1 * ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1 * ocaml-compiler-libs-4.14.2-150600.3.3.1 * ocaml-compiler-libs-devel-4.14.2-150600.3.3.1 * ocaml-runtime-4.14.2-150600.3.3.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * ocaml-debugsource-4.14.2-150600.3.3.1 * ocaml-4.14.2-150600.3.3.1 * ocaml-runtime-debuginfo-4.14.2-150600.3.3.1 * ocaml-debuginfo-4.14.2-150600.3.3.1 * ocaml-ocamldoc-4.14.2-150600.3.3.1 * ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1 * ocaml-compiler-libs-4.14.2-150600.3.3.1 * ocaml-compiler-libs-devel-4.14.2-150600.3.3.1 * ocaml-runtime-4.14.2-150600.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * ocaml-debugsource-4.14.2-150600.3.3.1 * ocaml-4.14.2-150600.3.3.1 * ocaml-runtime-debuginfo-4.14.2-150600.3.3.1 * ocaml-debuginfo-4.14.2-150600.3.3.1 * ocaml-ocamldoc-4.14.2-150600.3.3.1 * ocaml-ocamldoc-debuginfo-4.14.2-150600.3.3.1 * ocaml-compiler-libs-4.14.2-150600.3.3.1 * ocaml-compiler-libs-devel-4.14.2-150600.3.3.1 * ocaml-runtime-4.14.2-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2026-28364.html * https://bugzilla.suse.com/show_bug.cgi?id=1258992 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:14 -0000 Subject: SUSE-SU-2026:0829-1: moderate: Security update for gnutls Message-ID: <177274261452.2224.11341188032532660429@13ea24840d99> # Security update for gnutls Announcement ID: SUSE-SU-2026:0829-1 Release Date: 2026-03-05T15:17:14Z Rating: moderate References: * bsc#1257960 * bsc#1258083 * jsc#PED-15752 * jsc#PED-15753 Cross-References: * CVE-2025-14831 CVSS scores: * CVE-2025-14831 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-14831 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-14831 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability, contains two features and has one security fix can now be installed. ## Description: This update for gnutls fixes the following issues: Security issue: * CVE-2025-14831: excessive resource consumption when verifying specially crafted malicious certificates containing a large number of name constraints and subject alternative names (bsc#1257960). Other updates and bugfixes: * update libgnutls package to avoid binder getting calculated with SHA256 (bsc#1258083, jsc#PED-15752, jsc#PED-15753). * lib/psk: Add gnutls_psk_allocate_{client,server}_credentials2 * tests/psk-file: Add testing for _credentials2 functions * lib/psk: add null check for binder algo * pre_shared_key: fix memleak when retrying with different binder algo * pre_shared_key: add null check on pskcred ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-829=1 openSUSE-SLE-15.6-2026-829=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-829=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgnutlsxx-devel-3.8.3-150600.4.17.1 * libgnutlsxx30-3.8.3-150600.4.17.1 * libgnutlsxx30-debuginfo-3.8.3-150600.4.17.1 * gnutls-3.8.3-150600.4.17.1 * gnutls-debugsource-3.8.3-150600.4.17.1 * libgnutls-devel-3.8.3-150600.4.17.1 * libgnutls30-debuginfo-3.8.3-150600.4.17.1 * gnutls-debuginfo-3.8.3-150600.4.17.1 * libgnutls30-3.8.3-150600.4.17.1 * openSUSE Leap 15.6 (x86_64) * libgnutls30-32bit-3.8.3-150600.4.17.1 * libgnutls-devel-32bit-3.8.3-150600.4.17.1 * libgnutls30-32bit-debuginfo-3.8.3-150600.4.17.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgnutls30-64bit-3.8.3-150600.4.17.1 * libgnutls-devel-64bit-3.8.3-150600.4.17.1 * libgnutls30-64bit-debuginfo-3.8.3-150600.4.17.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libgnutlsxx-devel-3.8.3-150600.4.17.1 * libgnutlsxx30-3.8.3-150600.4.17.1 * libgnutlsxx30-debuginfo-3.8.3-150600.4.17.1 * gnutls-3.8.3-150600.4.17.1 * gnutls-debugsource-3.8.3-150600.4.17.1 * libgnutls-devel-3.8.3-150600.4.17.1 * libgnutls30-debuginfo-3.8.3-150600.4.17.1 * gnutls-debuginfo-3.8.3-150600.4.17.1 * libgnutls30-3.8.3-150600.4.17.1 * Basesystem Module 15-SP7 (x86_64) * libgnutls30-32bit-3.8.3-150600.4.17.1 * libgnutls30-32bit-debuginfo-3.8.3-150600.4.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14831.html * https://bugzilla.suse.com/show_bug.cgi?id=1257960 * https://bugzilla.suse.com/show_bug.cgi?id=1258083 * https://jira.suse.com/browse/PED-15752 * https://jira.suse.com/browse/PED-15753 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:17 -0000 Subject: SUSE-SU-2026:0828-1: moderate: Security update for python-Authlib Message-ID: <177274261782.2224.7239789126585154144@13ea24840d99> # Security update for python-Authlib Announcement ID: SUSE-SU-2026:0828-1 Release Date: 2026-03-05T15:17:02Z Rating: moderate References: * bsc#1256414 Cross-References: * CVE-2025-68158 CVSS scores: * CVE-2025-68158 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-68158 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2025-68158 ( NVD ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N * CVE-2025-68158 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-Authlib fixes the following issues: * CVE-2025-68158: Fixed 1-click account takeover in applications that use the Authlib library (bsc#1256414) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-828=1 openSUSE-SLE-15.6-2026-828=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-828=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-Authlib-1.3.1-150600.3.14.1 * Python 3 Module 15-SP7 (noarch) * python311-Authlib-1.3.1-150600.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68158.html * https://bugzilla.suse.com/show_bug.cgi?id=1256414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:20 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:20 -0000 Subject: SUSE-SU-2026:0827-1: important: Security update for glibc-livepatches Message-ID: <177274262094.2224.2626424434649032915@13ea24840d99> # Security update for glibc-livepatches Announcement ID: SUSE-SU-2026:0827-1 Release Date: 2026-03-05T15:16:50Z Rating: important References: * bsc#1256913 Cross-References: * CVE-2026-0861 CVSS scores: * CVE-2026-0861 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0861 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0861 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for glibc-livepatches fixes the following issues: * CVE-2026-0861: Fixed inadequate size check in the memalign suite may result in an integer overflow (bsc#1256913) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-827=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le x86_64) * glibc-livepatches-debuginfo-0.3-150700.10.4.1 * glibc-livepatches-0.3-150700.10.4.1 * glibc-livepatches-debugsource-0.3-150700.10.4.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0861.html * https://bugzilla.suse.com/show_bug.cgi?id=1256913 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:25 -0000 Subject: SUSE-SU-2026:0826-1: moderate: Security update for expat Message-ID: <177274262526.2224.14425712157150489143@13ea24840d99> # Security update for expat Announcement ID: SUSE-SU-2026:0826-1 Release Date: 2026-03-05T15:16:41Z Rating: moderate References: * bsc#1257144 * bsc#1257496 Cross-References: * CVE-2026-24515 * CVE-2026-25210 CVSS scores: * CVE-2026-24515 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-24515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-24515 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2026-24515 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-25210 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2026-25210 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L * CVE-2026-25210 ( NVD ): 6.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves two vulnerabilities can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2026-24515: Fixed a null dereference in XML_ExternalEntityParserCreate. (bsc#1257144) * CVE-2026-25210: Fixed an integer overflow in doContent. (bsc#1257496) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-826=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-826=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-826=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-826=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-826=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-826=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-826=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat-devel-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 * expat-2.7.1-150400.3.34.1 * openSUSE Leap 15.4 (x86_64) * libexpat-devel-32bit-2.7.1-150400.3.34.1 * expat-32bit-debuginfo-2.7.1-150400.3.34.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.34.1 * libexpat1-32bit-2.7.1-150400.3.34.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libexpat-devel-64bit-2.7.1-150400.3.34.1 * libexpat1-64bit-2.7.1-150400.3.34.1 * expat-64bit-debuginfo-2.7.1-150400.3.34.1 * libexpat1-64bit-debuginfo-2.7.1-150400.3.34.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat-devel-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 * expat-2.7.1-150400.3.34.1 * openSUSE Leap 15.6 (x86_64) * libexpat-devel-32bit-2.7.1-150400.3.34.1 * expat-32bit-debuginfo-2.7.1-150400.3.34.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.34.1 * libexpat1-32bit-2.7.1-150400.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libexpat1-debuginfo-2.7.1-150400.3.34.1 * expat-debugsource-2.7.1-150400.3.34.1 * expat-debuginfo-2.7.1-150400.3.34.1 * libexpat1-2.7.1-150400.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2026-24515.html * https://www.suse.com/security/cve/CVE-2026-25210.html * https://bugzilla.suse.com/show_bug.cgi?id=1257144 * https://bugzilla.suse.com/show_bug.cgi?id=1257496 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:28 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:28 -0000 Subject: SUSE-SU-2026:0825-1: low: Security update for php-composer2 Message-ID: <177274262826.2224.4985639152482261257@13ea24840d99> # Security update for php-composer2 Announcement ID: SUSE-SU-2026:0825-1 Release Date: 2026-03-05T15:16:19Z Rating: low References: * bsc#1255768 Cross-References: * CVE-2025-67746 CVSS scores: * CVE-2025-67746 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-67746 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-67746 ( NVD ): 1.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-67746 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for php-composer2 fixes the following issues: CVE-2025-67746: Fixed ANSI control characters injection in the terminal output of various Composer commands via attacker controlled remote sources. (bsc#1255768) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-825=1 openSUSE-SLE-15.6-2026-825=1 * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-825=1 ## Package List: * openSUSE Leap 15.6 (noarch) * php-composer2-2.6.4-150600.3.6.1 * Web and Scripting Module 15-SP7 (noarch) * php-composer2-2.6.4-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67746.html * https://bugzilla.suse.com/show_bug.cgi?id=1255768 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:31 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:31 -0000 Subject: SUSE-SU-2026:0824-1: moderate: Security update for openCryptoki Message-ID: <177274263122.2224.11465921246649988720@13ea24840d99> # Security update for openCryptoki Announcement ID: SUSE-SU-2026:0824-1 Release Date: 2026-03-05T15:16:08Z Rating: moderate References: * bsc#1257116 Cross-References: * CVE-2026-23893 CVSS scores: * CVE-2026-23893 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L * CVE-2026-23893 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for openCryptoki fixes the following issues: * CVE-2026-23893: Fixed privilege escalation or data exposure via symlink following (bsc#1257116) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-824=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-824=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-824=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openCryptoki-devel-3.17.0-150400.4.11.1 * openCryptoki-debugsource-3.17.0-150400.4.11.1 * openCryptoki-3.17.0-150400.4.11.1 * openCryptoki-debuginfo-3.17.0-150400.4.11.1 * openSUSE Leap 15.4 (i586) * openCryptoki-32bit-debuginfo-3.17.0-150400.4.11.1 * openCryptoki-32bit-3.17.0-150400.4.11.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * openCryptoki-64bit-debuginfo-3.17.0-150400.4.11.1 * openCryptoki-64bit-3.17.0-150400.4.11.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * openCryptoki-debugsource-3.17.0-150400.4.11.1 * openCryptoki-3.17.0-150400.4.11.1 * openCryptoki-debuginfo-3.17.0-150400.4.11.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * openCryptoki-debugsource-3.17.0-150400.4.11.1 * openCryptoki-3.17.0-150400.4.11.1 * openCryptoki-debuginfo-3.17.0-150400.4.11.1 ## References: * https://www.suse.com/security/cve/CVE-2026-23893.html * https://bugzilla.suse.com/show_bug.cgi?id=1257116 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:35 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:35 -0000 Subject: SUSE-RU-2026:0823-1: important: Recommended update for grub2 Message-ID: <177274263557.2224.15512295113696419629@13ea24840d99> # Recommended update for grub2 Announcement ID: SUSE-RU-2026:0823-1 Release Date: 2026-03-05T14:32:18Z Rating: important References: * bsc#1258022 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that has one fix can now be installed. ## Description: This update for grub2 fixes the following issues: * Backport upstream's commit to prevent BIOS assert (bsc#1258022) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-823=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-823=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-823=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-823=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-823=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * grub2-branding-upstream-2.06-150400.11.69.1 * grub2-debuginfo-2.06-150400.11.69.1 * grub2-2.06-150400.11.69.1 * openSUSE Leap 15.4 (aarch64 s390x x86_64 i586) * grub2-debugsource-2.06-150400.11.69.1 * openSUSE Leap 15.4 (noarch) * grub2-x86_64-xen-2.06-150400.11.69.1 * grub2-x86_64-xen-extras-2.06-150400.11.69.1 * grub2-i386-efi-debug-2.06-150400.11.69.1 * grub2-arm64-efi-2.06-150400.11.69.1 * grub2-arm64-efi-extras-2.06-150400.11.69.1 * grub2-arm64-efi-debug-2.06-150400.11.69.1 * grub2-i386-efi-extras-2.06-150400.11.69.1 * grub2-powerpc-ieee1275-2.06-150400.11.69.1 * grub2-i386-efi-2.06-150400.11.69.1 * grub2-x86_64-efi-extras-2.06-150400.11.69.1 * grub2-x86_64-efi-debug-2.06-150400.11.69.1 * grub2-i386-xen-extras-2.06-150400.11.69.1 * grub2-i386-xen-2.06-150400.11.69.1 * grub2-i386-pc-2.06-150400.11.69.1 * grub2-powerpc-ieee1275-debug-2.06-150400.11.69.1 * grub2-systemd-sleep-plugin-2.06-150400.11.69.1 * grub2-s390x-emu-extras-2.06-150400.11.69.1 * grub2-powerpc-ieee1275-extras-2.06-150400.11.69.1 * grub2-i386-pc-debug-2.06-150400.11.69.1 * grub2-snapper-plugin-2.06-150400.11.69.1 * grub2-i386-pc-extras-2.06-150400.11.69.1 * grub2-x86_64-efi-2.06-150400.11.69.1 * openSUSE Leap 15.4 (s390x) * grub2-s390x-emu-2.06-150400.11.69.1 * grub2-s390x-emu-debug-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.69.1 * grub2-debugsource-2.06-150400.11.69.1 * grub2-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.69.1 * grub2-snapper-plugin-2.06-150400.11.69.1 * grub2-i386-pc-2.06-150400.11.69.1 * grub2-arm64-efi-2.06-150400.11.69.1 * grub2-x86_64-efi-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.69.1 * grub2-debugsource-2.06-150400.11.69.1 * grub2-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * grub2-x86_64-xen-2.06-150400.11.69.1 * grub2-snapper-plugin-2.06-150400.11.69.1 * grub2-i386-pc-2.06-150400.11.69.1 * grub2-arm64-efi-2.06-150400.11.69.1 * grub2-x86_64-efi-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro 5.3 (s390x) * grub2-s390x-emu-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.69.1 * grub2-debugsource-2.06-150400.11.69.1 * grub2-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * grub2-x86_64-xen-2.06-150400.11.69.1 * grub2-snapper-plugin-2.06-150400.11.69.1 * grub2-i386-pc-2.06-150400.11.69.1 * grub2-arm64-efi-2.06-150400.11.69.1 * grub2-x86_64-efi-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * grub2-debuginfo-2.06-150400.11.69.1 * grub2-debugsource-2.06-150400.11.69.1 * grub2-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * grub2-x86_64-xen-2.06-150400.11.69.1 * grub2-snapper-plugin-2.06-150400.11.69.1 * grub2-i386-pc-2.06-150400.11.69.1 * grub2-arm64-efi-2.06-150400.11.69.1 * grub2-x86_64-efi-2.06-150400.11.69.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * grub2-s390x-emu-2.06-150400.11.69.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1258022 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Mar 5 20:30:38 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 05 Mar 2026 20:30:38 -0000 Subject: SUSE-RU-2026:0822-1: important: Recommended update for grub2 Message-ID: <177274263842.2224.18022282611167484831@13ea24840d99> # Recommended update for grub2 Announcement ID: SUSE-RU-2026:0822-1 Release Date: 2026-03-05T14:31:49Z Rating: important References: * bsc#1258022 Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for grub2 fixes the following issues: * Backport upstream's commit to prevent BIOS assert (bsc#1258022) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-822=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * grub2-x86_64-efi-2.02-196.1 * grub2-debuginfo-2.02-196.1 * grub2-2.02-196.1 * grub2-i386-pc-2.02-196.1 * grub2-debugsource-2.02-196.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * grub2-systemd-sleep-plugin-2.02-196.1 * grub2-x86_64-xen-2.02-196.1 * grub2-snapper-plugin-2.02-196.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1258022 -------------- next part -------------- An HTML attachment was scrubbed... URL: