SUSE alert SUSE-SU-2026:0293-1 (kernel)
| From: | OPENSUSE-SECURITY-UPDATES <null@suse.de> | |
| To: | security-announce@lists.opensuse.org | |
| Subject: | SUSE-SU-2026:0293-1: important: Security update for the Linux Kernel | |
| Date: | Mon, 26 Jan 2026 16:34:13 -0000 | |
| Message-ID: | <176944525337.5993.4192875564894798679@smelt2.prg2.suse.org> | |
| Archive-link: | Article |
# Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0293-1 Release Date: 2026-01-26T11:37:04Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1194869 * bsc#1214635 * bsc#1214847 * bsc#1215146 * bsc#1215211 * bsc#1215344 * bsc#1216062 * bsc#1216436 * bsc#1219165 * bsc#1220419 * bsc#1223731 * bsc#1234163 * bsc#1245193 * bsc#1245449 * bsc#1246328 * bsc#1247500 * bsc#1248886 * bsc#1249256 * bsc#1250334 * bsc#1252046 * bsc#1252342 * bsc#1252686 * bsc#1252776 * bsc#1252808 * bsc#1252824 * bsc#1252861 * bsc#1252919 * bsc#1252973 * bsc#1253155 * bsc#1253262 * bsc#1253342 * bsc#1253386 * bsc#1253402 * bsc#1253408 * bsc#1253413 * bsc#1253442 * bsc#1253458 * bsc#1253463 * bsc#1253647 * bsc#1254119 * bsc#1254126 * bsc#1254373 * bsc#1254518 * bsc#1254520 * bsc#1254599 * bsc#1254606 * bsc#1254611 * bsc#1254613 * bsc#1254615 * bsc#1254621 * bsc#1254623 * bsc#1254624 * bsc#1254626 * bsc#1254648 * bsc#1254649 * bsc#1254653 * bsc#1254655 * bsc#1254657 * bsc#1254660 * bsc#1254661 * bsc#1254663 * bsc#1254669 * bsc#1254677 * bsc#1254678 * bsc#1254688 * bsc#1254690 * bsc#1254691 * bsc#1254693 * bsc#1254695 * bsc#1254698 * bsc#1254701 * bsc#1254704 * bsc#1254705 * bsc#1254707 * bsc#1254712 * bsc#1254715 * bsc#1254717 * bsc#1254723 * bsc#1254724 * bsc#1254732 * bsc#1254733 * bsc#1254737 * bsc#1254739 * bsc#1254742 * bsc#1254743 * bsc#1254749 * bsc#1254750 * bsc#1254753 * bsc#1254754 * bsc#1254758 * bsc#1254761 * bsc#1254762 * bsc#1254765 * bsc#1254782 * bsc#1254791 * bsc#1254793 * bsc#1254795 * bsc#1254796 * bsc#1254797 * bsc#1254798 * bsc#1254813 * bsc#1254828 * bsc#1254829 * bsc#1254832 * bsc#1254840 * bsc#1254843 * bsc#1254847 * bsc#1254850 * bsc#1254851 * bsc#1254858 * bsc#1254860 * bsc#1254894 * bsc#1254918 * bsc#1254957 * bsc#1254959 * bsc#1254983 * bsc#1255005 * bsc#1255009 * bsc#1255026 * bsc#1255033 * bsc#1255034 * bsc#1255035 * bsc#1255041 * bsc#1255046 * bsc#1255057 * bsc#1255062 * bsc#1255064 * bsc#1255065 * bsc#1255068 * bsc#1255072 * bsc#1255075 * bsc#1255077 * bsc#1255083 * bsc#1255092 * bsc#1255094 * bsc#1255100 * bsc#1255122 * bsc#1255135 * bsc#1255146 * bsc#1255149 * bsc#1255152 * bsc#1255154 * bsc#1255155 * bsc#1255163 * bsc#1255167 * bsc#1255169 * bsc#1255171 * bsc#1255182 * bsc#1255187 * bsc#1255190 * bsc#1255193 * bsc#1255197 * bsc#1255199 * bsc#1255202 * bsc#1255203 * bsc#1255206 * bsc#1255209 * bsc#1255218 * bsc#1255221 * bsc#1255233 * bsc#1255245 * bsc#1255246 * bsc#1255251 * bsc#1255252 * bsc#1255253 * bsc#1255259 * bsc#1255274 * bsc#1255276 * bsc#1255279 * bsc#1255280 * bsc#1255281 * bsc#1255325 * bsc#1255329 * bsc#1255351 * bsc#1255415 * bsc#1255480 * bsc#1255483 * bsc#1255489 * bsc#1255493 * bsc#1255495 * bsc#1255505 * bsc#1255538 * bsc#1255540 * bsc#1255545 * bsc#1255549 * bsc#1255550 * bsc#1255553 * bsc#1255557 * bsc#1255558 * bsc#1255563 * bsc#1255564 * bsc#1255570 * bsc#1255578 * bsc#1255579 * bsc#1255580 * bsc#1255583 * bsc#1255591 * bsc#1255601 * bsc#1255603 * bsc#1255605 * bsc#1255611 * bsc#1255616 * bsc#1255617 * bsc#1255618 * bsc#1255621 * bsc#1255628 * bsc#1255629 * bsc#1255630 * bsc#1255632 * bsc#1255636 * bsc#1255688 * bsc#1255691 * bsc#1255702 * bsc#1255704 * bsc#1255706 * bsc#1255722 * bsc#1255758 * bsc#1255759 * bsc#1255760 * bsc#1255763 * bsc#1255769 * bsc#1255770 * bsc#1255772 * bsc#1255774 * bsc#1255775 * bsc#1255776 * bsc#1255780 * bsc#1255785 * bsc#1255786 * bsc#1255789 * bsc#1255790 * bsc#1255792 * bsc#1255793 * bsc#1255795 * bsc#1255798 * bsc#1255800 * bsc#1255801 * bsc#1255806 * bsc#1255807 * bsc#1255809 * bsc#1255810 * bsc#1255812 * bsc#1255814 * bsc#1255820 * bsc#1255838 * bsc#1255842 * bsc#1255843 * bsc#1255872 * bsc#1255875 * bsc#1255879 * bsc#1255883 * bsc#1255884 * bsc#1255886 * bsc#1255888 * bsc#1255890 * bsc#1255891 * bsc#1255892 * bsc#1255899 * bsc#1255902 * bsc#1255907 * bsc#1255911 * bsc#1255915 * bsc#1255918 * bsc#1255921 * bsc#1255924 * bsc#1255925 * bsc#1255931 * bsc#1255932 * bsc#1255934 * bsc#1255943 * bsc#1255944 * bsc#1255949 * bsc#1255951 * bsc#1255952 * bsc#1255955 * bsc#1255957 * bsc#1255961 * bsc#1255963 * bsc#1255964 * bsc#1255967 * bsc#1255974 * bsc#1255978 * bsc#1255984 * bsc#1255988 * bsc#1255990 * bsc#1255992 * bsc#1255993 * bsc#1255994 * bsc#1255996 * bsc#1256033 * bsc#1256034 * bsc#1256045 * bsc#1256050 * bsc#1256058 * bsc#1256071 * bsc#1256074 * bsc#1256081 * bsc#1256082 * bsc#1256083 * bsc#1256084 * bsc#1256085 * bsc#1256090 * bsc#1256093 * bsc#1256094 * bsc#1256095 * bsc#1256096 * bsc#1256099 * bsc#1256100 * bsc#1256104 * bsc#1256106 * bsc#1256107 * bsc#1256117 * bsc#1256119 * bsc#1256121 * bsc#1256145 * bsc#1256153 * bsc#1256178 * bsc#1256197 * bsc#1256231 * bsc#1256233 * bsc#1256234 * bsc#1256238 * bsc#1256263 * bsc#1256267 * bsc#1256268 * bsc#1256271 * bsc#1256273 * bsc#1256274 * bsc#1256279 * bsc#1256285 * bsc#1256291 * bsc#1256292 * bsc#1256300 * bsc#1256301 * bsc#1256302 * bsc#1256335 * bsc#1256348 * bsc#1256351 * bsc#1256354 * bsc#1256358 * bsc#1256361 * bsc#1256364 * bsc#1256367 * bsc#1256368 * bsc#1256369 * bsc#1256370 * bsc#1256371 * bsc#1256373 * bsc#1256375 * bsc#1256379 * bsc#1256387 * bsc#1256394 * bsc#1256395 * bsc#1256396 * bsc#1256528 * jsc#PED-14062 * jsc#PED-3527 * jsc#PED-4866 * jsc#PED-5065 * jsc#PED-5453 * jsc#PED-5475 * jsc#PED-5477 * jsc#PED-5511 * jsc#PED-6036 * jsc#PED-6041 * jsc#PED-6045 * jsc#PED-6067 * jsc#PED-6068 * jsc#PED-6069 * jsc#PED-6070 * jsc#PED-6071 * jsc#PED-6104 * jsc#PED-6114 * jsc#PED-6116 * jsc#PED-6120 * jsc#PED-6123 * jsc#PED-6811 * jsc#PED-7514 * jsc#PED-7542 * jsc#PED-7779 * jsc#PED-7780 Cross-References: * CVE-2023-42752 * CVE-2023-53743 * CVE-2023-53750 * CVE-2023-53752 * CVE-2023-53759 * CVE-2023-53762 * CVE-2023-53766 * CVE-2023-53768 * CVE-2023-53777 * CVE-2023-53778 * CVE-2023-53782 * CVE-2023-53784 * CVE-2023-53785 * CVE-2023-53787 * CVE-2023-53791 * CVE-2023-53792 * CVE-2023-53793 * CVE-2023-53794 * CVE-2023-53795 * CVE-2023-53797 * CVE-2023-53799 * CVE-2023-53807 * CVE-2023-53808 * CVE-2023-53813 * CVE-2023-53815 * CVE-2023-53819 * CVE-2023-53821 * CVE-2023-53823 * CVE-2023-53825 * CVE-2023-53828 * CVE-2023-53831 * CVE-2023-53834 * CVE-2023-53836 * CVE-2023-53839 * CVE-2023-53841 * CVE-2023-53842 * CVE-2023-53843 * CVE-2023-53844 * CVE-2023-53846 * CVE-2023-53847 * CVE-2023-53848 * CVE-2023-53850 * CVE-2023-53851 * CVE-2023-53852 * CVE-2023-53855 * CVE-2023-53856 * CVE-2023-53857 * CVE-2023-53858 * CVE-2023-53860 * CVE-2023-53861 * CVE-2023-53863 * CVE-2023-53864 * CVE-2023-53865 * CVE-2023-53989 * CVE-2023-53992 * CVE-2023-53994 * CVE-2023-53995 * CVE-2023-53996 * CVE-2023-53997 * CVE-2023-53998 * CVE-2023-53999 * CVE-2023-54000 * CVE-2023-54001 * CVE-2023-54005 * CVE-2023-54006 * CVE-2023-54008 * CVE-2023-54014 * CVE-2023-54016 * CVE-2023-54017 * CVE-2023-54019 * CVE-2023-54022 * CVE-2023-54023 * CVE-2023-54025 * CVE-2023-54026 * CVE-2023-54027 * CVE-2023-54030 * CVE-2023-54031 * CVE-2023-54032 * CVE-2023-54035 * CVE-2023-54037 * CVE-2023-54038 * CVE-2023-54042 * CVE-2023-54045 * CVE-2023-54048 * CVE-2023-54049 * CVE-2023-54051 * CVE-2023-54052 * CVE-2023-54060 * CVE-2023-54064 * CVE-2023-54066 * CVE-2023-54067 * CVE-2023-54069 * CVE-2023-54070 * CVE-2023-54072 * CVE-2023-54076 * CVE-2023-54080 * CVE-2023-54081 * CVE-2023-54083 * CVE-2023-54088 * CVE-2023-54089 * CVE-2023-54091 * CVE-2023-54092 * CVE-2023-54093 * CVE-2023-54094 * CVE-2023-54095 * CVE-2023-54096 * CVE-2023-54099 * CVE-2023-54101 * CVE-2023-54104 * CVE-2023-54106 * CVE-2023-54112 * CVE-2023-54113 * CVE-2023-54115 * CVE-2023-54117 * CVE-2023-54121 * CVE-2023-54125 * CVE-2023-54127 * CVE-2023-54133 * CVE-2023-54134 * CVE-2023-54135 * CVE-2023-54136 * CVE-2023-54137 * CVE-2023-54140 * CVE-2023-54141 * CVE-2023-54142 * CVE-2023-54143 * CVE-2023-54145 * CVE-2023-54148 * CVE-2023-54149 * CVE-2023-54153 * CVE-2023-54154 * CVE-2023-54155 * CVE-2023-54156 * CVE-2023-54164 * CVE-2023-54166 * CVE-2023-54169 * CVE-2023-54170 * CVE-2023-54171 * CVE-2023-54172 * CVE-2023-54173 * CVE-2023-54177 * CVE-2023-54178 * CVE-2023-54179 * CVE-2023-54181 * CVE-2023-54183 * CVE-2023-54185 * CVE-2023-54189 * CVE-2023-54194 * CVE-2023-54201 * CVE-2023-54204 * CVE-2023-54207 * CVE-2023-54209 * CVE-2023-54210 * CVE-2023-54211 * CVE-2023-54215 * CVE-2023-54219 * CVE-2023-54220 * CVE-2023-54221 * CVE-2023-54223 * CVE-2023-54224 * CVE-2023-54225 * CVE-2023-54227 * CVE-2023-54229 * CVE-2023-54230 * CVE-2023-54235 * CVE-2023-54240 * CVE-2023-54241 * CVE-2023-54246 * CVE-2023-54247 * CVE-2023-54251 * CVE-2023-54253 * CVE-2023-54254 * CVE-2023-54255 * CVE-2023-54258 * CVE-2023-54261 * CVE-2023-54263 * CVE-2023-54264 * CVE-2023-54266 * CVE-2023-54267 * CVE-2023-54271 * CVE-2023-54276 * CVE-2023-54278 * CVE-2023-54281 * CVE-2023-54282 * CVE-2023-54283 * CVE-2023-54285 * CVE-2023-54289 * CVE-2023-54291 * CVE-2023-54292 * CVE-2023-54293 * CVE-2023-54296 * CVE-2023-54297 * CVE-2023-54299 * CVE-2023-54300 * CVE-2023-54302 * CVE-2023-54303 * CVE-2023-54304 * CVE-2023-54309 * CVE-2023-54312 * CVE-2023-54313 * CVE-2023-54314 * CVE-2023-54315 * CVE-2023-54316 * CVE-2023-54318 * CVE-2023-54319 * CVE-2023-54322 * CVE-2023-54324 * CVE-2023-54326 * CVE-2024-26944 * CVE-2025-38321 * CVE-2025-38728 * CVE-2025-39890 * CVE-2025-39977 * CVE-2025-40006 * CVE-2025-40024 * CVE-2025-40033 * CVE-2025-40042 * CVE-2025-40053 * CVE-2025-40081 * CVE-2025-40102 * CVE-2025-40134 * CVE-2025-40135 * CVE-2025-40153 * CVE-2025-40158 * CVE-2025-40167 * CVE-2025-40170 * CVE-2025-40178 * CVE-2025-40179 * CVE-2025-40187 * CVE-2025-40211 * CVE-2025-40215 * CVE-2025-40219 * CVE-2025-40220 * CVE-2025-40223 * CVE-2025-40233 * CVE-2025-40242 * CVE-2025-40244 * CVE-2025-40256 * CVE-2025-40258 * CVE-2025-40262 * CVE-2025-40263 * CVE-2025-40269 * CVE-2025-40272 * CVE-2025-40273 * CVE-2025-40275 * CVE-2025-40277 * CVE-2025-40280 * CVE-2025-40282 * CVE-2025-40283 * CVE-2025-40284 * CVE-2025-40288 * CVE-2025-40297 * CVE-2025-40301 * CVE-2025-40304 * CVE-2025-40306 * CVE-2025-40308 * CVE-2025-40309 * CVE-2025-40310 * CVE-2025-40311 * CVE-2025-40312 * CVE-2025-40314 * CVE-2025-40315 * CVE-2025-40316 * CVE-2025-40317 * CVE-2025-40318 * CVE-2025-40320 * CVE-2025-40321 * CVE-2025-40322 * CVE-2025-40323 * CVE-2025-40324 * CVE-2025-40328 * CVE-2025-40329 * CVE-2025-40331 * CVE-2025-40342 * CVE-2025-40343 * CVE-2025-40345 * CVE-2025-40349 * CVE-2025-40351 * CVE-2025-68168 * CVE-2025-68172 * CVE-2025-68176 * CVE-2025-68180 * CVE-2025-68183 * CVE-2025-68185 * CVE-2025-68192 * CVE-2025-68194 * CVE-2025-68195 * CVE-2025-68217 * CVE-2025-68218 * CVE-2025-68222 * CVE-2025-68233 * CVE-2025-68235 * CVE-2025-68237 * CVE-2025-68238 * CVE-2025-68244 * CVE-2025-68249 * CVE-2025-68252 * CVE-2025-68257 * CVE-2025-68258 * CVE-2025-68259 * CVE-2025-68286 * CVE-2025-68287 * CVE-2025-68289 * CVE-2025-68290 * CVE-2025-68303 * CVE-2025-68305 * CVE-2025-68307 * CVE-2025-68308 * CVE-2025-68312 * CVE-2025-68313 * CVE-2025-68328 * CVE-2025-68330 * CVE-2025-68331 * CVE-2025-68332 * CVE-2025-68335 * CVE-2025-68339 * CVE-2025-68345 * CVE-2025-68346 * CVE-2025-68347 * CVE-2025-68354 * CVE-2025-68362 * CVE-2025-68380 * CVE-2025-68724 * CVE-2025-68732 * CVE-2025-68734 * CVE-2025-68740 * CVE-2025-68746 * CVE-2025-68750 * CVE-2025-68753 * CVE-2025-68757 * CVE-2025-68758 * CVE-2025-68759 * CVE-2025-68765 * CVE-2025-68766 CVSS scores: * CVE-2023-42752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53759 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53766 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53777 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53782 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53782 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53784 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53794 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53841 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53841 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53995 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53995 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54016 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54016 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54017 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54023 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54030 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54030 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54042 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54072 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54076 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54080 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54080 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54083 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54091 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54092 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54095 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54099 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54101 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54125 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54125 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-54127 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54133 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54133 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54135 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54136 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54137 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54137 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54143 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54143 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54145 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54145 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54148 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2023-54149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54149 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54153 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54166 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54173 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54179 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54183 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54185 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54185 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54194 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54201 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54207 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54207 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54209 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54209 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54210 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54215 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54215 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54219 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54220 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54221 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54221 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54223 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54225 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54225 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54227 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54229 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54230 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54235 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54235 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54247 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54247 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54253 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54253 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-54254 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54255 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54255 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54261 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54264 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54266 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54267 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54271 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54278 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54278 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54282 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54282 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54283 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54283 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54285 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54285 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54289 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54291 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54292 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54293 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54296 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54297 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54297 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54300 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54302 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54303 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54309 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54312 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54312 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54316 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54316 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54318 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54322 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54324 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54324 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54326 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38321 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39890 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39977 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40158 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40167 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40170 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40170 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40179 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40179 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40211 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40211 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40215 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40219 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40242 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40269 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40280 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40282 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40282 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40283 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40283 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40284 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40284 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40297 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40301 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40301 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-40304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40306 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40309 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40310 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40311 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40314 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40314 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40322 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40322 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40323 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40323 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40342 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40342 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40343 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40343 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40345 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40345 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68168 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68183 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68194 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68307 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68307 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68313 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68313 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68328 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68328 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68330 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68331 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68331 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68339 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68339 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68347 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68347 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68732 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68734 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68740 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68746 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68750 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68750 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-68757 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68758 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68758 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68766 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68766 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 334 vulnerabilities, contains 26 features and has 23 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). * CVE-2025-39890: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (bsc#1250334). * CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046). * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). * CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861). * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). * CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458). * CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413). * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). * CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442). * CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647). * CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959). * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). * CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075). * CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843). * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). * CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187). * CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624). * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). * CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199). The following non security issues were fixed: * ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes). * ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes). * ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes). * ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git- fixes). * ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git- fixes). * ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes). * ALSA: uapi: Fix typo in asound.h comment (git-fixes). * ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes). * ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes). * ASoC: ak4458: Disable regulator when error happens (git-fixes). * ASoC: ak5558: Disable regulator when error happens (git-fixes). * ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes). * ASoC: fsl_xcvr: clear the channel status control memory (git-fixes). * ASoC: qcom: q6adm: the the copp device only during last instance (git- fixes). * ASoC: qcom: q6asm-dai: perform correct state check before closing (git- fixes). * ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git- fixes). * ASoC: stm32: sai: fix OF node leak on probe (git-fixes). * ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes). * ASoC: stm32: sai: fix device leak on probe (git-fixes). * Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes). * Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git- fixes). * Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git- fixes). * Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes). * Documentation: hid-alps: Fix packet format section headings (git-fixes). * Documentation: parport-lowlevel: Separate function listing code blocks (git- fixes). * HID: logitech-dj: Remove duplicate error logging (git-fixes). * HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git- fixes). * Input: cros_ec_keyb - fix an invalid memory access (stable-fixes). * Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes). * Input: goodix - add support for ACPI ID GDX9110 (stable-fixes). * KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git- fixes). * PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes). * PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes). * PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes). * Revert "mtd: rawnand: marvell: fix layouts" (git-fixes). * USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes). * USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes). * USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes). * USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes). * USB: serial: option: add Quectel RG255C (stable-fixes). * USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes). * USB: serial: option: add UNISOC UIS7720 (stable-fixes). * USB: serial: option: add support for Rolling RW101R-GL (stable-fixes). * USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes). * arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes). * arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes). * atm/fore200e: Fix possible data race in fore200e_open() (git-fixes). * atm: idt77252: Add missing `dma_map_error()` (stable-fixes). * backlight: led-bl: Add devlink to supplier LEDs (git-fixes). * backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes). * bs-upload-kernel: Fix cve branch uploads. * btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes). * can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes). * can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git- fixes). * can: sja1000: fix max irq loop handling (git-fixes). * can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git- fixes). * cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449). * cifs: after disabling multichannel, mark tcon for reconnect (git-fixes). * cifs: avoid redundant calls to disable multichannel (git-fixes). * cifs: cifs_pick_channel should try selecting active channels (git-fixes). * cifs: deal with the channel loading lag while picking channels (git-fixes). * cifs: dns resolution is needed only for primary channel (git-fixes). * cifs: do not disable interface polling on failure (git-fixes). * cifs: do not search for channel if server is terminating (git-fixes). * cifs: fix a pending undercount of srv_count (git-fixes). * cifs: fix lock ordering while disabling multichannel (git-fixes). * cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes). * cifs: fix use after free for iface while disabling secondary channels (git- fixes). * cifs: handle servers that still advertise multichannel after disabling (git- fixes). * cifs: handle when server starts supporting multichannel (git-fixes). * cifs: handle when server stops supporting multichannel (git-fixes). * cifs: make cifs_chan_update_iface() a void function (git-fixes). * cifs: make sure server interfaces are requested only for SMB3+ (git-fixes). * cifs: make sure that channel scaling is done only once (git-fixes). * cifs: reconnect worker should take reference on server struct unconditionally (git-fixes). * cifs: reset connections for all channels when reconnect requested (git- fixes). * cifs: reset iface weights when we cannot find a candidate (git-fixes). * cifs: serialize other channels when query server interfaces is pending (git- fixes). * cifs: update dstaddr whenever channel iface is updated (git-fixes). * clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes). * clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes). * clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes). * clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes). * comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes). * comedi: check device's attached status in compat ioctls (git-fixes). * comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes). * comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes). * cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git- fixes). * cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026). * crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes). * crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git- fixes). * crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes). * crypto: hisilicon/qm - restore original qos values (git-fixes). * crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes). * crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git- fixes). * dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes). * dm-verity: fix unreliable memory allocation (git-fixes). * dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386). * drivers/usb/dwc3: fix PCI parent check (git-fixes). * drm/amd/display: Check NULL before accessing (stable-fixes). * drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes). * drm/amd/display: Increase DPCD read retries (stable-fixes). * drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable- fixes). * drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable- fixes). * drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes). * drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes). * drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes). * drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes). * drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git- fixes). * drm/mgag200: Fix big-endian support (git-fixes). * drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes). * drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git- fixes). * drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes). * drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git- fixes). * drm/nouveau: restrict the flush page to a 32-bit address (git-fixes). * drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes). * drm/vgem-fence: Fix potential deadlock on release (git-fixes). * drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes). * drm: sti: fix device leaks at component probe (git-fixes). * efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git- fixes). * efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes). * fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git- fixes). * fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes). * fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes). * firmware: imx: scu-irq: fix OF node leak in (git-fixes). * firmware: stratix10-svc: Add mutex in stratix10 memory management (git- fixes). * firmware: stratix10-svc: fix bug in saving controller data (git-fixes). * firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git- fixes). * gpu: host1x: Fix race in syncpt alloc/free (git-fixes). * hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes). * hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes). * hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes). * hwmon: sy7636a: Fix regulator_enable resource leak on error path (git- fixes). * i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes). * i2c: i2c.h: fix a bad kernel-doc line (git-fixes). * i3c: master: svc: Prevent incomplete IBI transaction (git-fixes). * iio: accel: bmc150: Fix irq assumption regression (stable-fixes). * iio: accel: fix ADXL355 startup race condition (git-fixes). * iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes). * iio: core: Clean up device correctly on iio_device_alloc() failure (git- fixes). * iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes). * iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git- fixes). * iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git- fixes). * iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes). * ima: Handle error code returned by ima_filter_rule_match() (git-fixes). * intel_th: Fix error handling in intel_th_output_open (git-fixes). * ipmi: Fix handling of messages with provided receive message pointer (git- fixes). * ipmi: Rework user message limit handling (git-fixes). * irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes). * kconfig/mconf: Initialize the default locale at startup (stable-fixes). * kconfig/nconf: Initialize the default locale at startup (stable-fixes). * leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes). * leds: leds-lp50xx: Enable chip before any communication (git-fixes). * leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git- fixes). * leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes). * lib/vsprintf: Check pointer before dereferencing in time_and_date() (git- fixes). * mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes). * media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes). * media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes). * media: amphion: Cancel message work before releasing the VPU core (git- fixes). * media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973). * media: atomisp: Remove firmware_name module parameter (bsc#1252973). * media: cec: Fix debugfs leak on bus_register() failure (git-fixes). * media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes). * media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git- fixes). * media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git- fixes). * media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes). * media: pvrusb2: Fix incorrect variable used in trace message (git-fixes). * media: rc: st_rc: Fix reset control resource leak (git-fixes). * media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes). * media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes). * media: v4l2-mem2mem: Fix outdated documentation (git-fixes). * media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git- fixes). * media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git- fixes). * media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes). * media: vpif_capture: fix section mismatch (git-fixes). * media: vpif_display: fix section mismatch (git-fixes). * mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes). * mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes). * mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes). * mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes). * mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes). * most: usb: fix double free on late probe failure (git-fixes). * mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes). * mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes). * mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git- fixes). * mtd: nand: relax ECC parameter validation check (git-fixes). * mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes). * mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes). * net: phy: adin1100: Fix software power-down ready condition (git-fixes). * net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git- fixes). * net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git- fixes). * nvme: Use non zero KATO for persistent discovery connections (git-fixes). * orangefs: fix xattr related buffer overflow.. (git-fixes). * phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes). * pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes). * platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes). * platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git- fixes). * platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git- fixes). * platform/x86: intel: punit_ipc: fix memory corruption (git-fixes). * power: supply: apm_power: only unset own apm_get_power_status (git-fixes). * power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes). * power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes). * power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes). * power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes). * powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187). * powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029). * pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git- fixes). * regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes). * regulator: core: disable supply if enabling main regulator fails (git- fixes). * rpmsg: glink: fix rpmsg device leak (git-fixes). * rtc: gamecube: Check the return value of ioremap() (git-fixes). * scripts: teaapi: Add paging. * scrits: teaapi: Add list_repos. * scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). * scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). * serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes). * slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git- fixes). * smb3: add missing null server pointer check (git-fixes). * smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes). * smb: client: fix warning when reconnecting channel (git-fixes). * smb: client: introduce close_cached_dir_locked() (git-fixes). * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). * soc: amlogic: canvas: fix device leak on lookup (git-fixes). * soc: qcom: ocmem: fix device leak on lookup (git-fixes). * soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git- fixes). * spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes). * spi: bcm63xx: drop wrong casts in probe() (git-fixes). * spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git- fixes). * spi: tegra210-qspi: Remove cache operations (git-fixes). * spi: tegra210-quad: Add support for internal DMA (git-fixes). * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155). * spi: tegra210-quad: Fix timeout handling (bsc#1253155). * spi: tegra210-quad: Fix timeout handling (git-fixes). * spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155). * spi: tegra210-quad: Update dummy sequence configuration (git-fixes). * staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes). * thunderbolt: Add support for Intel Wildcat Lake (stable-fixes). * tracing: Fix access to trace_event_file (bsc#1254373). * uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes). * usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes). * usb: chaoskey: fix locking for O_NONBLOCK (git-fixes). * usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes). * usb: dwc2: fix hang during suspend if set as peripheral (git-fixes). * usb: dwc3: Abort suspend on soft disconnect failure (git-fixes). * usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes). * usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes). * usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes). * usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git- fixes). * usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes). * usb: phy: Initialize struct usb_phy list_head (git-fixes). * usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes). * usb: raw-gadget: do not limit transfer length (git-fixes). * usb: storage: Fix memory leak in USB bulk transport (git-fixes). * usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: psy: Set max current to zero when disconnected (git- fixes). * usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes). * usb: udc: Add trace event for usb_gadget_set_state (stable-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes). * wifi: ath11k: fix peer HE MCS assignment (git-fixes). * wifi: ath11k: restore register window after global reset (git-fixes). * wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git- fixes). * wifi: ieee80211: correct FILS status codes (git-fixes). * wifi: mac80211: fix CMAC functions not handling errors (git-fixes). * wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes). * wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git- fixes). * wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git- fixes). * wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes). * x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git- fixes). * x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528). * x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528). * x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528). * x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528). * x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528). * x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528). * x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528). * x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528). * x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528). * x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528). * x86/microcode/AMD: Select which microcode patch to load (bsc#1256528). * x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528). * x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528). * xhci: dbgtty: fix device unregister (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-293=1 openSUSE-SLE-15.6-2026-293=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-293=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-293=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-293=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-293=1 ## Package List: * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (noarch) * kernel-docs-html-6.4.0-150600.23.84.1 * kernel-devel-6.4.0-150600.23.84.1 * kernel-source-vanilla-6.4.0-150600.23.84.1 * kernel-source-6.4.0-150600.23.84.1 * kernel-macros-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-devel-6.4.0-150600.23.84.1 * kernel-debug-debuginfo-6.4.0-150600.23.84.1 * kernel-debug-debugsource-6.4.0-150600.23.84.1 * kernel-debug-devel-debuginfo-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (x86_64) * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.84.1 * kernel-kvmsmall-vdso-6.4.0-150600.23.84.1 * kernel-default-vdso-debuginfo-6.4.0-150600.23.84.1 * kernel-default-vdso-6.4.0-150600.23.84.1 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.84.1 * kernel-debug-vdso-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1 * kernel-kvmsmall-devel-6.4.0-150600.23.84.1 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.84.1 * kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.84.1 * kernel-kvmsmall-debugsource-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-6.4.0-150600.23.84.1 * kernel-default-debugsource-6.4.0-150600.23.84.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1 * kernel-obs-build-debugsource-6.4.0-150600.23.84.1 * kernel-syms-6.4.0-150600.23.84.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1 * kselftests-kmp-default-6.4.0-150600.23.84.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.84.1 * kernel-default-debuginfo-6.4.0-150600.23.84.1 * kernel-default-devel-6.4.0-150600.23.84.1 * dlm-kmp-default-6.4.0-150600.23.84.1 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.84.1 * ocfs2-kmp-default-6.4.0-150600.23.84.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.84.1 * kernel-obs-build-6.4.0-150600.23.84.1 * kernel-default-extra-6.4.0-150600.23.84.1 * reiserfs-kmp-default-6.4.0-150600.23.84.1 * kernel-default-optional-debuginfo-6.4.0-150600.23.84.1 * kernel-default-optional-6.4.0-150600.23.84.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1 * kernel-obs-qa-6.4.0-150600.23.84.1 * kernel-default-livepatch-6.4.0-150600.23.84.1 * gfs2-kmp-default-6.4.0-150600.23.84.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1 * kernel-livepatch-SLE15-SP6_Update_19-debugsource-1-150600.13.3.1 * kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-1-150600.13.3.1 * kernel-default-livepatch-devel-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150600.23.84.1 * kernel-zfcpdump-debugsource-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (aarch64) * dtb-amlogic-6.4.0-150600.23.84.1 * dtb-exynos-6.4.0-150600.23.84.1 * dtb-altera-6.4.0-150600.23.84.1 * dtb-amazon-6.4.0-150600.23.84.1 * dtb-marvell-6.4.0-150600.23.84.1 * dtb-nvidia-6.4.0-150600.23.84.1 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.84.1 * dtb-socionext-6.4.0-150600.23.84.1 * ocfs2-kmp-64kb-6.4.0-150600.23.84.1 * dtb-arm-6.4.0-150600.23.84.1 * dtb-mediatek-6.4.0-150600.23.84.1 * kernel-64kb-devel-6.4.0-150600.23.84.1 * kselftests-kmp-64kb-6.4.0-150600.23.84.1 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.84.1 * dtb-lg-6.4.0-150600.23.84.1 * dtb-broadcom-6.4.0-150600.23.84.1 * cluster-md-kmp-64kb-6.4.0-150600.23.84.1 * kernel-64kb-debugsource-6.4.0-150600.23.84.1 * kernel-64kb-extra-6.4.0-150600.23.84.1 * dtb-apm-6.4.0-150600.23.84.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.84.1 * reiserfs-kmp-64kb-6.4.0-150600.23.84.1 * dtb-apple-6.4.0-150600.23.84.1 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.84.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.84.1 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.84.1 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.84.1 * dtb-cavium-6.4.0-150600.23.84.1 * dtb-freescale-6.4.0-150600.23.84.1 * dtb-rockchip-6.4.0-150600.23.84.1 * dtb-allwinner-6.4.0-150600.23.84.1 * dtb-hisilicon-6.4.0-150600.23.84.1 * gfs2-kmp-64kb-6.4.0-150600.23.84.1 * dtb-sprd-6.4.0-150600.23.84.1 * kernel-64kb-optional-6.4.0-150600.23.84.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.84.1 * dtb-xilinx-6.4.0-150600.23.84.1 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.84.1 * kernel-64kb-debuginfo-6.4.0-150600.23.84.1 * dlm-kmp-64kb-6.4.0-150600.23.84.1 * dtb-amd-6.4.0-150600.23.84.1 * dtb-qcom-6.4.0-150600.23.84.1 * dtb-renesas-6.4.0-150600.23.84.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.84.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.84.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-6.4.0-150600.23.84.1 * kernel-default-debugsource-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150600.23.84.1 * kernel-default-debuginfo-6.4.0-150600.23.84.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1 * cluster-md-kmp-default-6.4.0-150600.23.84.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1 * dlm-kmp-default-6.4.0-150600.23.84.1 * kernel-default-debugsource-6.4.0-150600.23.84.1 * kernel-default-devel-6.4.0-150600.23.84.1 * kernel-obs-build-6.4.0-150600.23.84.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1 * kernel-obs-build-debugsource-6.4.0-150600.23.84.1 * reiserfs-kmp-default-6.4.0-150600.23.84.1 * kernel-syms-6.4.0-150600.23.84.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1 * ocfs2-kmp-default-6.4.0-150600.23.84.1 * gfs2-kmp-default-6.4.0-150600.23.84.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64) * kernel-64kb-devel-6.4.0-150600.23.84.1 * kernel-64kb-debugsource-6.4.0-150600.23.84.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.84.1 * kernel-64kb-debuginfo-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * kernel-devel-6.4.0-150600.23.84.1 * kernel-source-6.4.0-150600.23.84.1 * kernel-macros-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch nosrc) * kernel-docs-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x) * kernel-zfcpdump-debuginfo-6.4.0-150600.23.84.1 * kernel-zfcpdump-debugsource-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1 * kernel-default-debuginfo-6.4.0-150600.23.84.1 * kernel-default-devel-debuginfo-6.4.0-150600.23.84.1 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1 * cluster-md-kmp-default-6.4.0-150600.23.84.1 * dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1 * dlm-kmp-default-6.4.0-150600.23.84.1 * kernel-default-debugsource-6.4.0-150600.23.84.1 * kernel-default-devel-6.4.0-150600.23.84.1 * kernel-obs-build-6.4.0-150600.23.84.1 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1 * kernel-obs-build-debugsource-6.4.0-150600.23.84.1 * reiserfs-kmp-default-6.4.0-150600.23.84.1 * kernel-syms-6.4.0-150600.23.84.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1 * ocfs2-kmp-default-6.4.0-150600.23.84.1 * gfs2-kmp-default-6.4.0-150600.23.84.1 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le x86_64) * kernel-default-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * kernel-devel-6.4.0-150600.23.84.1 * kernel-source-6.4.0-150600.23.84.1 * kernel-macros-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.84.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1 * kernel-default-debuginfo-6.4.0-150600.23.84.1 * kernel-default-debugsource-6.4.0-150600.23.84.1 * kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-1-150600.13.3.1 * kernel-default-livepatch-6.4.0-150600.23.84.1 * kernel-livepatch-SLE15-SP6_Update_19-debugsource-1-150600.13.3.1 * kernel-default-livepatch-devel-6.4.0-150600.23.84.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42752.html * https://www.suse.com/security/cve/CVE-2023-53743.html * https://www.suse.com/security/cve/CVE-2023-53750.html * https://www.suse.com/security/cve/CVE-2023-53752.html * https://www.suse.com/security/cve/CVE-2023-53759.html * https://www.suse.com/security/cve/CVE-2023-53762.html * https://www.suse.com/security/cve/CVE-2023-53766.html * https://www.suse.com/security/cve/CVE-2023-53768.html * https://www.suse.com/security/cve/CVE-2023-53777.html * https://www.suse.com/security/cve/CVE-2023-53778.html * https://www.suse.com/security/cve/CVE-2023-53782.html * https://www.suse.com/security/cve/CVE-2023-53784.html * https://www.suse.com/security/cve/CVE-2023-53785.html * https://www.suse.com/security/cve/CVE-2023-53787.html * https://www.suse.com/security/cve/CVE-2023-53791.html * https://www.suse.com/security/cve/CVE-2023-53792.html * https://www.suse.com/security/cve/CVE-2023-53793.html * https://www.suse.com/security/cve/CVE-2023-53794.html * https://www.suse.com/security/cve/CVE-2023-53795.html * https://www.suse.com/security/cve/CVE-2023-53797.html * https://www.suse.com/security/cve/CVE-2023-53799.html * https://www.suse.com/security/cve/CVE-2023-53807.html * https://www.suse.com/security/cve/CVE-2023-53808.html * https://www.suse.com/security/cve/CVE-2023-53813.html * https://www.suse.com/security/cve/CVE-2023-53815.html * https://www.suse.com/security/cve/CVE-2023-53819.html * https://www.suse.com/security/cve/CVE-2023-53821.html * https://www.suse.com/security/cve/CVE-2023-53823.html * https://www.suse.com/security/cve/CVE-2023-53825.html * https://www.suse.com/security/cve/CVE-2023-53828.html * https://www.suse.com/security/cve/CVE-2023-53831.html * https://www.suse.com/security/cve/CVE-2023-53834.html * https://www.suse.com/security/cve/CVE-2023-53836.html * https://www.suse.com/security/cve/CVE-2023-53839.html * https://www.suse.com/security/cve/CVE-2023-53841.html * https://www.suse.com/security/cve/CVE-2023-53842.html * https://www.suse.com/security/cve/CVE-2023-53843.html * https://www.suse.com/security/cve/CVE-2023-53844.html * https://www.suse.com/security/cve/CVE-2023-53846.html * https://www.suse.com/security/cve/CVE-2023-53847.html * https://www.suse.com/security/cve/CVE-2023-53848.html * https://www.suse.com/security/cve/CVE-2023-53850.html * https://www.suse.com/security/cve/CVE-2023-53851.html * https://www.suse.com/security/cve/CVE-2023-53852.html * https://www.suse.com/security/cve/CVE-2023-53855.html * https://www.suse.com/security/cve/CVE-2023-53856.html * https://www.suse.com/security/cve/CVE-2023-53857.html * https://www.suse.com/security/cve/CVE-2023-53858.html * https://www.suse.com/security/cve/CVE-2023-53860.html * https://www.suse.com/security/cve/CVE-2023-53861.html * https://www.suse.com/security/cve/CVE-2023-53863.html * https://www.suse.com/security/cve/CVE-2023-53864.html * https://www.suse.com/security/cve/CVE-2023-53865.html * https://www.suse.com/security/cve/CVE-2023-53989.html * https://www.suse.com/security/cve/CVE-2023-53992.html * https://www.suse.com/security/cve/CVE-2023-53994.html * https://www.suse.com/security/cve/CVE-2023-53995.html * https://www.suse.com/security/cve/CVE-2023-53996.html * https://www.suse.com/security/cve/CVE-2023-53997.html * https://www.suse.com/security/cve/CVE-2023-53998.html * https://www.suse.com/security/cve/CVE-2023-53999.html * https://www.suse.com/security/cve/CVE-2023-54000.html * https://www.suse.com/security/cve/CVE-2023-54001.html * https://www.suse.com/security/cve/CVE-2023-54005.html * https://www.suse.com/security/cve/CVE-2023-54006.html * https://www.suse.com/security/cve/CVE-2023-54008.html * https://www.suse.com/security/cve/CVE-2023-54014.html * https://www.suse.com/security/cve/CVE-2023-54016.html * https://www.suse.com/security/cve/CVE-2023-54017.html * https://www.suse.com/security/cve/CVE-2023-54019.html * https://www.suse.com/security/cve/CVE-2023-54022.html * https://www.suse.com/security/cve/CVE-2023-54023.html * https://www.suse.com/security/cve/CVE-2023-54025.html * https://www.suse.com/security/cve/CVE-2023-54026.html * https://www.suse.com/security/cve/CVE-2023-54027.html * https://www.suse.com/security/cve/CVE-2023-54030.html * https://www.suse.com/security/cve/CVE-2023-54031.html * https://www.suse.com/security/cve/CVE-2023-54032.html * https://www.suse.com/security/cve/CVE-2023-54035.html * https://www.suse.com/security/cve/CVE-2023-54037.html * https://www.suse.com/security/cve/CVE-2023-54038.html * https://www.suse.com/security/cve/CVE-2023-54042.html * https://www.suse.com/security/cve/CVE-2023-54045.html * https://www.suse.com/security/cve/CVE-2023-54048.html * https://www.suse.com/security/cve/CVE-2023-54049.html * https://www.suse.com/security/cve/CVE-2023-54051.html * https://www.suse.com/security/cve/CVE-2023-54052.html * https://www.suse.com/security/cve/CVE-2023-54060.html * https://www.suse.com/security/cve/CVE-2023-54064.html * https://www.suse.com/security/cve/CVE-2023-54066.html * https://www.suse.com/security/cve/CVE-2023-54067.html * https://www.suse.com/security/cve/CVE-2023-54069.html * https://www.suse.com/security/cve/CVE-2023-54070.html * https://www.suse.com/security/cve/CVE-2023-54072.html * https://www.suse.com/security/cve/CVE-2023-54076.html * https://www.suse.com/security/cve/CVE-2023-54080.html * https://www.suse.com/security/cve/CVE-2023-54081.html * https://www.suse.com/security/cve/CVE-2023-54083.html * https://www.suse.com/security/cve/CVE-2023-54088.html * https://www.suse.com/security/cve/CVE-2023-54089.html * https://www.suse.com/security/cve/CVE-2023-54091.html * https://www.suse.com/security/cve/CVE-2023-54092.html * https://www.suse.com/security/cve/CVE-2023-54093.html * https://www.suse.com/security/cve/CVE-2023-54094.html * https://www.suse.com/security/cve/CVE-2023-54095.html * https://www.suse.com/security/cve/CVE-2023-54096.html * https://www.suse.com/security/cve/CVE-2023-54099.html * https://www.suse.com/security/cve/CVE-2023-54101.html * https://www.suse.com/security/cve/CVE-2023-54104.html * https://www.suse.com/security/cve/CVE-2023-54106.html * https://www.suse.com/security/cve/CVE-2023-54112.html * https://www.suse.com/security/cve/CVE-2023-54113.html * https://www.suse.com/security/cve/CVE-2023-54115.html * https://www.suse.com/security/cve/CVE-2023-54117.html * https://www.suse.com/security/cve/CVE-2023-54121.html * https://www.suse.com/security/cve/CVE-2023-54125.html * https://www.suse.com/security/cve/CVE-2023-54127.html * https://www.suse.com/security/cve/CVE-2023-54133.html * https://www.suse.com/security/cve/CVE-2023-54134.html * https://www.suse.com/security/cve/CVE-2023-54135.html * https://www.suse.com/security/cve/CVE-2023-54136.html * https://www.suse.com/security/cve/CVE-2023-54137.html * https://www.suse.com/security/cve/CVE-2023-54140.html * https://www.suse.com/security/cve/CVE-2023-54141.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2023-54143.html * https://www.suse.com/security/cve/CVE-2023-54145.html * https://www.suse.com/security/cve/CVE-2023-54148.html * https://www.suse.com/security/cve/CVE-2023-54149.html * https://www.suse.com/security/cve/CVE-2023-54153.html * https://www.suse.com/security/cve/CVE-2023-54154.html * https://www.suse.com/security/cve/CVE-2023-54155.html * https://www.suse.com/security/cve/CVE-2023-54156.html * https://www.suse.com/security/cve/CVE-2023-54164.html * https://www.suse.com/security/cve/CVE-2023-54166.html * https://www.suse.com/security/cve/CVE-2023-54169.html * https://www.suse.com/security/cve/CVE-2023-54170.html * https://www.suse.com/security/cve/CVE-2023-54171.html * https://www.suse.com/security/cve/CVE-2023-54172.html * https://www.suse.com/security/cve/CVE-2023-54173.html * https://www.suse.com/security/cve/CVE-2023-54177.html * https://www.suse.com/security/cve/CVE-2023-54178.html * https://www.suse.com/security/cve/CVE-2023-54179.html * https://www.suse.com/security/cve/CVE-2023-54181.html * https://www.suse.com/security/cve/CVE-2023-54183.html * https://www.suse.com/security/cve/CVE-2023-54185.html * https://www.suse.com/security/cve/CVE-2023-54189.html * https://www.suse.com/security/cve/CVE-2023-54194.html * https://www.suse.com/security/cve/CVE-2023-54201.html * https://www.suse.com/security/cve/CVE-2023-54204.html * https://www.suse.com/security/cve/CVE-2023-54207.html * https://www.suse.com/security/cve/CVE-2023-54209.html * https://www.suse.com/security/cve/CVE-2023-54210.html * https://www.suse.com/security/cve/CVE-2023-54211.html * https://www.suse.com/security/cve/CVE-2023-54215.html * https://www.suse.com/security/cve/CVE-2023-54219.html * https://www.suse.com/security/cve/CVE-2023-54220.html * https://www.suse.com/security/cve/CVE-2023-54221.html * https://www.suse.com/security/cve/CVE-2023-54223.html * https://www.suse.com/security/cve/CVE-2023-54224.html * https://www.suse.com/security/cve/CVE-2023-54225.html * https://www.suse.com/security/cve/CVE-2023-54227.html * https://www.suse.com/security/cve/CVE-2023-54229.html * https://www.suse.com/security/cve/CVE-2023-54230.html * https://www.suse.com/security/cve/CVE-2023-54235.html * https://www.suse.com/security/cve/CVE-2023-54240.html * https://www.suse.com/security/cve/CVE-2023-54241.html * https://www.suse.com/security/cve/CVE-2023-54246.html * https://www.suse.com/security/cve/CVE-2023-54247.html * https://www.suse.com/security/cve/CVE-2023-54251.html * https://www.suse.com/security/cve/CVE-2023-54253.html * https://www.suse.com/security/cve/CVE-2023-54254.html * https://www.suse.com/security/cve/CVE-2023-54255.html * https://www.suse.com/security/cve/CVE-2023-54258.html * https://www.suse.com/security/cve/CVE-2023-54261.html * https://www.suse.com/security/cve/CVE-2023-54263.html * https://www.suse.com/security/cve/CVE-2023-54264.html * https://www.suse.com/security/cve/CVE-2023-54266.html * https://www.suse.com/security/cve/CVE-2023-54267.html * https://www.suse.com/security/cve/CVE-2023-54271.html * https://www.suse.com/security/cve/CVE-2023-54276.html * https://www.suse.com/security/cve/CVE-2023-54278.html * https://www.suse.com/security/cve/CVE-2023-54281.html * https://www.suse.com/security/cve/CVE-2023-54282.html * https://www.suse.com/security/cve/CVE-2023-54283.html * https://www.suse.com/security/cve/CVE-2023-54285.html * https://www.suse.com/security/cve/CVE-2023-54289.html * https://www.suse.com/security/cve/CVE-2023-54291.html * https://www.suse.com/security/cve/CVE-2023-54292.html * https://www.suse.com/security/cve/CVE-2023-54293.html * https://www.suse.com/security/cve/CVE-2023-54296.html * https://www.suse.com/security/cve/CVE-2023-54297.html * https://www.suse.com/security/cve/CVE-2023-54299.html * https://www.suse.com/security/cve/CVE-2023-54300.html * https://www.suse.com/security/cve/CVE-2023-54302.html * https://www.suse.com/security/cve/CVE-2023-54303.html * https://www.suse.com/security/cve/CVE-2023-54304.html * https://www.suse.com/security/cve/CVE-2023-54309.html * https://www.suse.com/security/cve/CVE-2023-54312.html * https://www.suse.com/security/cve/CVE-2023-54313.html * https://www.suse.com/security/cve/CVE-2023-54314.html * https://www.suse.com/security/cve/CVE-2023-54315.html * https://www.suse.com/security/cve/CVE-2023-54316.html * https://www.suse.com/security/cve/CVE-2023-54318.html * https://www.suse.com/security/cve/CVE-2023-54319.html * https://www.suse.com/security/cve/CVE-2023-54322.html * https://www.suse.com/security/cve/CVE-2023-54324.html * https://www.suse.com/security/cve/CVE-2023-54326.html * https://www.suse.com/security/cve/CVE-2024-26944.html * https://www.suse.com/security/cve/CVE-2025-38321.html * https://www.suse.com/security/cve/CVE-2025-38728.html * https://www.suse.com/security/cve/CVE-2025-39890.html * https://www.suse.com/security/cve/CVE-2025-39977.html * https://www.suse.com/security/cve/CVE-2025-40006.html * https://www.suse.com/security/cve/CVE-2025-40024.html * https://www.suse.com/security/cve/CVE-2025-40033.html * https://www.suse.com/security/cve/CVE-2025-40042.html * https://www.suse.com/security/cve/CVE-2025-40053.html * https://www.suse.com/security/cve/CVE-2025-40081.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://www.suse.com/security/cve/CVE-2025-40134.html * https://www.suse.com/security/cve/CVE-2025-40135.html * https://www.suse.com/security/cve/CVE-2025-40153.html * https://www.suse.com/security/cve/CVE-2025-40158.html * https://www.suse.com/security/cve/CVE-2025-40167.html * https://www.suse.com/security/cve/CVE-2025-40170.html * https://www.suse.com/security/cve/CVE-2025-40178.html * https://www.suse.com/security/cve/CVE-2025-40179.html * https://www.suse.com/security/cve/CVE-2025-40187.html * https://www.suse.com/security/cve/CVE-2025-40211.html * https://www.suse.com/security/cve/CVE-2025-40215.html * https://www.suse.com/security/cve/CVE-2025-40219.html * https://www.suse.com/security/cve/CVE-2025-40220.html * https://www.suse.com/security/cve/CVE-2025-40223.html * https://www.suse.com/security/cve/CVE-2025-40233.html * https://www.suse.com/security/cve/CVE-2025-40242.html * https://www.suse.com/security/cve/CVE-2025-40244.html * https://www.suse.com/security/cve/CVE-2025-40256.html * https://www.suse.com/security/cve/CVE-2025-40258.html * https://www.suse.com/security/cve/CVE-2025-40262.html * https://www.suse.com/security/cve/CVE-2025-40263.html * https://www.suse.com/security/cve/CVE-2025-40269.html * https://www.suse.com/security/cve/CVE-2025-40272.html * https://www.suse.com/security/cve/CVE-2025-40273.html * https://www.suse.com/security/cve/CVE-2025-40275.html * https://www.suse.com/security/cve/CVE-2025-40277.html * https://www.suse.com/security/cve/CVE-2025-40280.html * https://www.suse.com/security/cve/CVE-2025-40282.html * https://www.suse.com/security/cve/CVE-2025-40283.html * https://www.suse.com/security/cve/CVE-2025-40284.html * https://www.suse.com/security/cve/CVE-2025-40288.html * https://www.suse.com/security/cve/CVE-2025-40297.html * https://www.suse.com/security/cve/CVE-2025-40301.html * https://www.suse.com/security/cve/CVE-2025-40304.html * https://www.suse.com/security/cve/CVE-2025-40306.html * https://www.suse.com/security/cve/CVE-2025-40308.html * https://www.suse.com/security/cve/CVE-2025-40309.html * https://www.suse.com/security/cve/CVE-2025-40310.html * https://www.suse.com/security/cve/CVE-2025-40311.html * https://www.suse.com/security/cve/CVE-2025-40312.html * https://www.suse.com/security/cve/CVE-2025-40314.html * https://www.suse.com/security/cve/CVE-2025-40315.html * https://www.suse.com/security/cve/CVE-2025-40316.html * https://www.suse.com/security/cve/CVE-2025-40317.html * https://www.suse.com/security/cve/CVE-2025-40318.html * https://www.suse.com/security/cve/CVE-2025-40320.html * https://www.suse.com/security/cve/CVE-2025-40321.html * https://www.suse.com/security/cve/CVE-2025-40322.html * https://www.suse.com/security/cve/CVE-2025-40323.html * https://www.suse.com/security/cve/CVE-2025-40324.html * https://www.suse.com/security/cve/CVE-2025-40328.html * https://www.suse.com/security/cve/CVE-2025-40329.html * https://www.suse.com/security/cve/CVE-2025-40331.html * https://www.suse.com/security/cve/CVE-2025-40342.html * https://www.suse.com/security/cve/CVE-2025-40343.html * https://www.suse.com/security/cve/CVE-2025-40345.html * https://www.suse.com/security/cve/CVE-2025-40349.html * https://www.suse.com/security/cve/CVE-2025-40351.html * https://www.suse.com/security/cve/CVE-2025-68168.html * https://www.suse.com/security/cve/CVE-2025-68172.html * https://www.suse.com/security/cve/CVE-2025-68176.html * https://www.suse.com/security/cve/CVE-2025-68180.html * https://www.suse.com/security/cve/CVE-2025-68183.html * https://www.suse.com/security/cve/CVE-2025-68185.html * https://www.suse.com/security/cve/CVE-2025-68192.html * https://www.suse.com/security/cve/CVE-2025-68194.html * https://www.suse.com/security/cve/CVE-2025-68195.html * https://www.suse.com/security/cve/CVE-2025-68217.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68222.html * https://www.suse.com/security/cve/CVE-2025-68233.html * https://www.suse.com/security/cve/CVE-2025-68235.html * https://www.suse.com/security/cve/CVE-2025-68237.html * https://www.suse.com/security/cve/CVE-2025-68238.html * https://www.suse.com/security/cve/CVE-2025-68244.html * https://www.suse.com/security/cve/CVE-2025-68249.html * https://www.suse.com/security/cve/CVE-2025-68252.html * https://www.suse.com/security/cve/CVE-2025-68257.html * https://www.suse.com/security/cve/CVE-2025-68258.html * https://www.suse.com/security/cve/CVE-2025-68259.html * https://www.suse.com/security/cve/CVE-2025-68286.html * https://www.suse.com/security/cve/CVE-2025-68287.html * https://www.suse.com/security/cve/CVE-2025-68289.html * https://www.suse.com/security/cve/CVE-2025-68290.html * https://www.suse.com/security/cve/CVE-2025-68303.html * https://www.suse.com/security/cve/CVE-2025-68305.html * https://www.suse.com/security/cve/CVE-2025-68307.html * https://www.suse.com/security/cve/CVE-2025-68308.html * https://www.suse.com/security/cve/CVE-2025-68312.html * https://www.suse.com/security/cve/CVE-2025-68313.html * https://www.suse.com/security/cve/CVE-2025-68328.html * https://www.suse.com/security/cve/CVE-2025-68330.html * https://www.suse.com/security/cve/CVE-2025-68331.html * https://www.suse.com/security/cve/CVE-2025-68332.html * https://www.suse.com/security/cve/CVE-2025-68335.html * https://www.suse.com/security/cve/CVE-2025-68339.html * https://www.suse.com/security/cve/CVE-2025-68345.html * https://www.suse.com/security/cve/CVE-2025-68346.html * https://www.suse.com/security/cve/CVE-2025-68347.html * https://www.suse.com/security/cve/CVE-2025-68354.html * https://www.suse.com/security/cve/CVE-2025-68362.html * https://www.suse.com/security/cve/CVE-2025-68380.html * https://www.suse.com/security/cve/CVE-2025-68724.html * https://www.suse.com/security/cve/CVE-2025-68732.html * https://www.suse.com/security/cve/CVE-2025-68734.html * https://www.suse.com/security/cve/CVE-2025-68740.html * https://www.suse.com/security/cve/CVE-2025-68746.html * https://www.suse.com/security/cve/CVE-2025-68750.html * https://www.suse.com/security/cve/CVE-2025-68753.html * https://www.suse.com/security/cve/CVE-2025-68757.html * https://www.suse.com/security/cve/CVE-2025-68758.html * https://www.suse.com/security/cve/CVE-2025-68759.html * https://www.suse.com/security/cve/CVE-2025-68765.html * https://www.suse.com/security/cve/CVE-2025-68766.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1214635 * https://bugzilla.suse.com/show_bug.cgi?id=1214847 * https://bugzilla.suse.com/show_bug.cgi?id=1215146 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1215344 * https://bugzilla.suse.com/show_bug.cgi?id=1216062 * https://bugzilla.suse.com/show_bug.cgi?id=1216436 * https://bugzilla.suse.com/show_bug.cgi?id=1219165 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245449 * https://bugzilla.suse.com/show_bug.cgi?id=1246328 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1248886 * https://bugzilla.suse.com/show_bug.cgi?id=1249256 * https://bugzilla.suse.com/show_bug.cgi?id=1250334 * https://bugzilla.suse.com/show_bug.cgi?id=1252046 * https://bugzilla.suse.com/show_bug.cgi?id=1252342 * https://bugzilla.suse.com/show_bug.cgi?id=1252686 * https://bugzilla.suse.com/show_bug.cgi?id=1252776 * https://bugzilla.suse.com/show_bug.cgi?id=1252808 * https://bugzilla.suse.com/show_bug.cgi?id=1252824 * https://bugzilla.suse.com/show_bug.cgi?id=1252861 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://bugzilla.suse.com/show_bug.cgi?id=1252973 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253262 * https://bugzilla.suse.com/show_bug.cgi?id=1253342 * https://bugzilla.suse.com/show_bug.cgi?id=1253386 * https://bugzilla.suse.com/show_bug.cgi?id=1253402 * https://bugzilla.suse.com/show_bug.cgi?id=1253408 * https://bugzilla.suse.com/show_bug.cgi?id=1253413 * https://bugzilla.suse.com/show_bug.cgi?id=1253442 * https://bugzilla.suse.com/show_bug.cgi?id=1253458 * https://bugzilla.suse.com/show_bug.cgi?id=1253463 * https://bugzilla.suse.com/show_bug.cgi?id=1253647 * https://bugzilla.suse.com/show_bug.cgi?id=1254119 * https://bugzilla.suse.com/show_bug.cgi?id=1254126 * https://bugzilla.suse.com/show_bug.cgi?id=1254373 * https://bugzilla.suse.com/show_bug.cgi?id=1254518 * https://bugzilla.suse.com/show_bug.cgi?id=1254520 * https://bugzilla.suse.com/show_bug.cgi?id=1254599 * https://bugzilla.suse.com/show_bug.cgi?id=1254606 * https://bugzilla.suse.com/show_bug.cgi?id=1254611 * https://bugzilla.suse.com/show_bug.cgi?id=1254613 * https://bugzilla.suse.com/show_bug.cgi?id=1254615 * https://bugzilla.suse.com/show_bug.cgi?id=1254621 * https://bugzilla.suse.com/show_bug.cgi?id=1254623 * https://bugzilla.suse.com/show_bug.cgi?id=1254624 * https://bugzilla.suse.com/show_bug.cgi?id=1254626 * https://bugzilla.suse.com/show_bug.cgi?id=1254648 * https://bugzilla.suse.com/show_bug.cgi?id=1254649 * https://bugzilla.suse.com/show_bug.cgi?id=1254653 * https://bugzilla.suse.com/show_bug.cgi?id=1254655 * https://bugzilla.suse.com/show_bug.cgi?id=1254657 * https://bugzilla.suse.com/show_bug.cgi?id=1254660 * https://bugzilla.suse.com/show_bug.cgi?id=1254661 * https://bugzilla.suse.com/show_bug.cgi?id=1254663 * https://bugzilla.suse.com/show_bug.cgi?id=1254669 * https://bugzilla.suse.com/show_bug.cgi?id=1254677 * https://bugzilla.suse.com/show_bug.cgi?id=1254678 * https://bugzilla.suse.com/show_bug.cgi?id=1254688 * https://bugzilla.suse.com/show_bug.cgi?id=1254690 * https://bugzilla.suse.com/show_bug.cgi?id=1254691 * https://bugzilla.suse.com/show_bug.cgi?id=1254693 * https://bugzilla.suse.com/show_bug.cgi?id=1254695 * https://bugzilla.suse.com/show_bug.cgi?id=1254698 * https://bugzilla.suse.com/show_bug.cgi?id=1254701 * https://bugzilla.suse.com/show_bug.cgi?id=1254704 * https://bugzilla.suse.com/show_bug.cgi?id=1254705 * https://bugzilla.suse.com/show_bug.cgi?id=1254707 * https://bugzilla.suse.com/show_bug.cgi?id=1254712 * https://bugzilla.suse.com/show_bug.cgi?id=1254715 * https://bugzilla.suse.com/show_bug.cgi?id=1254717 * https://bugzilla.suse.com/show_bug.cgi?id=1254723 * https://bugzilla.suse.com/show_bug.cgi?id=1254724 * https://bugzilla.suse.com/show_bug.cgi?id=1254732 * https://bugzilla.suse.com/show_bug.cgi?id=1254733 * https://bugzilla.suse.com/show_bug.cgi?id=1254737 * https://bugzilla.suse.com/show_bug.cgi?id=1254739 * https://bugzilla.suse.com/show_bug.cgi?id=1254742 * https://bugzilla.suse.com/show_bug.cgi?id=1254743 * https://bugzilla.suse.com/show_bug.cgi?id=1254749 * https://bugzilla.suse.com/show_bug.cgi?id=1254750 * https://bugzilla.suse.com/show_bug.cgi?id=1254753 * https://bugzilla.suse.com/show_bug.cgi?id=1254754 * https://bugzilla.suse.com/show_bug.cgi?id=1254758 * https://bugzilla.suse.com/show_bug.cgi?id=1254761 * https://bugzilla.suse.com/show_bug.cgi?id=1254762 * https://bugzilla.suse.com/show_bug.cgi?id=1254765 * https://bugzilla.suse.com/show_bug.cgi?id=1254782 * https://bugzilla.suse.com/show_bug.cgi?id=1254791 * https://bugzilla.suse.com/show_bug.cgi?id=1254793 * https://bugzilla.suse.com/show_bug.cgi?id=1254795 * https://bugzilla.suse.com/show_bug.cgi?id=1254796 * https://bugzilla.suse.com/show_bug.cgi?id=1254797 * https://bugzilla.suse.com/show_bug.cgi?id=1254798 * https://bugzilla.suse.com/show_bug.cgi?id=1254813 * https://bugzilla.suse.com/show_bug.cgi?id=1254828 * https://bugzilla.suse.com/show_bug.cgi?id=1254829 * https://bugzilla.suse.com/show_bug.cgi?id=1254832 * https://bugzilla.suse.com/show_bug.cgi?id=1254840 * https://bugzilla.suse.com/show_bug.cgi?id=1254843 * https://bugzilla.suse.com/show_bug.cgi?id=1254847 * https://bugzilla.suse.com/show_bug.cgi?id=1254850 * https://bugzilla.suse.com/show_bug.cgi?id=1254851 * https://bugzilla.suse.com/show_bug.cgi?id=1254858 * https://bugzilla.suse.com/show_bug.cgi?id=1254860 * https://bugzilla.suse.com/show_bug.cgi?id=1254894 * https://bugzilla.suse.com/show_bug.cgi?id=1254918 * https://bugzilla.suse.com/show_bug.cgi?id=1254957 * https://bugzilla.suse.com/show_bug.cgi?id=1254959 * https://bugzilla.suse.com/show_bug.cgi?id=1254983 * https://bugzilla.suse.com/show_bug.cgi?id=1255005 * https://bugzilla.suse.com/show_bug.cgi?id=1255009 * https://bugzilla.suse.com/show_bug.cgi?id=1255026 * https://bugzilla.suse.com/show_bug.cgi?id=1255033 * https://bugzilla.suse.com/show_bug.cgi?id=1255034 * https://bugzilla.suse.com/show_bug.cgi?id=1255035 * https://bugzilla.suse.com/show_bug.cgi?id=1255041 * https://bugzilla.suse.com/show_bug.cgi?id=1255046 * https://bugzilla.suse.com/show_bug.cgi?id=1255057 * https://bugzilla.suse.com/show_bug.cgi?id=1255062 * https://bugzilla.suse.com/show_bug.cgi?id=1255064 * https://bugzilla.suse.com/show_bug.cgi?id=1255065 * https://bugzilla.suse.com/show_bug.cgi?id=1255068 * https://bugzilla.suse.com/show_bug.cgi?id=1255072 * https://bugzilla.suse.com/show_bug.cgi?id=1255075 * https://bugzilla.suse.com/show_bug.cgi?id=1255077 * https://bugzilla.suse.com/show_bug.cgi?id=1255083 * https://bugzilla.suse.com/show_bug.cgi?id=1255092 * https://bugzilla.suse.com/show_bug.cgi?id=1255094 * https://bugzilla.suse.com/show_bug.cgi?id=1255100 * https://bugzilla.suse.com/show_bug.cgi?id=1255122 * https://bugzilla.suse.com/show_bug.cgi?id=1255135 * https://bugzilla.suse.com/show_bug.cgi?id=1255146 * https://bugzilla.suse.com/show_bug.cgi?id=1255149 * https://bugzilla.suse.com/show_bug.cgi?id=1255152 * https://bugzilla.suse.com/show_bug.cgi?id=1255154 * https://bugzilla.suse.com/show_bug.cgi?id=1255155 * https://bugzilla.suse.com/show_bug.cgi?id=1255163 * https://bugzilla.suse.com/show_bug.cgi?id=1255167 * https://bugzilla.suse.com/show_bug.cgi?id=1255169 * https://bugzilla.suse.com/show_bug.cgi?id=1255171 * https://bugzilla.suse.com/show_bug.cgi?id=1255182 * https://bugzilla.suse.com/show_bug.cgi?id=1255187 * https://bugzilla.suse.com/show_bug.cgi?id=1255190 * https://bugzilla.suse.com/show_bug.cgi?id=1255193 * https://bugzilla.suse.com/show_bug.cgi?id=1255197 * https://bugzilla.suse.com/show_bug.cgi?id=1255199 * https://bugzilla.suse.com/show_bug.cgi?id=1255202 * https://bugzilla.suse.com/show_bug.cgi?id=1255203 * https://bugzilla.suse.com/show_bug.cgi?id=1255206 * https://bugzilla.suse.com/show_bug.cgi?id=1255209 * https://bugzilla.suse.com/show_bug.cgi?id=1255218 * https://bugzilla.suse.com/show_bug.cgi?id=1255221 * https://bugzilla.suse.com/show_bug.cgi?id=1255233 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255246 * https://bugzilla.suse.com/show_bug.cgi?id=1255251 * https://bugzilla.suse.com/show_bug.cgi?id=1255252 * https://bugzilla.suse.com/show_bug.cgi?id=1255253 * https://bugzilla.suse.com/show_bug.cgi?id=1255259 * https://bugzilla.suse.com/show_bug.cgi?id=1255274 * https://bugzilla.suse.com/show_bug.cgi?id=1255276 * https://bugzilla.suse.com/show_bug.cgi?id=1255279 * https://bugzilla.suse.com/show_bug.cgi?id=1255280 * https://bugzilla.suse.com/show_bug.cgi?id=1255281 * https://bugzilla.suse.com/show_bug.cgi?id=1255325 * https://bugzilla.suse.com/show_bug.cgi?id=1255329 * https://bugzilla.suse.com/show_bug.cgi?id=1255351 * https://bugzilla.suse.com/show_bug.cgi?id=1255415 * https://bugzilla.suse.com/show_bug.cgi?id=1255480 * https://bugzilla.suse.com/show_bug.cgi?id=1255483 * https://bugzilla.suse.com/show_bug.cgi?id=1255489 * https://bugzilla.suse.com/show_bug.cgi?id=1255493 * https://bugzilla.suse.com/show_bug.cgi?id=1255495 * https://bugzilla.suse.com/show_bug.cgi?id=1255505 * https://bugzilla.suse.com/show_bug.cgi?id=1255538 * https://bugzilla.suse.com/show_bug.cgi?id=1255540 * https://bugzilla.suse.com/show_bug.cgi?id=1255545 * https://bugzilla.suse.com/show_bug.cgi?id=1255549 * https://bugzilla.suse.com/show_bug.cgi?id=1255550 * https://bugzilla.suse.com/show_bug.cgi?id=1255553 * https://bugzilla.suse.com/show_bug.cgi?id=1255557 * https://bugzilla.suse.com/show_bug.cgi?id=1255558 * https://bugzilla.suse.com/show_bug.cgi?id=1255563 * https://bugzilla.suse.com/show_bug.cgi?id=1255564 * https://bugzilla.suse.com/show_bug.cgi?id=1255570 * https://bugzilla.suse.com/show_bug.cgi?id=1255578 * https://bugzilla.suse.com/show_bug.cgi?id=1255579 * https://bugzilla.suse.com/show_bug.cgi?id=1255580 * https://bugzilla.suse.com/show_bug.cgi?id=1255583 * https://bugzilla.suse.com/show_bug.cgi?id=1255591 * https://bugzilla.suse.com/show_bug.cgi?id=1255601 * https://bugzilla.suse.com/show_bug.cgi?id=1255603 * https://bugzilla.suse.com/show_bug.cgi?id=1255605 * https://bugzilla.suse.com/show_bug.cgi?id=1255611 * https://bugzilla.suse.com/show_bug.cgi?id=1255616 * https://bugzilla.suse.com/show_bug.cgi?id=1255617 * https://bugzilla.suse.com/show_bug.cgi?id=1255618 * https://bugzilla.suse.com/show_bug.cgi?id=1255621 * https://bugzilla.suse.com/show_bug.cgi?id=1255628 * https://bugzilla.suse.com/show_bug.cgi?id=1255629 * https://bugzilla.suse.com/show_bug.cgi?id=1255630 * https://bugzilla.suse.com/show_bug.cgi?id=1255632 * https://bugzilla.suse.com/show_bug.cgi?id=1255636 * https://bugzilla.suse.com/show_bug.cgi?id=1255688 * https://bugzilla.suse.com/show_bug.cgi?id=1255691 * https://bugzilla.suse.com/show_bug.cgi?id=1255702 * https://bugzilla.suse.com/show_bug.cgi?id=1255704 * https://bugzilla.suse.com/show_bug.cgi?id=1255706 * https://bugzilla.suse.com/show_bug.cgi?id=1255722 * https://bugzilla.suse.com/show_bug.cgi?id=1255758 * https://bugzilla.suse.com/show_bug.cgi?id=1255759 * https://bugzilla.suse.com/show_bug.cgi?id=1255760 * https://bugzilla.suse.com/show_bug.cgi?id=1255763 * https://bugzilla.suse.com/show_bug.cgi?id=1255769 * https://bugzilla.suse.com/show_bug.cgi?id=1255770 * https://bugzilla.suse.com/show_bug.cgi?id=1255772 * https://bugzilla.suse.com/show_bug.cgi?id=1255774 * https://bugzilla.suse.com/show_bug.cgi?id=1255775 * https://bugzilla.suse.com/show_bug.cgi?id=1255776 * https://bugzilla.suse.com/show_bug.cgi?id=1255780 * https://bugzilla.suse.com/show_bug.cgi?id=1255785 * https://bugzilla.suse.com/show_bug.cgi?id=1255786 * https://bugzilla.suse.com/show_bug.cgi?id=1255789 * https://bugzilla.suse.com/show_bug.cgi?id=1255790 * https://bugzilla.suse.com/show_bug.cgi?id=1255792 * https://bugzilla.suse.com/show_bug.cgi?id=1255793 * https://bugzilla.suse.com/show_bug.cgi?id=1255795 * https://bugzilla.suse.com/show_bug.cgi?id=1255798 * https://bugzilla.suse.com/show_bug.cgi?id=1255800 * https://bugzilla.suse.com/show_bug.cgi?id=1255801 * https://bugzilla.suse.com/show_bug.cgi?id=1255806 * https://bugzilla.suse.com/show_bug.cgi?id=1255807 * https://bugzilla.suse.com/show_bug.cgi?id=1255809 * https://bugzilla.suse.com/show_bug.cgi?id=1255810 * https://bugzilla.suse.com/show_bug.cgi?id=1255812 * https://bugzilla.suse.com/show_bug.cgi?id=1255814 * https://bugzilla.suse.com/show_bug.cgi?id=1255820 * https://bugzilla.suse.com/show_bug.cgi?id=1255838 * https://bugzilla.suse.com/show_bug.cgi?id=1255842 * https://bugzilla.suse.com/show_bug.cgi?id=1255843 * https://bugzilla.suse.com/show_bug.cgi?id=1255872 * https://bugzilla.suse.com/show_bug.cgi?id=1255875 * https://bugzilla.suse.com/show_bug.cgi?id=1255879 * https://bugzilla.suse.com/show_bug.cgi?id=1255883 * https://bugzilla.suse.com/show_bug.cgi?id=1255884 * https://bugzilla.suse.com/show_bug.cgi?id=1255886 * https://bugzilla.suse.com/show_bug.cgi?id=1255888 * https://bugzilla.suse.com/show_bug.cgi?id=1255890 * https://bugzilla.suse.com/show_bug.cgi?id=1255891 * https://bugzilla.suse.com/show_bug.cgi?id=1255892 * https://bugzilla.suse.com/show_bug.cgi?id=1255899 * https://bugzilla.suse.com/show_bug.cgi?id=1255902 * https://bugzilla.suse.com/show_bug.cgi?id=1255907 * https://bugzilla.suse.com/show_bug.cgi?id=1255911 * https://bugzilla.suse.com/show_bug.cgi?id=1255915 * https://bugzilla.suse.com/show_bug.cgi?id=1255918 * https://bugzilla.suse.com/show_bug.cgi?id=1255921 * https://bugzilla.suse.com/show_bug.cgi?id=1255924 * https://bugzilla.suse.com/show_bug.cgi?id=1255925 * https://bugzilla.suse.com/show_bug.cgi?id=1255931 * https://bugzilla.suse.com/show_bug.cgi?id=1255932 * https://bugzilla.suse.com/show_bug.cgi?id=1255934 * https://bugzilla.suse.com/show_bug.cgi?id=1255943 * https://bugzilla.suse.com/show_bug.cgi?id=1255944 * https://bugzilla.suse.com/show_bug.cgi?id=1255949 * https://bugzilla.suse.com/show_bug.cgi?id=1255951 * https://bugzilla.suse.com/show_bug.cgi?id=1255952 * https://bugzilla.suse.com/show_bug.cgi?id=1255955 * https://bugzilla.suse.com/show_bug.cgi?id=1255957 * https://bugzilla.suse.com/show_bug.cgi?id=1255961 * https://bugzilla.suse.com/show_bug.cgi?id=1255963 * https://bugzilla.suse.com/show_bug.cgi?id=1255964 * https://bugzilla.suse.com/show_bug.cgi?id=1255967 * https://bugzilla.suse.com/show_bug.cgi?id=1255974 * https://bugzilla.suse.com/show_bug.cgi?id=1255978 * https://bugzilla.suse.com/show_bug.cgi?id=1255984 * https://bugzilla.suse.com/show_bug.cgi?id=1255988 * https://bugzilla.suse.com/show_bug.cgi?id=1255990 * https://bugzilla.suse.com/show_bug.cgi?id=1255992 * https://bugzilla.suse.com/show_bug.cgi?id=1255993 * https://bugzilla.suse.com/show_bug.cgi?id=1255994 * https://bugzilla.suse.com/show_bug.cgi?id=1255996 * https://bugzilla.suse.com/show_bug.cgi?id=1256033 * https://bugzilla.suse.com/show_bug.cgi?id=1256034 * https://bugzilla.suse.com/show_bug.cgi?id=1256045 * https://bugzilla.suse.com/show_bug.cgi?id=1256050 * https://bugzilla.suse.com/show_bug.cgi?id=1256058 * https://bugzilla.suse.com/show_bug.cgi?id=1256071 * https://bugzilla.suse.com/show_bug.cgi?id=1256074 * https://bugzilla.suse.com/show_bug.cgi?id=1256081 * https://bugzilla.suse.com/show_bug.cgi?id=1256082 * https://bugzilla.suse.com/show_bug.cgi?id=1256083 * https://bugzilla.suse.com/show_bug.cgi?id=1256084 * https://bugzilla.suse.com/show_bug.cgi?id=1256085 * https://bugzilla.suse.com/show_bug.cgi?id=1256090 * https://bugzilla.suse.com/show_bug.cgi?id=1256093 * https://bugzilla.suse.com/show_bug.cgi?id=1256094 * https://bugzilla.suse.com/show_bug.cgi?id=1256095 * https://bugzilla.suse.com/show_bug.cgi?id=1256096 * https://bugzilla.suse.com/show_bug.cgi?id=1256099 * https://bugzilla.suse.com/show_bug.cgi?id=1256100 * https://bugzilla.suse.com/show_bug.cgi?id=1256104 * https://bugzilla.suse.com/show_bug.cgi?id=1256106 * https://bugzilla.suse.com/show_bug.cgi?id=1256107 * https://bugzilla.suse.com/show_bug.cgi?id=1256117 * https://bugzilla.suse.com/show_bug.cgi?id=1256119 * https://bugzilla.suse.com/show_bug.cgi?id=1256121 * https://bugzilla.suse.com/show_bug.cgi?id=1256145 * https://bugzilla.suse.com/show_bug.cgi?id=1256153 * https://bugzilla.suse.com/show_bug.cgi?id=1256178 * https://bugzilla.suse.com/show_bug.cgi?id=1256197 * https://bugzilla.suse.com/show_bug.cgi?id=1256231 * https://bugzilla.suse.com/show_bug.cgi?id=1256233 * https://bugzilla.suse.com/show_bug.cgi?id=1256234 * https://bugzilla.suse.com/show_bug.cgi?id=1256238 * https://bugzilla.suse.com/show_bug.cgi?id=1256263 * https://bugzilla.suse.com/show_bug.cgi?id=1256267 * https://bugzilla.suse.com/show_bug.cgi?id=1256268 * https://bugzilla.suse.com/show_bug.cgi?id=1256271 * https://bugzilla.suse.com/show_bug.cgi?id=1256273 * https://bugzilla.suse.com/show_bug.cgi?id=1256274 * https://bugzilla.suse.com/show_bug.cgi?id=1256279 * https://bugzilla.suse.com/show_bug.cgi?id=1256285 * https://bugzilla.suse.com/show_bug.cgi?id=1256291 * https://bugzilla.suse.com/show_bug.cgi?id=1256292 * https://bugzilla.suse.com/show_bug.cgi?id=1256300 * https://bugzilla.suse.com/show_bug.cgi?id=1256301 * https://bugzilla.suse.com/show_bug.cgi?id=1256302 * https://bugzilla.suse.com/show_bug.cgi?id=1256335 * https://bugzilla.suse.com/show_bug.cgi?id=1256348 * https://bugzilla.suse.com/show_bug.cgi?id=1256351 * https://bugzilla.suse.com/show_bug.cgi?id=1256354 * https://bugzilla.suse.com/show_bug.cgi?id=1256358 * https://bugzilla.suse.com/show_bug.cgi?id=1256361 * https://bugzilla.suse.com/show_bug.cgi?id=1256364 * https://bugzilla.suse.com/show_bug.cgi?id=1256367 * https://bugzilla.suse.com/show_bug.cgi?id=1256368 * https://bugzilla.suse.com/show_bug.cgi?id=1256369 * https://bugzilla.suse.com/show_bug.cgi?id=1256370 * https://bugzilla.suse.com/show_bug.cgi?id=1256371 * https://bugzilla.suse.com/show_bug.cgi?id=1256373 * https://bugzilla.suse.com/show_bug.cgi?id=1256375 * https://bugzilla.suse.com/show_bug.cgi?id=1256379 * https://bugzilla.suse.com/show_bug.cgi?id=1256387 * https://bugzilla.suse.com/show_bug.cgi?id=1256394 * https://bugzilla.suse.com/show_bug.cgi?id=1256395 * https://bugzilla.suse.com/show_bug.cgi?id=1256396 * https://bugzilla.suse.com/show_bug.cgi?id=1256528 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-3527 * https://jira.suse.com/browse/PED-4866 * https://jira.suse.com/browse/PED-5065 * https://jira.suse.com/browse/PED-5453 * https://jira.suse.com/browse/PED-5475 * https://jira.suse.com/browse/PED-5477 * https://jira.suse.com/browse/PED-5511 * https://jira.suse.com/browse/PED-6036 * https://jira.suse.com/browse/PED-6041 * https://jira.suse.com/browse/PED-6045 * https://jira.suse.com/browse/PED-6067 * https://jira.suse.com/browse/PED-6068 * https://jira.suse.com/browse/PED-6069 * https://jira.suse.com/browse/PED-6070 * https://jira.suse.com/browse/PED-6071 * https://jira.suse.com/browse/PED-6104 * https://jira.suse.com/browse/PED-6114 * https://jira.suse.com/browse/PED-6116 * https://jira.suse.com/browse/PED-6120 * https://jira.suse.com/browse/PED-6123 * https://jira.suse.com/browse/PED-6811 * https://jira.suse.com/browse/PED-7514 * https://jira.suse.com/browse/PED-7542 * https://jira.suse.com/browse/PED-7779 * https://jira.suse.com/browse/PED-7780
Attachment: None (type=text/html)
(HTML attachment elided)
