SUSE 5575 Published by

Several security updates have been released for SUSE Linux. Moderate-risk updates include patches for gosec, cockpit, and several libraries like libudisks2 and libwireshark19. Important-security updates also exist for kubevirt, kernel livepatch, Linux Kernel, libsoup2, and containerized-data-importer.

openSUSE-SU-2026:10270-1: moderate: gosec-2.24.0-1.1 on GA media
openSUSE-SU-2026:10268-1: moderate: cockpit-356-2.1 on GA media
openSUSE-SU-2026:10273-1: moderate: libudisks2-0-2.11.0-2.1 on GA media
openSUSE-SU-2026:10267-1: moderate: ImageMagick-7.1.2.15-1.1 on GA media
openSUSE-SU-2026:10269-1: moderate: cockpit-podman-120-2.1 on GA media
openSUSE-SU-2026:20281-1: important: Security update for kubevirt
openSUSE-SU-2026:20288-1: important: Security update for the initial kernel livepatch
openSUSE-SU-2026:20287-1: important: Security update for the Linux Kernel
openSUSE-SU-2026:20283-1: important: Security update for libsoup2
openSUSE-SU-2026:20279-1: important: Security update for containerized-data-importer
openSUSE-SU-2026:10274-1: moderate: libwireshark19-4.6.4-1.1 on GA media
openSUSE-SU-2026:10272-1: moderate: libIex-3_4-33-3.4.5-1.1 on GA media
openSUSE-SU-2026:10271-1: moderate: libjxl-devel-0.11.2-1.1 on GA media




openSUSE-SU-2026:10270-1: moderate: gosec-2.24.0-1.1 on GA media


# gosec-2.24.0-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10270-1
Rating: moderate

Cross-References:

* CVE-2025-22891

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the gosec-2.24.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* gosec 2.24.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-22891.html



openSUSE-SU-2026:10268-1: moderate: cockpit-356-2.1 on GA media


# cockpit-356-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10268-1
Rating: moderate

Cross-References:

* CVE-2026-25547

CVSS scores:

* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the cockpit-356-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* cockpit 356-2.1
* cockpit-bridge 356-2.1
* cockpit-devel 356-2.1
* cockpit-doc 356-2.1
* cockpit-firewalld 356-2.1
* cockpit-kdump 356-2.1
* cockpit-networkmanager 356-2.1
* cockpit-packagekit 356-2.1
* cockpit-selinux 356-2.1
* cockpit-storaged 356-2.1
* cockpit-system 356-2.1
* cockpit-ws 356-2.1
* cockpit-ws-selinux 356-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:10273-1: moderate: libudisks2-0-2.11.0-2.1 on GA media


# libudisks2-0-2.11.0-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10273-1
Rating: moderate

Cross-References:

* CVE-2026-26103
* CVE-2026-26104

CVSS scores:

* CVE-2026-26103 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-26103 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-26104 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libudisks2-0-2.11.0-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libudisks2-0 2.11.0-2.1
* libudisks2-0-devel 2.11.0-2.1
* libudisks2-0_btrfs 2.11.0-2.1
* libudisks2-0_lsm 2.11.0-2.1
* libudisks2-0_lvm2 2.11.0-2.1
* typelib-1_0-UDisks-2_0 2.11.0-2.1
* udisks2 2.11.0-2.1
* udisks2-bash-completion 2.11.0-2.1
* udisks2-docs 2.11.0-2.1
* udisks2-lang 2.11.0-2.1
* udisks2-zsh-completion 2.11.0-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-26103.html
* https://www.suse.com/security/cve/CVE-2026-26104.html



openSUSE-SU-2026:10267-1: moderate: ImageMagick-7.1.2.15-1.1 on GA media


# ImageMagick-7.1.2.15-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10267-1
Rating: moderate

Cross-References:

* CVE-2026-24481
* CVE-2026-24485
* CVE-2026-25576
* CVE-2026-25637
* CVE-2026-25638
* CVE-2026-25794
* CVE-2026-25795
* CVE-2026-25796
* CVE-2026-25797
* CVE-2026-25798
* CVE-2026-25799
* CVE-2026-25897
* CVE-2026-25898
* CVE-2026-25965
* CVE-2026-25966
* CVE-2026-25967
* CVE-2026-25968
* CVE-2026-25969
* CVE-2026-25970
* CVE-2026-25971
* CVE-2026-25982
* CVE-2026-25983
* CVE-2026-25985
* CVE-2026-25986
* CVE-2026-25987
* CVE-2026-25988
* CVE-2026-25989
* CVE-2026-26066
* CVE-2026-26283
* CVE-2026-26284
* CVE-2026-26983

CVSS scores:

* CVE-2026-24481 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-24485 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2026-25576 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2026-25637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25637 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25638 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25638 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25794 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-25795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25795 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25797 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L
* CVE-2026-25798 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25798 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25799 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25799 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25897 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-25897 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25898 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-25898 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25965 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2026-25965 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2026-25966 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-25966 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25967 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2026-25967 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25968 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-25968 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25970 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25970 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25971 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25971 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25982 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-25982 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25983 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25983 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25985 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25985 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-25986 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25986 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25987 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-25987 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-25988 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-25988 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-25989 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25989 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26066 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26066 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26283 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-26283 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-26284 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-26284 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-26983 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-26983 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 31 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the ImageMagick-7.1.2.15-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* ImageMagick 7.1.2.15-1.1
* ImageMagick-config-7-SUSE 7.1.2.15-1.1
* ImageMagick-devel 7.1.2.15-1.1
* ImageMagick-devel-32bit 7.1.2.15-1.1
* ImageMagick-doc 7.1.2.15-1.1
* ImageMagick-extra 7.1.2.15-1.1
* libMagick++-7_Q16HDRI5 7.1.2.15-1.1
* libMagick++-7_Q16HDRI5-32bit 7.1.2.15-1.1
* libMagick++-devel 7.1.2.15-1.1
* libMagick++-devel-32bit 7.1.2.15-1.1
* libMagickCore-7_Q16HDRI10 7.1.2.15-1.1
* libMagickCore-7_Q16HDRI10-32bit 7.1.2.15-1.1
* libMagickWand-7_Q16HDRI10 7.1.2.15-1.1
* libMagickWand-7_Q16HDRI10-32bit 7.1.2.15-1.1
* perl-PerlMagick 7.1.2.15-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24481.html
* https://www.suse.com/security/cve/CVE-2026-24485.html
* https://www.suse.com/security/cve/CVE-2026-25576.html
* https://www.suse.com/security/cve/CVE-2026-25637.html
* https://www.suse.com/security/cve/CVE-2026-25638.html
* https://www.suse.com/security/cve/CVE-2026-25794.html
* https://www.suse.com/security/cve/CVE-2026-25795.html
* https://www.suse.com/security/cve/CVE-2026-25796.html
* https://www.suse.com/security/cve/CVE-2026-25797.html
* https://www.suse.com/security/cve/CVE-2026-25798.html
* https://www.suse.com/security/cve/CVE-2026-25799.html
* https://www.suse.com/security/cve/CVE-2026-25897.html
* https://www.suse.com/security/cve/CVE-2026-25898.html
* https://www.suse.com/security/cve/CVE-2026-25965.html
* https://www.suse.com/security/cve/CVE-2026-25966.html
* https://www.suse.com/security/cve/CVE-2026-25967.html
* https://www.suse.com/security/cve/CVE-2026-25968.html
* https://www.suse.com/security/cve/CVE-2026-25969.html
* https://www.suse.com/security/cve/CVE-2026-25970.html
* https://www.suse.com/security/cve/CVE-2026-25971.html
* https://www.suse.com/security/cve/CVE-2026-25982.html
* https://www.suse.com/security/cve/CVE-2026-25983.html
* https://www.suse.com/security/cve/CVE-2026-25985.html
* https://www.suse.com/security/cve/CVE-2026-25986.html
* https://www.suse.com/security/cve/CVE-2026-25987.html
* https://www.suse.com/security/cve/CVE-2026-25988.html
* https://www.suse.com/security/cve/CVE-2026-25989.html
* https://www.suse.com/security/cve/CVE-2026-26066.html
* https://www.suse.com/security/cve/CVE-2026-26283.html
* https://www.suse.com/security/cve/CVE-2026-26284.html
* https://www.suse.com/security/cve/CVE-2026-26983.html



openSUSE-SU-2026:10269-1: moderate: cockpit-podman-120-2.1 on GA media


# cockpit-podman-120-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10269-1
Rating: moderate

Cross-References:

* CVE-2026-25547

CVSS scores:

* CVE-2026-25547 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-25547 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the cockpit-podman-120-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* cockpit-podman 120-2.1

## References:

* https://www.suse.com/security/cve/CVE-2026-25547.html



openSUSE-SU-2026:20281-1: important: Security update for kubevirt


openSUSE security update: security update for kubevirt
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20281-1
Rating: important
References:

* bsc#1241772
* bsc#1253181
* bsc#1253185
* bsc#1253186
* bsc#1253189
* bsc#1253194
* bsc#1253748
* bsc#1257128
* bsc#1257422

Cross-References:

* CVE-2024-45310
* CVE-2025-22872
* CVE-2025-64324
* CVE-2025-64432
* CVE-2025-64433
* CVE-2025-64434
* CVE-2025-64435
* CVE-2025-64437

CVSS scores:

* CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
* CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
* CVE-2025-22872 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2025-64324 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-64324 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-64432 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-64432 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-64433 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-64433 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-64434 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-64434 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-64435 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-64435 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-64437 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-64437 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 8 vulnerabilities and has 9 bug fixes can now be installed.

Description:

This update for kubevirt fixes the following issues:

Update to version 1.7.0 (bsc#1257128).

Security issues fixed:

- CVE-2025-64435: logic flaw in the virt-controller can lead to incorrect status updates and potentially causing a DoS
(bsc#1253189).
- CVE-2024-45310: kubevirt vendored github.com/opencontainers/runc/libcontainer/utils: runc can be tricked into
creating empty files/directories on host (bsc#1257422).
- CVE-2025-22872: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction
(bsc#1241772).
- CVE-2025-64432: fail to correctly validate certain fields in the client TLS certificate may allow an attacker to
bypass existing RBAC controls (bsc#1253181).
- CVE-2025-64433: improper symlink handling can allow to read arbitrary files (bsc#1253185).
- CVE-2025-64434: compromising virt-handler instance can lead to impersonate virt-api and execute privileged operations
(bsc#1253186).
- CVE-2025-64437: mishandling of symlinks can lead to compromising the CIA (bsc#1253194).
- CVE-2025-64324: a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users
(bsc#1253748).

Other updates and bugfixes:

- Upstream now uses stateless firmware for CoCo VMs.

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-319=1

Package List:

- openSUSE Leap 16.0:

kubevirt-container-disk-1.7.0-160000.1.1
kubevirt-manifests-1.7.0-160000.1.1
kubevirt-pr-helper-conf-1.7.0-160000.1.1
kubevirt-sidecar-shim-1.7.0-160000.1.1
kubevirt-tests-1.7.0-160000.1.1
kubevirt-virt-api-1.7.0-160000.1.1
kubevirt-virt-controller-1.7.0-160000.1.1
kubevirt-virt-exportproxy-1.7.0-160000.1.1
kubevirt-virt-exportserver-1.7.0-160000.1.1
kubevirt-virt-handler-1.7.0-160000.1.1
kubevirt-virt-launcher-1.7.0-160000.1.1
kubevirt-virt-operator-1.7.0-160000.1.1
kubevirt-virt-synchronization-controller-1.7.0-160000.1.1
kubevirt-virtctl-1.7.0-160000.1.1
obs-service-kubevirt_containers_meta-1.7.0-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2024-45310.html
* https://www.suse.com/security/cve/CVE-2025-22872.html
* https://www.suse.com/security/cve/CVE-2025-64324.html
* https://www.suse.com/security/cve/CVE-2025-64432.html
* https://www.suse.com/security/cve/CVE-2025-64433.html
* https://www.suse.com/security/cve/CVE-2025-64434.html
* https://www.suse.com/security/cve/CVE-2025-64435.html
* https://www.suse.com/security/cve/CVE-2025-64437.html



openSUSE-SU-2026:20288-1: important: Security update for the initial kernel livepatch


openSUSE security update: security update for the initial kernel livepatch
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20288-1
Rating: important

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves various issues can now be installed.

Description:

This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update.

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-326=1

Package List:

- openSUSE Leap 16.0:

kernel-livepatch-6_12_0-160000_26-default-1-160000.1.1
kernel-livepatch-6_12_0-160000_26-rt-1-160000.1.1



openSUSE-SU-2026:20287-1: important: Security update for the Linux Kernel


openSUSE security update: security update for the linux kernel
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20287-1
Rating: important
References:

* bsc#1205462
* bsc#1214285
* bsc#1215199
* bsc#1235905
* bsc#1242505
* bsc#1242974
* bsc#1242986
* bsc#1243452
* bsc#1243507
* bsc#1243662
* bsc#1246184
* bsc#1246282
* bsc#1247030
* bsc#1247292
* bsc#1247712
* bsc#1248166
* bsc#1248175
* bsc#1248178
* bsc#1248179
* bsc#1248185
* bsc#1248188
* bsc#1248196
* bsc#1248206
* bsc#1248208
* bsc#1248209
* bsc#1248211
* bsc#1248212
* bsc#1248213
* bsc#1248214
* bsc#1248216
* bsc#1248217
* bsc#1248222
* bsc#1248227
* bsc#1248228
* bsc#1248229
* bsc#1248232
* bsc#1248234
* bsc#1248240
* bsc#1248360
* bsc#1248366
* bsc#1248384
* bsc#1248626
* bsc#1249307
* bsc#1249609
* bsc#1249895
* bsc#1249998
* bsc#1250032
* bsc#1250082
* bsc#1250388
* bsc#1250705
* bsc#1250738
* bsc#1250748
* bsc#1252712
* bsc#1252773
* bsc#1252784
* bsc#1252891
* bsc#1252900
* bsc#1253049
* bsc#1253078
* bsc#1253079
* bsc#1253087
* bsc#1253344
* bsc#1253500
* bsc#1253739
* bsc#1254244
* bsc#1254308
* bsc#1254447
* bsc#1254839
* bsc#1254842
* bsc#1254845
* bsc#1254977
* bsc#1255102
* bsc#1255128
* bsc#1255157
* bsc#1255164
* bsc#1255172
* bsc#1255216
* bsc#1255232
* bsc#1255241
* bsc#1255245
* bsc#1255266
* bsc#1255268
* bsc#1255269
* bsc#1255319
* bsc#1255327
* bsc#1255346
* bsc#1255403
* bsc#1255417
* bsc#1255459
* bsc#1255482
* bsc#1255506
* bsc#1255526
* bsc#1255527
* bsc#1255529
* bsc#1255530
* bsc#1255536
* bsc#1255537
* bsc#1255542
* bsc#1255544
* bsc#1255547
* bsc#1255569
* bsc#1255593
* bsc#1255622
* bsc#1255694
* bsc#1255695
* bsc#1255703
* bsc#1255708
* bsc#1255811
* bsc#1255930
* bsc#1256579
* bsc#1256582
* bsc#1256584
* bsc#1256586
* bsc#1256591
* bsc#1256592
* bsc#1256593
* bsc#1256594
* bsc#1256597
* bsc#1256605
* bsc#1256607
* bsc#1256608
* bsc#1256609
* bsc#1256610
* bsc#1256611
* bsc#1256612
* bsc#1256613
* bsc#1256616
* bsc#1256617
* bsc#1256619
* bsc#1256622
* bsc#1256623
* bsc#1256625
* bsc#1256627
* bsc#1256628
* bsc#1256630
* bsc#1256632
* bsc#1256638
* bsc#1256641
* bsc#1256643
* bsc#1256645
* bsc#1256646
* bsc#1256650
* bsc#1256651
* bsc#1256653
* bsc#1256654
* bsc#1256655
* bsc#1256656
* bsc#1256659
* bsc#1256660
* bsc#1256661
* bsc#1256664
* bsc#1256665
* bsc#1256667
* bsc#1256668
* bsc#1256674
* bsc#1256677
* bsc#1256680
* bsc#1256682
* bsc#1256683
* bsc#1256688
* bsc#1256689
* bsc#1256716
* bsc#1256726
* bsc#1256728
* bsc#1256730
* bsc#1256733
* bsc#1256737
* bsc#1256741
* bsc#1256742
* bsc#1256744
* bsc#1256748
* bsc#1256749
* bsc#1256752
* bsc#1256754
* bsc#1256755
* bsc#1256756
* bsc#1256757
* bsc#1256759
* bsc#1256760
* bsc#1256761
* bsc#1256763
* bsc#1256770
* bsc#1256773
* bsc#1256774
* bsc#1256777
* bsc#1256779
* bsc#1256781
* bsc#1256785
* bsc#1256792
* bsc#1256793
* bsc#1256794
* bsc#1256864
* bsc#1256865
* bsc#1256867
* bsc#1256975
* bsc#1257015
* bsc#1257035
* bsc#1257053
* bsc#1257154
* bsc#1257155
* bsc#1257158
* bsc#1257159
* bsc#1257163
* bsc#1257164
* bsc#1257167
* bsc#1257168
* bsc#1257179
* bsc#1257180
* bsc#1257202
* bsc#1257204
* bsc#1257207
* bsc#1257208
* bsc#1257215
* bsc#1257217
* bsc#1257218
* bsc#1257220
* bsc#1257221
* bsc#1257225
* bsc#1257227
* bsc#1257232
* bsc#1257234
* bsc#1257236
* bsc#1257243
* bsc#1257245
* bsc#1257276
* bsc#1257277
* bsc#1257279
* bsc#1257282
* bsc#1257296
* bsc#1257309
* bsc#1257473
* bsc#1257504
* bsc#1257603

Cross-References:

* CVE-2024-54031
* CVE-2025-37744
* CVE-2025-37751
* CVE-2025-37841
* CVE-2025-37845
* CVE-2025-37904
* CVE-2025-37955
* CVE-2025-38243
* CVE-2025-38262
* CVE-2025-38297
* CVE-2025-38298
* CVE-2025-38379
* CVE-2025-38423
* CVE-2025-38505
* CVE-2025-38507
* CVE-2025-38510
* CVE-2025-38511
* CVE-2025-38512
* CVE-2025-38513
* CVE-2025-38515
* CVE-2025-38516
* CVE-2025-38520
* CVE-2025-38521
* CVE-2025-38529
* CVE-2025-38530
* CVE-2025-38535
* CVE-2025-38537
* CVE-2025-38538
* CVE-2025-38539
* CVE-2025-38540
* CVE-2025-38541
* CVE-2025-38543
* CVE-2025-38547
* CVE-2025-38548
* CVE-2025-38550
* CVE-2025-38551
* CVE-2025-38569
* CVE-2025-38589
* CVE-2025-38590
* CVE-2025-38645
* CVE-2025-39689
* CVE-2025-39795
* CVE-2025-39813
* CVE-2025-39814
* CVE-2025-39817
* CVE-2025-39829
* CVE-2025-39880
* CVE-2025-39913
* CVE-2025-39927
* CVE-2025-40030
* CVE-2025-40045
* CVE-2025-40097
* CVE-2025-40106
* CVE-2025-40147
* CVE-2025-40195
* CVE-2025-40257
* CVE-2025-40259
* CVE-2025-40261
* CVE-2025-40363
* CVE-2025-68174
* CVE-2025-68178
* CVE-2025-68188
* CVE-2025-68200
* CVE-2025-68211
* CVE-2025-68218
* CVE-2025-68227
* CVE-2025-68241
* CVE-2025-68245
* CVE-2025-68261
* CVE-2025-68296
* CVE-2025-68297
* CVE-2025-68320
* CVE-2025-68325
* CVE-2025-68337
* CVE-2025-68341
* CVE-2025-68348
* CVE-2025-68349
* CVE-2025-68356
* CVE-2025-68359
* CVE-2025-68360
* CVE-2025-68361
* CVE-2025-68366
* CVE-2025-68367
* CVE-2025-68368
* CVE-2025-68372
* CVE-2025-68374
* CVE-2025-68376
* CVE-2025-68379
* CVE-2025-68725
* CVE-2025-68735
* CVE-2025-68741
* CVE-2025-68743
* CVE-2025-68764
* CVE-2025-68768
* CVE-2025-68770
* CVE-2025-68771
* CVE-2025-68773
* CVE-2025-68775
* CVE-2025-68776
* CVE-2025-68777
* CVE-2025-68778
* CVE-2025-68783
* CVE-2025-68784
* CVE-2025-68788
* CVE-2025-68789
* CVE-2025-68792
* CVE-2025-68795
* CVE-2025-68797
* CVE-2025-68798
* CVE-2025-68799
* CVE-2025-68800
* CVE-2025-68801
* CVE-2025-68802
* CVE-2025-68803
* CVE-2025-68804
* CVE-2025-68808
* CVE-2025-68811
* CVE-2025-68813
* CVE-2025-68814
* CVE-2025-68815
* CVE-2025-68816
* CVE-2025-68819
* CVE-2025-68820
* CVE-2025-68821
* CVE-2025-68822
* CVE-2025-71064
* CVE-2025-71066
* CVE-2025-71073
* CVE-2025-71076
* CVE-2025-71077
* CVE-2025-71078
* CVE-2025-71079
* CVE-2025-71080
* CVE-2025-71081
* CVE-2025-71082
* CVE-2025-71083
* CVE-2025-71084
* CVE-2025-71085
* CVE-2025-71086
* CVE-2025-71087
* CVE-2025-71088
* CVE-2025-71089
* CVE-2025-71091
* CVE-2025-71093
* CVE-2025-71094
* CVE-2025-71095
* CVE-2025-71097
* CVE-2025-71098
* CVE-2025-71099
* CVE-2025-71100
* CVE-2025-71101
* CVE-2025-71108
* CVE-2025-71111
* CVE-2025-71112
* CVE-2025-71113
* CVE-2025-71114
* CVE-2025-71116
* CVE-2025-71118
* CVE-2025-71119
* CVE-2025-71120
* CVE-2025-71123
* CVE-2025-71126
* CVE-2025-71130
* CVE-2025-71131
* CVE-2025-71132
* CVE-2025-71133
* CVE-2025-71135
* CVE-2025-71136
* CVE-2025-71137
* CVE-2025-71138
* CVE-2025-71141
* CVE-2025-71142
* CVE-2025-71143
* CVE-2025-71145
* CVE-2025-71147
* CVE-2025-71148
* CVE-2025-71149
* CVE-2025-71154
* CVE-2025-71156
* CVE-2025-71157
* CVE-2025-71162
* CVE-2025-71163
* CVE-2026-22976
* CVE-2026-22977
* CVE-2026-22978
* CVE-2026-22981
* CVE-2026-22982
* CVE-2026-22984
* CVE-2026-22985
* CVE-2026-22986
* CVE-2026-22988
* CVE-2026-22989
* CVE-2026-22990
* CVE-2026-22991
* CVE-2026-22992
* CVE-2026-22993
* CVE-2026-22996
* CVE-2026-22997
* CVE-2026-22999
* CVE-2026-23000
* CVE-2026-23001
* CVE-2026-23002
* CVE-2026-23005
* CVE-2026-23006
* CVE-2026-23011

CVSS scores:

* CVE-2024-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54031 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37744 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37744 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37841 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37904 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37904 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37955 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38243 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38262 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38423 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38505 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38505 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38507 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38510 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38511 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38511 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38512 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-38512 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38513 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38513 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38515 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38515 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38520 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38520 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38529 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38529 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38530 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38530 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38540 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38540 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38541 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38543 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38547 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38547 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38550 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38551 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38569 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38589 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38590 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38590 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39795 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39913 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39927 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39927 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40045 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40045 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40147 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40195 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40257 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40363 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40363 ( SUSE ): 2 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-68174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68188 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-68188 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68245 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68366 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68368 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68372 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68374 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68374 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68379 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68735 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68735 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68741 ( SUSE ): 6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68741 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68743 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68743 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68764 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-68764 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-68768 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68768 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68770 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68770 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68771 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68775 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68775 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68776 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68776 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68777 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-68777 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68778 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68778 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68783 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68783 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68784 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68788 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-68788 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68789 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68792 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68792 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68795 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-68795 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68798 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68798 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68799 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-68799 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-68800 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68800 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68801 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68801 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68802 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-68802 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-68803 ( SUSE ): 4.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-68803 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68804 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68804 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68813 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68814 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68820 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71066 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71073 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71073 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71080 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-71080 ( SUSE ): 2 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-71081 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71081 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71084 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-71084 ( SUSE ): 2 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-71085 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71085 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71086 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71086 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71087 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-71087 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71088 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71088 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71089 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71089 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71091 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71091 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71093 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-71093 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-71094 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-71094 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-71095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71097 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71099 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71099 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71100 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2025-71100 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71101 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2025-71101 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71108 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71112 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71112 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-71113 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71114 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-71114 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-71116 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71119 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-71119 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71120 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71123 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-71123 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71145 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71147 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71147 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71148 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71148 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-71149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71157 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22976 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22977 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-22977 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22978 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-22981 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22984 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22985 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22985 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22986 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22986 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22988 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-22988 ( SUSE ): 6 CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22990 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22990 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22992 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22993 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22993 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22999 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-22999 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23000 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23001 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23001 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23002 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23005 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2026-23005 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 205 vulnerabilities and has 233 bug fixes can now be installed.

Description:

The SUSE Linux Enterprise 16.0 and SL MIxro 6.2 kernel was updated to fix various security issues

The following security issues were fixed:

- CVE-2025-40147: blk-throttle: fix access race during throttle policy activation (bsc#1253344).
- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).
- CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
- CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() (bsc#1254839).
- CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output (bsc#1255102).
- CVE-2025-68174: amd/amdkfd: enhance kfd process check in switch partition (bsc#1255327).
- CVE-2025-68178: blk-cgroup: fix possible deadlock while configuring policy (bsc#1255266).
- CVE-2025-68188: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
- CVE-2025-68200: bpf: Add bpf_prog_run_data_pointers() (bsc#1255241).
- CVE-2025-68211: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item (bsc#1255319).
- CVE-2025-68218: nvme-multipath: fix lockdep WARN due to partition scan work (bsc#1255245).
- CVE-2025-68227: mptcp: Fix proto fallback detection with BPF (bsc#1255216).
- CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe (bsc#1255157).
- CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing incorrect cleanup (bsc#1255268).
- CVE-2025-68261: ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock() (bsc#1255164).
- CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup (bsc#1255128).
- CVE-2025-68297: ceph: fix crash in process_v2_sparse_read() for encrypted directories (bsc#1255403).
- CVE-2025-68320: lan966x: Fix sleeping in atomic context (bsc#1255172).
- CVE-2025-68325: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop (bsc#1255417).
- CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted (bsc#1255482).
- CVE-2025-68341: veth: reduce XDP no_direct return section to fix race (bsc#1255506).
- CVE-2025-68348: block: fix memory leak in __blkdev_issue_zero_pages (bsc#1255694).
- CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid (bsc#1255544).
- CVE-2025-68356: gfs2: Prevent recursive memory reclaim (bsc#1255593).
- CVE-2025-68359: btrfs: fix double free of qgroup record after failure to add delayed ref head (bsc#1255542).
- CVE-2025-68360: wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks (bsc#1255536).
- CVE-2025-68361: erofs: limit the level of fs stacking for file-backed mounts (bsc#1255526).
- CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
- CVE-2025-68367: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse (bsc#1255547).
- CVE-2025-68368: md: init bioset in mddev_init (bsc#1255527).
- CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
- CVE-2025-68374: md: fix rcu protection in md_wakeup_thread (bsc#1255530).
- CVE-2025-68376: coresight: ETR: Fix ETR buffer use-after-free issue (bsc#1255529).
- CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure (bsc#1255695).
- CVE-2025-68735: drm/panthor: Prevent potential UAF in group creation (bsc#1255811).
- CVE-2025-68741: scsi: qla2xxx: Fix improper freeing of purex item (bsc#1255703).
- CVE-2025-68743: mshv: Fix create memory region overlap check (bsc#1255708).
- CVE-2025-68764: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags (bsc#1255930).
- CVE-2025-68768: inet: frags: add inet_frag_queue_flush() (bsc#1256579).
- CVE-2025-68770: bnxt_en: Fix XDP_TX path (bsc#1256584).
- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).
- CVE-2025-68775: net/handshake: duplicate handshake cancellations leak socket (bsc#1256665).
- CVE-2025-68776: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() (bsc#1256659).
- CVE-2025-68784: xfs: fix a UAF problem in xattr repair (bsc#1256793).
- CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for special files (bsc#1256638).
- CVE-2025-68792: tpm2-sessions: Fix out of range indexing in name_size (bsc#1256656).
- CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query (bsc#1256688).
- CVE-2025-68798: perf/x86/amd: Check event before enable to avoid GPF (bsc#1256689).
- CVE-2025-68799: caif: fix integer underflow in cffrml_receive() (bsc#1256643).
- CVE-2025-68800: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats (bsc#1256646).
- CVE-2025-68801: mlxsw: spectrum_router: Fix neighbour use-after-free (bsc#1256653).
- CVE-2025-68803: NFSD: NFSv4 file creation neglects setting ACL (bsc#1256770).
- CVE-2025-68811: svcrdma: use rc_pageoff for memcpy byte offset (bsc#1256677).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-68814: io_uring: fix filename leak in __io_openat_prep() (bsc#1256651).
- CVE-2025-68815: net/sched: ets: Remove drr class from the active list if it changes to strict (bsc#1256680).
- CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters (bsc#1256674).
- CVE-2025-68820: ext4: xattr: fix null pointer deref in ext4_raw_inode() (bsc#1256754).
- CVE-2025-68821: fuse: fix readahead reclaim deadlock (bsc#1256667).
- CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for resources (bsc#1256654).
- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).
- CVE-2025-71077: tpm: Cap the number of PCR banks (bsc#1256613).
- CVE-2025-71080: ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT (bsc#1256608).
- CVE-2025-71084: RDMA/cm: Fix leaking the multicast GID table reference (bsc#1256622).
- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).
- CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg() (bsc#1256628).
- CVE-2025-71088: mptcp: fallback earlier on simult connection (bsc#1256630).
- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).
- CVE-2025-71091: team: fix check for port enabled in team_queue_override_port_prio_changed() (bsc#1256773).
- CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
- CVE-2025-71094: net: usb: asix: ax88772: Increase phy_name size (bsc#1256597).
- CVE-2025-71095: net: stmmac: fix the crash issue for zero copy XDP_TX action (bsc#1256605).
- CVE-2025-71097: ipv4: Fix reference count leak when using error routes with nexthop objects (bsc#1256607).
- CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
- CVE-2025-71123: ext4: fix string copying in parse_apply_sb_mount_options() (bsc#1256757).
- CVE-2025-71126: mptcp: avoid deadlock on fallback while reinjecting (bsc#1256755).
- CVE-2025-71132: smc91x: fix broken irq-context in PREEMPT_RT (bsc#1256737).
- CVE-2025-71133: RDMA/irdma: avoid invalid read in irdma_net_event (bsc#1256733).
- CVE-2025-71135: md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt() (bsc#1256761).
- CVE-2025-71137: octeontx2-pf: fix "UBSAN: shift-out-of-bounds error" (bsc#1256760).
- CVE-2025-71148: net/handshake: restore destructor on submit failure (bsc#1257159).
- CVE-2025-71149: io_uring/poll: correctly handle io_poll_add() return value on update (bsc#1257164).
- CVE-2025-71156: gve: defer interrupt enabling until NAPI registration (bsc#1257167).
- CVE-2025-71157: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() (bsc#1257168).
- CVE-2026-22976: net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset (bsc#1257035).
- CVE-2026-22977: net: sock: fix hardened usercopy panic in sock_recv_errqueue (bsc#1257053).
- CVE-2026-22981: idpf: detach and close netdevs while handling a reset (bsc#1257225).
- CVE-2026-22982: net: mscc: ocelot: Fix crash when adding interface under a lag (bsc#1257179).
- CVE-2026-22984: libceph: prevent potential out-of-bounds reads in handle_auth_done() (bsc#1257217).
- CVE-2026-22986: gpiolib: fix race condition for gdev->srcu (bsc#1257276).
- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).
- CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220).
- CVE-2026-22992: libceph: return the handler error from mon_handle_auth_done() (bsc#1257218).
- CVE-2026-22993: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations (bsc#1257180).
- CVE-2026-22996: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv.
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).
- CVE-2026-23000: net/mlx5e: Fix crash on profile change rollback failure (bsc#1257234).
- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).
- CVE-2026-23005: x86/fpu: Clear XSTATE_BV in guest XSAVE state whenever XFD[i]=1 (bsc#1257245).
- CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).

The following non security issues were fixed:

- ALSA: usb-audio: Update for native DSD support quirks (stable-fixes).
- Add bugnumber to an existing hv_netvsc change (bsc#1257473).
- Fix locking issue introduced by a CVE backport (bsc#1256975 bsc#1254977).
- Update config files: disable CONFIG_DEVPORT for arm64 (bsc#1256792)
- arm64: Update config files. Disable DEVPORT (bsc#1256792)
- bpf/selftests: test_select_reuseport_kern: Remove unused header (bsc#1257603).
- bpf: Do not let BPF test infra emit invalid GSO types to stack (bsc#1255569).
- btrfs: pass fs_info to btrfs_delete_ref_head() (git-fixes).
- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).
- bus: fsl-mc: Constify fsl_mc_device_match() (jsc#PED-10906 git-fixes).
- drm/imagination: Wait for FW trace update command completion (git-fixes).
- drm/msm/a6xx: fix bogus hwcg register updates (git-fixes).
- ice: use netif_get_num_default_rss_queues() (bsc#1247712).
- libbpf: Fix -Wdiscarded-qualifiers under C23 (bsc#1257309).
- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1254447 bsc#1253087).
- net: mana: Fix incorrect speed reported by debugfs (bsc#1255232).
- net: mana: Support HW link state events (bsc#1253049).
- nfsd: adjust WARN_ON_ONCE in revoke_delegation (bsc#1257015).
- nvme: nvme-fc: move tagset removal to nvme_fc_delete_ctrl() (git-fixes).
- powerpc/addnote: Fix overflow on 32-bit builds (bsc#1215199).
- sched/fair: Disable scheduler feature NEXT_BUDDY (bsc#1255459).
- scsi: lpfc: Rework lpfc_sli4_fcf_rr_next_index_get() (bsc#1256864).
- scsi: lpfc: Update lpfc version to 14.4.0.13 (bsc#1256864).
- scsi: qla2xxx: Add Speed in SFP print information (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add bsg interface to support firmware img validation (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add load flash firmware mailbox support for 28xxx (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Add support for 64G SFP speed (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Allow recovery for tape devices (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Delay module unload while fabric scan in progress (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Fix bsg_done() causing double free (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Free sp in error path to fix system crash (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Query FW again before proceeding with login (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Update version to 10.02.10.100-k (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Validate MCU signature before executing MBC 03h (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1256865 bsc#1256867 jsc#PED-14156).
- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).
- selftests: net: fib-onlink-tests: Convert to use namespaces by default (bsc#1255346).
- slimbus: core: Constify slim_eaddr_equal() (jsc#PED-10906 git-fixes).
- smb: client: split cached_fid bitfields to avoid shared-byte RMW races (bsc#1250748,bsc#1257154).
- smb: client: update cfid->last_access_time in open_cached_dir_by_dentry() (git-fixes).
- smb: improve directory cache reuse for readdir operations (bsc#1252712).
- tsm-mr: Add TVM Measurement Register support (bsc#1257504).
- tsm-mr: Add tsm-mr sample code (bsc#1257504).
- virt: tdx-guest: Expose TDX MRs as sysfs attributes (bsc#1257504).
- virt: tdx-guest: Refactor and streamline TDREPORT generation (bsc#1257504).
- virt: tdx-guest: Transition to scoped_cond_guard for mutex operations (bsc#1257504).
- wifi: mwifiex: Fix a loop in mwifiex_update_ampdu_rxwinsize() (git-fixes).
- x86/tdx: Add tdx_mcall_extend_rtmr() interface (bsc#1257504).
- x86/tdx: tdx_mcall_get_report0: Return -EBUSY on TDCALL_OPERAND_BUSY error (bsc#1257504).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-325=1

Package List:

- openSUSE Leap 16.0:

cluster-md-kmp-64kb-6.12.0-160000.26.1
cluster-md-kmp-azure-6.12.0-160000.26.1
cluster-md-kmp-default-6.12.0-160000.26.1
cluster-md-kmp-rt-6.12.0-160000.26.1
dlm-kmp-64kb-6.12.0-160000.26.1
dlm-kmp-azure-6.12.0-160000.26.1
dlm-kmp-default-6.12.0-160000.26.1
dlm-kmp-rt-6.12.0-160000.26.1
dtb-allwinner-6.12.0-160000.26.1
dtb-altera-6.12.0-160000.26.1
dtb-amazon-6.12.0-160000.26.1
dtb-amd-6.12.0-160000.26.1
dtb-amlogic-6.12.0-160000.26.1
dtb-apm-6.12.0-160000.26.1
dtb-apple-6.12.0-160000.26.1
dtb-arm-6.12.0-160000.26.1
dtb-broadcom-6.12.0-160000.26.1
dtb-cavium-6.12.0-160000.26.1
dtb-exynos-6.12.0-160000.26.1
dtb-freescale-6.12.0-160000.26.1
dtb-hisilicon-6.12.0-160000.26.1
dtb-lg-6.12.0-160000.26.1
dtb-marvell-6.12.0-160000.26.1
dtb-mediatek-6.12.0-160000.26.1
dtb-nvidia-6.12.0-160000.26.1
dtb-qcom-6.12.0-160000.26.1
dtb-renesas-6.12.0-160000.26.1
dtb-rockchip-6.12.0-160000.26.1
dtb-socionext-6.12.0-160000.26.1
dtb-sprd-6.12.0-160000.26.1
dtb-xilinx-6.12.0-160000.26.1
gfs2-kmp-64kb-6.12.0-160000.26.1
gfs2-kmp-azure-6.12.0-160000.26.1
gfs2-kmp-default-6.12.0-160000.26.1
gfs2-kmp-rt-6.12.0-160000.26.1
kernel-64kb-6.12.0-160000.26.1
kernel-64kb-devel-6.12.0-160000.26.1
kernel-64kb-extra-6.12.0-160000.26.1
kernel-64kb-optional-6.12.0-160000.26.1
kernel-azure-6.12.0-160000.26.1
kernel-azure-devel-6.12.0-160000.26.1
kernel-azure-extra-6.12.0-160000.26.1
kernel-azure-optional-6.12.0-160000.26.1
kernel-azure-vdso-6.12.0-160000.26.1
kernel-default-6.12.0-160000.26.1
kernel-default-base-6.12.0-160000.26.1.160000.2.7
kernel-default-devel-6.12.0-160000.26.1
kernel-default-extra-6.12.0-160000.26.1
kernel-default-optional-6.12.0-160000.26.1
kernel-default-vdso-6.12.0-160000.26.1
kernel-devel-6.12.0-160000.26.1
kernel-docs-6.12.0-160000.26.1
kernel-docs-html-6.12.0-160000.26.1
kernel-kvmsmall-6.12.0-160000.26.1
kernel-kvmsmall-devel-6.12.0-160000.26.1
kernel-kvmsmall-vdso-6.12.0-160000.26.1
kernel-macros-6.12.0-160000.26.1
kernel-obs-build-6.12.0-160000.26.1
kernel-obs-qa-6.12.0-160000.26.1
kernel-rt-6.12.0-160000.26.1
kernel-rt-devel-6.12.0-160000.26.1
kernel-rt-extra-6.12.0-160000.26.1
kernel-rt-optional-6.12.0-160000.26.1
kernel-rt-vdso-6.12.0-160000.26.1
kernel-source-6.12.0-160000.26.1
kernel-source-vanilla-6.12.0-160000.26.1
kernel-syms-6.12.0-160000.26.1
kernel-zfcpdump-6.12.0-160000.26.1
kselftests-kmp-64kb-6.12.0-160000.26.1
kselftests-kmp-azure-6.12.0-160000.26.1
kselftests-kmp-default-6.12.0-160000.26.1
kselftests-kmp-rt-6.12.0-160000.26.1
ocfs2-kmp-64kb-6.12.0-160000.26.1
ocfs2-kmp-azure-6.12.0-160000.26.1
ocfs2-kmp-default-6.12.0-160000.26.1
ocfs2-kmp-rt-6.12.0-160000.26.1

References:

* https://www.suse.com/security/cve/CVE-2024-54031.html
* https://www.suse.com/security/cve/CVE-2025-37744.html
* https://www.suse.com/security/cve/CVE-2025-37751.html
* https://www.suse.com/security/cve/CVE-2025-37841.html
* https://www.suse.com/security/cve/CVE-2025-37845.html
* https://www.suse.com/security/cve/CVE-2025-37904.html
* https://www.suse.com/security/cve/CVE-2025-37955.html
* https://www.suse.com/security/cve/CVE-2025-38243.html
* https://www.suse.com/security/cve/CVE-2025-38262.html
* https://www.suse.com/security/cve/CVE-2025-38297.html
* https://www.suse.com/security/cve/CVE-2025-38298.html
* https://www.suse.com/security/cve/CVE-2025-38379.html
* https://www.suse.com/security/cve/CVE-2025-38423.html
* https://www.suse.com/security/cve/CVE-2025-38505.html
* https://www.suse.com/security/cve/CVE-2025-38507.html
* https://www.suse.com/security/cve/CVE-2025-38510.html
* https://www.suse.com/security/cve/CVE-2025-38511.html
* https://www.suse.com/security/cve/CVE-2025-38512.html
* https://www.suse.com/security/cve/CVE-2025-38513.html
* https://www.suse.com/security/cve/CVE-2025-38515.html
* https://www.suse.com/security/cve/CVE-2025-38516.html
* https://www.suse.com/security/cve/CVE-2025-38520.html
* https://www.suse.com/security/cve/CVE-2025-38521.html
* https://www.suse.com/security/cve/CVE-2025-38529.html
* https://www.suse.com/security/cve/CVE-2025-38530.html
* https://www.suse.com/security/cve/CVE-2025-38535.html
* https://www.suse.com/security/cve/CVE-2025-38537.html
* https://www.suse.com/security/cve/CVE-2025-38538.html
* https://www.suse.com/security/cve/CVE-2025-38539.html
* https://www.suse.com/security/cve/CVE-2025-38540.html
* https://www.suse.com/security/cve/CVE-2025-38541.html
* https://www.suse.com/security/cve/CVE-2025-38543.html
* https://www.suse.com/security/cve/CVE-2025-38547.html
* https://www.suse.com/security/cve/CVE-2025-38548.html
* https://www.suse.com/security/cve/CVE-2025-38550.html
* https://www.suse.com/security/cve/CVE-2025-38551.html
* https://www.suse.com/security/cve/CVE-2025-38569.html
* https://www.suse.com/security/cve/CVE-2025-38589.html
* https://www.suse.com/security/cve/CVE-2025-38590.html
* https://www.suse.com/security/cve/CVE-2025-38645.html
* https://www.suse.com/security/cve/CVE-2025-39689.html
* https://www.suse.com/security/cve/CVE-2025-39795.html
* https://www.suse.com/security/cve/CVE-2025-39813.html
* https://www.suse.com/security/cve/CVE-2025-39814.html
* https://www.suse.com/security/cve/CVE-2025-39817.html
* https://www.suse.com/security/cve/CVE-2025-39829.html
* https://www.suse.com/security/cve/CVE-2025-39880.html
* https://www.suse.com/security/cve/CVE-2025-39913.html
* https://www.suse.com/security/cve/CVE-2025-39927.html
* https://www.suse.com/security/cve/CVE-2025-40030.html
* https://www.suse.com/security/cve/CVE-2025-40045.html
* https://www.suse.com/security/cve/CVE-2025-40097.html
* https://www.suse.com/security/cve/CVE-2025-40106.html
* https://www.suse.com/security/cve/CVE-2025-40147.html
* https://www.suse.com/security/cve/CVE-2025-40195.html
* https://www.suse.com/security/cve/CVE-2025-40257.html
* https://www.suse.com/security/cve/CVE-2025-40259.html
* https://www.suse.com/security/cve/CVE-2025-40261.html
* https://www.suse.com/security/cve/CVE-2025-40363.html
* https://www.suse.com/security/cve/CVE-2025-68174.html
* https://www.suse.com/security/cve/CVE-2025-68178.html
* https://www.suse.com/security/cve/CVE-2025-68188.html
* https://www.suse.com/security/cve/CVE-2025-68200.html
* https://www.suse.com/security/cve/CVE-2025-68211.html
* https://www.suse.com/security/cve/CVE-2025-68218.html
* https://www.suse.com/security/cve/CVE-2025-68227.html
* https://www.suse.com/security/cve/CVE-2025-68241.html
* https://www.suse.com/security/cve/CVE-2025-68245.html
* https://www.suse.com/security/cve/CVE-2025-68261.html
* https://www.suse.com/security/cve/CVE-2025-68296.html
* https://www.suse.com/security/cve/CVE-2025-68297.html
* https://www.suse.com/security/cve/CVE-2025-68320.html
* https://www.suse.com/security/cve/CVE-2025-68325.html
* https://www.suse.com/security/cve/CVE-2025-68337.html
* https://www.suse.com/security/cve/CVE-2025-68341.html
* https://www.suse.com/security/cve/CVE-2025-68348.html
* https://www.suse.com/security/cve/CVE-2025-68349.html
* https://www.suse.com/security/cve/CVE-2025-68356.html
* https://www.suse.com/security/cve/CVE-2025-68359.html
* https://www.suse.com/security/cve/CVE-2025-68360.html
* https://www.suse.com/security/cve/CVE-2025-68361.html
* https://www.suse.com/security/cve/CVE-2025-68366.html
* https://www.suse.com/security/cve/CVE-2025-68367.html
* https://www.suse.com/security/cve/CVE-2025-68368.html
* https://www.suse.com/security/cve/CVE-2025-68372.html
* https://www.suse.com/security/cve/CVE-2025-68374.html
* https://www.suse.com/security/cve/CVE-2025-68376.html
* https://www.suse.com/security/cve/CVE-2025-68379.html
* https://www.suse.com/security/cve/CVE-2025-68725.html
* https://www.suse.com/security/cve/CVE-2025-68735.html
* https://www.suse.com/security/cve/CVE-2025-68741.html
* https://www.suse.com/security/cve/CVE-2025-68743.html
* https://www.suse.com/security/cve/CVE-2025-68764.html
* https://www.suse.com/security/cve/CVE-2025-68768.html
* https://www.suse.com/security/cve/CVE-2025-68770.html
* https://www.suse.com/security/cve/CVE-2025-68771.html
* https://www.suse.com/security/cve/CVE-2025-68773.html
* https://www.suse.com/security/cve/CVE-2025-68775.html
* https://www.suse.com/security/cve/CVE-2025-68776.html
* https://www.suse.com/security/cve/CVE-2025-68777.html
* https://www.suse.com/security/cve/CVE-2025-68778.html
* https://www.suse.com/security/cve/CVE-2025-68783.html
* https://www.suse.com/security/cve/CVE-2025-68784.html
* https://www.suse.com/security/cve/CVE-2025-68788.html
* https://www.suse.com/security/cve/CVE-2025-68789.html
* https://www.suse.com/security/cve/CVE-2025-68792.html
* https://www.suse.com/security/cve/CVE-2025-68795.html
* https://www.suse.com/security/cve/CVE-2025-68797.html
* https://www.suse.com/security/cve/CVE-2025-68798.html
* https://www.suse.com/security/cve/CVE-2025-68799.html
* https://www.suse.com/security/cve/CVE-2025-68800.html
* https://www.suse.com/security/cve/CVE-2025-68801.html
* https://www.suse.com/security/cve/CVE-2025-68802.html
* https://www.suse.com/security/cve/CVE-2025-68803.html
* https://www.suse.com/security/cve/CVE-2025-68804.html
* https://www.suse.com/security/cve/CVE-2025-68808.html
* https://www.suse.com/security/cve/CVE-2025-68811.html
* https://www.suse.com/security/cve/CVE-2025-68813.html
* https://www.suse.com/security/cve/CVE-2025-68814.html
* https://www.suse.com/security/cve/CVE-2025-68815.html
* https://www.suse.com/security/cve/CVE-2025-68816.html
* https://www.suse.com/security/cve/CVE-2025-68819.html
* https://www.suse.com/security/cve/CVE-2025-68820.html
* https://www.suse.com/security/cve/CVE-2025-68821.html
* https://www.suse.com/security/cve/CVE-2025-68822.html
* https://www.suse.com/security/cve/CVE-2025-71064.html
* https://www.suse.com/security/cve/CVE-2025-71066.html
* https://www.suse.com/security/cve/CVE-2025-71073.html
* https://www.suse.com/security/cve/CVE-2025-71076.html
* https://www.suse.com/security/cve/CVE-2025-71077.html
* https://www.suse.com/security/cve/CVE-2025-71078.html
* https://www.suse.com/security/cve/CVE-2025-71079.html
* https://www.suse.com/security/cve/CVE-2025-71080.html
* https://www.suse.com/security/cve/CVE-2025-71081.html
* https://www.suse.com/security/cve/CVE-2025-71082.html
* https://www.suse.com/security/cve/CVE-2025-71083.html
* https://www.suse.com/security/cve/CVE-2025-71084.html
* https://www.suse.com/security/cve/CVE-2025-71085.html
* https://www.suse.com/security/cve/CVE-2025-71086.html
* https://www.suse.com/security/cve/CVE-2025-71087.html
* https://www.suse.com/security/cve/CVE-2025-71088.html
* https://www.suse.com/security/cve/CVE-2025-71089.html
* https://www.suse.com/security/cve/CVE-2025-71091.html
* https://www.suse.com/security/cve/CVE-2025-71093.html
* https://www.suse.com/security/cve/CVE-2025-71094.html
* https://www.suse.com/security/cve/CVE-2025-71095.html
* https://www.suse.com/security/cve/CVE-2025-71097.html
* https://www.suse.com/security/cve/CVE-2025-71098.html
* https://www.suse.com/security/cve/CVE-2025-71099.html
* https://www.suse.com/security/cve/CVE-2025-71100.html
* https://www.suse.com/security/cve/CVE-2025-71101.html
* https://www.suse.com/security/cve/CVE-2025-71108.html
* https://www.suse.com/security/cve/CVE-2025-71111.html
* https://www.suse.com/security/cve/CVE-2025-71112.html
* https://www.suse.com/security/cve/CVE-2025-71113.html
* https://www.suse.com/security/cve/CVE-2025-71114.html
* https://www.suse.com/security/cve/CVE-2025-71116.html
* https://www.suse.com/security/cve/CVE-2025-71118.html
* https://www.suse.com/security/cve/CVE-2025-71119.html
* https://www.suse.com/security/cve/CVE-2025-71120.html
* https://www.suse.com/security/cve/CVE-2025-71123.html
* https://www.suse.com/security/cve/CVE-2025-71126.html
* https://www.suse.com/security/cve/CVE-2025-71130.html
* https://www.suse.com/security/cve/CVE-2025-71131.html
* https://www.suse.com/security/cve/CVE-2025-71132.html
* https://www.suse.com/security/cve/CVE-2025-71133.html
* https://www.suse.com/security/cve/CVE-2025-71135.html
* https://www.suse.com/security/cve/CVE-2025-71136.html
* https://www.suse.com/security/cve/CVE-2025-71137.html
* https://www.suse.com/security/cve/CVE-2025-71138.html
* https://www.suse.com/security/cve/CVE-2025-71141.html
* https://www.suse.com/security/cve/CVE-2025-71142.html
* https://www.suse.com/security/cve/CVE-2025-71143.html
* https://www.suse.com/security/cve/CVE-2025-71145.html
* https://www.suse.com/security/cve/CVE-2025-71147.html
* https://www.suse.com/security/cve/CVE-2025-71148.html
* https://www.suse.com/security/cve/CVE-2025-71149.html
* https://www.suse.com/security/cve/CVE-2025-71154.html
* https://www.suse.com/security/cve/CVE-2025-71156.html
* https://www.suse.com/security/cve/CVE-2025-71157.html
* https://www.suse.com/security/cve/CVE-2025-71162.html
* https://www.suse.com/security/cve/CVE-2025-71163.html
* https://www.suse.com/security/cve/CVE-2026-22976.html
* https://www.suse.com/security/cve/CVE-2026-22977.html
* https://www.suse.com/security/cve/CVE-2026-22978.html
* https://www.suse.com/security/cve/CVE-2026-22981.html
* https://www.suse.com/security/cve/CVE-2026-22982.html
* https://www.suse.com/security/cve/CVE-2026-22984.html
* https://www.suse.com/security/cve/CVE-2026-22985.html
* https://www.suse.com/security/cve/CVE-2026-22986.html
* https://www.suse.com/security/cve/CVE-2026-22988.html
* https://www.suse.com/security/cve/CVE-2026-22989.html
* https://www.suse.com/security/cve/CVE-2026-22990.html
* https://www.suse.com/security/cve/CVE-2026-22991.html
* https://www.suse.com/security/cve/CVE-2026-22992.html
* https://www.suse.com/security/cve/CVE-2026-22993.html
* https://www.suse.com/security/cve/CVE-2026-22996.html
* https://www.suse.com/security/cve/CVE-2026-22997.html
* https://www.suse.com/security/cve/CVE-2026-22999.html
* https://www.suse.com/security/cve/CVE-2026-23000.html
* https://www.suse.com/security/cve/CVE-2026-23001.html
* https://www.suse.com/security/cve/CVE-2026-23002.html
* https://www.suse.com/security/cve/CVE-2026-23005.html
* https://www.suse.com/security/cve/CVE-2026-23006.html
* https://www.suse.com/security/cve/CVE-2026-23011.html



openSUSE-SU-2026:20283-1: important: Security update for libsoup2


openSUSE security update: security update for libsoup2
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20283-1
Rating: important
References:

* bsc#1257598

Cross-References:

* CVE-2026-1761

CVSS scores:

* CVE-2026-1761 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1761 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has one bug fix can now be installed.

Description:

This update for libsoup2 fixes the following issues:

- CVE-2026-1761: incorrect length calculation when parsing of multipart HTTP responses can lead to a stack-based
buffer overflow (bsc#1257598).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-321=1

Package List:

- openSUSE Leap 16.0:

libsoup-2_4-1-2.74.3-160000.3.1
libsoup2-devel-2.74.3-160000.3.1
libsoup2-lang-2.74.3-160000.3.1
typelib-1_0-Soup-2_4-2.74.3-160000.3.1

References:

* https://www.suse.com/security/cve/CVE-2026-1761.html



openSUSE-SU-2026:20279-1: important: Security update for containerized-data-importer


openSUSE security update: security update for containerized-data-importer
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2026:20279-1
Rating: important
References:

* bsc#1235204
* bsc#1235365
* bsc#1239205

Cross-References:

* CVE-2024-28180
* CVE-2024-45338
* CVE-2025-22868

CVSS scores:

* CVE-2024-28180 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-28180 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-45338 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45338 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.

Description:

This update for containerized-data-importer fixes the following issues:

Update to version 1.64.0.

Security issues fixed:

- CVE-2024-28180: improper handling of highly compressed data (bsc#1235204).
- CVE-2024-45338: denial of service due to non-linear parsing of case-insensitive content (bsc#1235365).
- CVE-2025-22868: unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239205).

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-317=1

Package List:

- openSUSE Leap 16.0:

containerized-data-importer-api-1.64.0-160000.1.1
containerized-data-importer-cloner-1.64.0-160000.1.1
containerized-data-importer-controller-1.64.0-160000.1.1
containerized-data-importer-importer-1.64.0-160000.1.1
containerized-data-importer-manifests-1.64.0-160000.1.1
containerized-data-importer-operator-1.64.0-160000.1.1
containerized-data-importer-uploadproxy-1.64.0-160000.1.1
containerized-data-importer-uploadserver-1.64.0-160000.1.1
obs-service-cdi_containers_meta-1.64.0-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2024-28180.html
* https://www.suse.com/security/cve/CVE-2024-45338.html
* https://www.suse.com/security/cve/CVE-2025-22868.html



openSUSE-SU-2026:10274-1: moderate: libwireshark19-4.6.4-1.1 on GA media


# libwireshark19-4.6.4-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10274-1
Rating: moderate

Cross-References:

* CVE-2026-3201
* CVE-2026-3202
* CVE-2026-3203

CVSS scores:

* CVE-2026-3201 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-3201 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-3202 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-3202 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-3203 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-3203 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the libwireshark19-4.6.4-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libwireshark19 4.6.4-1.1
* libwiretap16 4.6.4-1.1
* libwsutil17 4.6.4-1.1
* wireshark 4.6.4-1.1
* wireshark-devel 4.6.4-1.1
* wireshark-ui-qt 4.6.4-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-3201.html
* https://www.suse.com/security/cve/CVE-2026-3202.html
* https://www.suse.com/security/cve/CVE-2026-3203.html



openSUSE-SU-2026:10272-1: moderate: libIex-3_4-33-3.4.5-1.1 on GA media


# libIex-3_4-33-3.4.5-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10272-1
Rating: moderate

Cross-References:

* CVE-2026-26981

CVSS scores:

* CVE-2026-26981 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-26981 ( SUSE ): 7 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libIex-3_4-33-3.4.5-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libIex-3_4-33 3.4.5-1.1
* libIex-3_4-33-32bit 3.4.5-1.1
* libIex-3_4-33-x86-64-v3 3.4.5-1.1
* libIlmThread-3_4-33 3.4.5-1.1
* libIlmThread-3_4-33-32bit 3.4.5-1.1
* libIlmThread-3_4-33-x86-64-v3 3.4.5-1.1
* libOpenEXR-3_4-33 3.4.5-1.1
* libOpenEXR-3_4-33-32bit 3.4.5-1.1
* libOpenEXR-3_4-33-x86-64-v3 3.4.5-1.1
* libOpenEXRCore-3_4-33 3.4.5-1.1
* libOpenEXRCore-3_4-33-32bit 3.4.5-1.1
* libOpenEXRCore-3_4-33-x86-64-v3 3.4.5-1.1
* libOpenEXRUtil-3_4-33 3.4.5-1.1
* libOpenEXRUtil-3_4-33-32bit 3.4.5-1.1
* libOpenEXRUtil-3_4-33-x86-64-v3 3.4.5-1.1
* openexr 3.4.5-1.1
* openexr-devel 3.4.5-1.1
* openexr-doc 3.4.5-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-26981.html



openSUSE-SU-2026:10271-1: moderate: libjxl-devel-0.11.2-1.1 on GA media


# libjxl-devel-0.11.2-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10271-1
Rating: moderate

Cross-References:

* CVE-2026-1837

CVSS scores:

* CVE-2026-1837 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-1837 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the libjxl-devel-0.11.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* libjxl-devel 0.11.2-1.1
* libjxl-tools 0.11.2-1.1
* libjxl0_11 0.11.2-1.1
* libjxl0_11-32bit 0.11.2-1.1
* libjxl0_11-x86-64-v3 0.11.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2026-1837.html