SUSE 5542 Published by

SUSE has released several security updates to address vulnerabilities in various components. The updates include fixes for harfbuzz, the Linux Kernel (Live Patch 0), glib2, govulncheck-vulndb, the Linux Kernel, openvswitch3, and nodejs22. These patches aim to improve system security, with some updates classified as moderate or important due to their potential impact. The specific severity levels of these updates include low, moderate, and important.

SUSE-SU-2026:0287-1: moderate: Security update for harfbuzz
SUSE-SU-2026:0283-1: important: Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)
SUSE-SU-2026:0286-1: low: Security update for glib2
SUSE-SU-2026:0292-1: moderate: Security update for govulncheck-vulndb
SUSE-SU-2026:0293-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0290-1: important: Security update for openvswitch3
SUSE-SU-2026:0295-1: important: Security update for nodejs22




SUSE-SU-2026:0287-1: moderate: Security update for harfbuzz


# Security update for harfbuzz

Announcement ID: SUSE-SU-2026:0287-1
Release Date: 2026-01-23T23:35:55Z
Rating: moderate
References:

* bsc#1256459

Cross-References:

* CVE-2026-22693

CVSS scores:

* CVE-2026-22693 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22693 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22693 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for harfbuzz fixes the following issues:

* CVE-2026-22693: Fixed a NULL pointer dereference in
SubtableUnicodesCache::create (bsc#1256459).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-287=1 SUSE-2026-287=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-287=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* harfbuzz-devel-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-subset0-8.3.0-150600.3.3.1
* harfbuzz-tools-debuginfo-8.3.0-150600.3.3.1
* harfbuzz-debugsource-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-8.3.0-150600.3.3.1
* libharfbuzz-icu0-debuginfo-8.3.0-150600.3.3.1
* typelib-1_0-HarfBuzz-0_0-8.3.0-150600.3.3.1
* libharfbuzz-icu0-8.3.0-150600.3.3.1
* libharfbuzz-subset0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz0-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-debuginfo-8.3.0-150600.3.3.1
* harfbuzz-tools-8.3.0-150600.3.3.1
* libharfbuzz0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-8.3.0-150600.3.3.1
* openSUSE Leap 15.6 (x86_64)
* libharfbuzz-cairo0-32bit-8.3.0-150600.3.3.1
* libharfbuzz-icu0-32bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-32bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz0-32bit-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-32bit-8.3.0-150600.3.3.1
* libharfbuzz-subset0-32bit-8.3.0-150600.3.3.1
* libharfbuzz-subset0-32bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-icu0-32bit-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-32bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz0-32bit-debuginfo-8.3.0-150600.3.3.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libharfbuzz-icu0-64bit-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-64bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-icu0-64bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-subset0-64bit-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-64bit-8.3.0-150600.3.3.1
* libharfbuzz0-64bit-8.3.0-150600.3.3.1
* libharfbuzz0-64bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-64bit-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-64bit-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-subset0-64bit-debuginfo-8.3.0-150600.3.3.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* harfbuzz-devel-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-subset0-8.3.0-150600.3.3.1
* libharfbuzz-gobject0-8.3.0-150600.3.3.1
* harfbuzz-debugsource-8.3.0-150600.3.3.1
* libharfbuzz-icu0-debuginfo-8.3.0-150600.3.3.1
* typelib-1_0-HarfBuzz-0_0-8.3.0-150600.3.3.1
* libharfbuzz-icu0-8.3.0-150600.3.3.1
* libharfbuzz-subset0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz0-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz0-debuginfo-8.3.0-150600.3.3.1
* libharfbuzz-cairo0-8.3.0-150600.3.3.1
* Basesystem Module 15-SP7 (x86_64)
* libharfbuzz0-32bit-8.3.0-150600.3.3.1
* libharfbuzz0-32bit-debuginfo-8.3.0-150600.3.3.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22693.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256459



SUSE-SU-2026:0283-1: important: Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 15 SP7)


# Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise
15 SP7)

Announcement ID: SUSE-SU-2026:0283-1
Release Date: 2026-01-23T18:04:05Z
Rating: important
References:

* bsc#1248400
* bsc#1248670
* bsc#1249241
* bsc#1250192
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1256928

Cross-References:

* CVE-2023-53676
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38588
* CVE-2025-38608
* CVE-2025-39682
* CVE-2025-40204

CVSS scores:

* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Live Patching 15-SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves seven vulnerabilities and has one security fix can now be
installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150700.51 fixes various
security issues

The following security issues were fixed:

* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size()
(bsc#1249241).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
(bsc#1250192).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

The following non security issue was fixed:

* fix addr_bit_set() issue on big-endian machines (bsc#1256928).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-283=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-283=1

* SUSE Linux Enterprise Live Patching 15-SP7
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-282=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_60-default-9-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_13-debugsource-9-150600.2.1
* kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-9-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_60-default-9-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_13-debugsource-9-150600.2.1
* kernel-livepatch-6_4_0-150600_23_60-default-debuginfo-9-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150700_51-default-9-150700.3.24.1
* kernel-livepatch-6_4_0-150700_51-default-debuginfo-9-150700.3.24.1
* kernel-livepatch-SLE15-SP7_Update_0-debugsource-9-150700.3.24.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38588.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-39682.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249241
* https://bugzilla.suse.com/show_bug.cgi?id=1250192
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1256928



SUSE-SU-2026:0286-1: low: Security update for glib2


# Security update for glib2

Announcement ID: SUSE-SU-2026:0286-1
Release Date: 2026-01-23T23:35:43Z
Rating: low
References:

* bsc#1257049

Cross-References:

* CVE-2026-0988

CVSS scores:

* CVE-2026-0988 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0988 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-0988 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for glib2 fixes the following issues:

* CVE-2026-0988: Fixed a potential integer overflow in
g_buffered_input_stream_peek (bsc#1257049).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-286=1 openSUSE-SLE-15.6-2026-286=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-286=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* glib2-lang-2.78.6-150600.4.28.1
* gio-branding-upstream-2.78.6-150600.4.28.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libgobject-2_0-0-2.78.6-150600.4.28.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.28.1
* glib2-tools-debuginfo-2.78.6-150600.4.28.1
* libgio-2_0-0-2.78.6-150600.4.28.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.28.1
* libgmodule-2_0-0-2.78.6-150600.4.28.1
* glib2-doc-2.78.6-150600.4.28.1
* glib2-debugsource-2.78.6-150600.4.28.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.28.1
* libglib-2_0-0-2.78.6-150600.4.28.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.28.1
* glib2-tests-devel-2.78.6-150600.4.28.1
* glib2-tests-devel-debuginfo-2.78.6-150600.4.28.1
* glib2-devel-2.78.6-150600.4.28.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.28.1
* libgthread-2_0-0-2.78.6-150600.4.28.1
* glib2-devel-debuginfo-2.78.6-150600.4.28.1
* glib2-tools-2.78.6-150600.4.28.1
* glib2-devel-static-2.78.6-150600.4.28.1
* openSUSE Leap 15.6 (x86_64)
* glib2-tools-32bit-2.78.6-150600.4.28.1
* libgmodule-2_0-0-32bit-2.78.6-150600.4.28.1
* glib2-tools-32bit-debuginfo-2.78.6-150600.4.28.1
* libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libgthread-2_0-0-32bit-2.78.6-150600.4.28.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.28.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libgio-2_0-0-32bit-2.78.6-150600.4.28.1
* libglib-2_0-0-32bit-2.78.6-150600.4.28.1
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* glib2-devel-32bit-debuginfo-2.78.6-150600.4.28.1
* glib2-devel-32bit-2.78.6-150600.4.28.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libgio-2_0-0-64bit-2.78.6-150600.4.28.1
* libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.28.1
* glib2-tools-64bit-debuginfo-2.78.6-150600.4.28.1
* libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.28.1
* libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.28.1
* glib2-devel-64bit-2.78.6-150600.4.28.1
* libgobject-2_0-0-64bit-2.78.6-150600.4.28.1
* libgmodule-2_0-0-64bit-2.78.6-150600.4.28.1
* glib2-devel-64bit-debuginfo-2.78.6-150600.4.28.1
* libgthread-2_0-0-64bit-2.78.6-150600.4.28.1
* libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.28.1
* libglib-2_0-0-64bit-2.78.6-150600.4.28.1
* libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.28.1
* glib2-tools-64bit-2.78.6-150600.4.28.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libgobject-2_0-0-2.78.6-150600.4.28.1
* libgmodule-2_0-0-debuginfo-2.78.6-150600.4.28.1
* glib2-tools-debuginfo-2.78.6-150600.4.28.1
* libgio-2_0-0-2.78.6-150600.4.28.1
* libgthread-2_0-0-debuginfo-2.78.6-150600.4.28.1
* libgmodule-2_0-0-2.78.6-150600.4.28.1
* glib2-debugsource-2.78.6-150600.4.28.1
* libgio-2_0-0-debuginfo-2.78.6-150600.4.28.1
* libglib-2_0-0-2.78.6-150600.4.28.1
* libgobject-2_0-0-debuginfo-2.78.6-150600.4.28.1
* libgthread-2_0-0-2.78.6-150600.4.28.1
* glib2-devel-2.78.6-150600.4.28.1
* libglib-2_0-0-debuginfo-2.78.6-150600.4.28.1
* glib2-devel-debuginfo-2.78.6-150600.4.28.1
* glib2-tools-2.78.6-150600.4.28.1
* Basesystem Module 15-SP7 (noarch)
* glib2-lang-2.78.6-150600.4.28.1
* Basesystem Module 15-SP7 (x86_64)
* libgmodule-2_0-0-32bit-2.78.6-150600.4.28.1
* libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libgobject-2_0-0-32bit-2.78.6-150600.4.28.1
* libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1
* libgio-2_0-0-32bit-2.78.6-150600.4.28.1
* libglib-2_0-0-32bit-2.78.6-150600.4.28.1
* libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.28.1

## References:

* https://www.suse.com/security/cve/CVE-2026-0988.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257049



SUSE-SU-2026:0292-1: moderate: Security update for govulncheck-vulndb


# Security update for govulncheck-vulndb

Announcement ID: SUSE-SU-2026:0292-1
Release Date: 2026-01-26T11:11:53Z
Rating: moderate
References:

* jsc#PED-11136

Affected Products:

* openSUSE Leap 15.6

An update that contains one feature can now be installed.

## Description:

This update for govulncheck-vulndb fixes the following issues:

Update to version 0.0.20260123T022811 2026-01-23T02:28:11Z (jsc#PED-11136). Go
CVE Numbering Authority IDs added or updated with aliases:

* GO-2025-3764 CVE-2024-44905 GHSA-6xp3-p59p-q4fj
* GO-2025-4188 CVE-2025-65637 GHSA-4f99-4q7p-p3gh
* GO-2025-4252 CVE-2025-68383 GHSA-2mj3-6grc-px38
* GO-2025-4253 CVE-2025-68388 GHSA-fj69-23m4-ccvv
* GO-2026-4310 CVE-2026-22689 GHSA-524m-q5m7-79mm
* GO-2026-4311 CVE-2026-22772 GHSA-59jp-pj84-45mr
* GO-2026-4312 CVE-2026-22771 GHSA-xrwg-mqj6-6m22
* GO-2026-4313 CVE-2026-22786 GHSA-3558-j79f-vvm6
* GO-2026-4314 CVE-2026-22868 GHSA-mq3p-rrmp-79jg
* GO-2026-4315 CVE-2026-22862 GHSA-mr7q-c9w9-wh4h
* GO-2026-4316 GHSA-mqqf-5wvp-8fh8
* GO-2026-4317 CVE-2017-18892 GHSA-wj5w-qghh-gvqp
* GO-2026-4318 CVE-2025-66292 GHSA-vh2x-fw87-4fxq
* GO-2026-4319 CVE-2026-23511 GHSA-pvm5-9frx-264r
* GO-2026-4320 CVE-2026-23520 GHSA-gjqq-6r35-w3r8
* GO-2026-4321 CVE-2025-68671 GHSA-f2ph-gc9m-q55f
* GO-2026-4322 CVE-2026-22045 GHSA-cwjm-3f7h-9hwq

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-292=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* govulncheck-vulndb-0.0.20260123T022811-150000.1.140.1

## References:

* https://jira.suse.com/browse/PED-11136



SUSE-SU-2026:0293-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0293-1
Release Date: 2026-01-26T11:37:04Z
Rating: important
References:

* bsc#1012628
* bsc#1065729
* bsc#1194869
* bsc#1214635
* bsc#1214847
* bsc#1215146
* bsc#1215211
* bsc#1215344
* bsc#1216062
* bsc#1216436
* bsc#1219165
* bsc#1220419
* bsc#1223731
* bsc#1234163
* bsc#1245193
* bsc#1245449
* bsc#1246328
* bsc#1247500
* bsc#1248886
* bsc#1249256
* bsc#1250334
* bsc#1252046
* bsc#1252342
* bsc#1252686
* bsc#1252776
* bsc#1252808
* bsc#1252824
* bsc#1252861
* bsc#1252919
* bsc#1252973
* bsc#1253155
* bsc#1253262
* bsc#1253342
* bsc#1253386
* bsc#1253402
* bsc#1253408
* bsc#1253413
* bsc#1253442
* bsc#1253458
* bsc#1253463
* bsc#1253647
* bsc#1254119
* bsc#1254126
* bsc#1254373
* bsc#1254518
* bsc#1254520
* bsc#1254599
* bsc#1254606
* bsc#1254611
* bsc#1254613
* bsc#1254615
* bsc#1254621
* bsc#1254623
* bsc#1254624
* bsc#1254626
* bsc#1254648
* bsc#1254649
* bsc#1254653
* bsc#1254655
* bsc#1254657
* bsc#1254660
* bsc#1254661
* bsc#1254663
* bsc#1254669
* bsc#1254677
* bsc#1254678
* bsc#1254688
* bsc#1254690
* bsc#1254691
* bsc#1254693
* bsc#1254695
* bsc#1254698
* bsc#1254701
* bsc#1254704
* bsc#1254705
* bsc#1254707
* bsc#1254712
* bsc#1254715
* bsc#1254717
* bsc#1254723
* bsc#1254724
* bsc#1254732
* bsc#1254733
* bsc#1254737
* bsc#1254739
* bsc#1254742
* bsc#1254743
* bsc#1254749
* bsc#1254750
* bsc#1254753
* bsc#1254754
* bsc#1254758
* bsc#1254761
* bsc#1254762
* bsc#1254765
* bsc#1254782
* bsc#1254791
* bsc#1254793
* bsc#1254795
* bsc#1254796
* bsc#1254797
* bsc#1254798
* bsc#1254813
* bsc#1254828
* bsc#1254829
* bsc#1254832
* bsc#1254840
* bsc#1254843
* bsc#1254847
* bsc#1254850
* bsc#1254851
* bsc#1254858
* bsc#1254860
* bsc#1254894
* bsc#1254918
* bsc#1254957
* bsc#1254959
* bsc#1254983
* bsc#1255005
* bsc#1255009
* bsc#1255026
* bsc#1255033
* bsc#1255034
* bsc#1255035
* bsc#1255041
* bsc#1255046
* bsc#1255057
* bsc#1255062
* bsc#1255064
* bsc#1255065
* bsc#1255068
* bsc#1255072
* bsc#1255075
* bsc#1255077
* bsc#1255083
* bsc#1255092
* bsc#1255094
* bsc#1255100
* bsc#1255122
* bsc#1255135
* bsc#1255146
* bsc#1255149
* bsc#1255152
* bsc#1255154
* bsc#1255155
* bsc#1255163
* bsc#1255167
* bsc#1255169
* bsc#1255171
* bsc#1255182
* bsc#1255187
* bsc#1255190
* bsc#1255193
* bsc#1255197
* bsc#1255199
* bsc#1255202
* bsc#1255203
* bsc#1255206
* bsc#1255209
* bsc#1255218
* bsc#1255221
* bsc#1255233
* bsc#1255245
* bsc#1255246
* bsc#1255251
* bsc#1255252
* bsc#1255253
* bsc#1255259
* bsc#1255274
* bsc#1255276
* bsc#1255279
* bsc#1255280
* bsc#1255281
* bsc#1255325
* bsc#1255329
* bsc#1255351
* bsc#1255415
* bsc#1255480
* bsc#1255483
* bsc#1255489
* bsc#1255493
* bsc#1255495
* bsc#1255505
* bsc#1255538
* bsc#1255540
* bsc#1255545
* bsc#1255549
* bsc#1255550
* bsc#1255553
* bsc#1255557
* bsc#1255558
* bsc#1255563
* bsc#1255564
* bsc#1255570
* bsc#1255578
* bsc#1255579
* bsc#1255580
* bsc#1255583
* bsc#1255591
* bsc#1255601
* bsc#1255603
* bsc#1255605
* bsc#1255611
* bsc#1255616
* bsc#1255617
* bsc#1255618
* bsc#1255621
* bsc#1255628
* bsc#1255629
* bsc#1255630
* bsc#1255632
* bsc#1255636
* bsc#1255688
* bsc#1255691
* bsc#1255702
* bsc#1255704
* bsc#1255706
* bsc#1255722
* bsc#1255758
* bsc#1255759
* bsc#1255760
* bsc#1255763
* bsc#1255769
* bsc#1255770
* bsc#1255772
* bsc#1255774
* bsc#1255775
* bsc#1255776
* bsc#1255780
* bsc#1255785
* bsc#1255786
* bsc#1255789
* bsc#1255790
* bsc#1255792
* bsc#1255793
* bsc#1255795
* bsc#1255798
* bsc#1255800
* bsc#1255801
* bsc#1255806
* bsc#1255807
* bsc#1255809
* bsc#1255810
* bsc#1255812
* bsc#1255814
* bsc#1255820
* bsc#1255838
* bsc#1255842
* bsc#1255843
* bsc#1255872
* bsc#1255875
* bsc#1255879
* bsc#1255883
* bsc#1255884
* bsc#1255886
* bsc#1255888
* bsc#1255890
* bsc#1255891
* bsc#1255892
* bsc#1255899
* bsc#1255902
* bsc#1255907
* bsc#1255911
* bsc#1255915
* bsc#1255918
* bsc#1255921
* bsc#1255924
* bsc#1255925
* bsc#1255931
* bsc#1255932
* bsc#1255934
* bsc#1255943
* bsc#1255944
* bsc#1255949
* bsc#1255951
* bsc#1255952
* bsc#1255955
* bsc#1255957
* bsc#1255961
* bsc#1255963
* bsc#1255964
* bsc#1255967
* bsc#1255974
* bsc#1255978
* bsc#1255984
* bsc#1255988
* bsc#1255990
* bsc#1255992
* bsc#1255993
* bsc#1255994
* bsc#1255996
* bsc#1256033
* bsc#1256034
* bsc#1256045
* bsc#1256050
* bsc#1256058
* bsc#1256071
* bsc#1256074
* bsc#1256081
* bsc#1256082
* bsc#1256083
* bsc#1256084
* bsc#1256085
* bsc#1256090
* bsc#1256093
* bsc#1256094
* bsc#1256095
* bsc#1256096
* bsc#1256099
* bsc#1256100
* bsc#1256104
* bsc#1256106
* bsc#1256107
* bsc#1256117
* bsc#1256119
* bsc#1256121
* bsc#1256145
* bsc#1256153
* bsc#1256178
* bsc#1256197
* bsc#1256231
* bsc#1256233
* bsc#1256234
* bsc#1256238
* bsc#1256263
* bsc#1256267
* bsc#1256268
* bsc#1256271
* bsc#1256273
* bsc#1256274
* bsc#1256279
* bsc#1256285
* bsc#1256291
* bsc#1256292
* bsc#1256300
* bsc#1256301
* bsc#1256302
* bsc#1256335
* bsc#1256348
* bsc#1256351
* bsc#1256354
* bsc#1256358
* bsc#1256361
* bsc#1256364
* bsc#1256367
* bsc#1256368
* bsc#1256369
* bsc#1256370
* bsc#1256371
* bsc#1256373
* bsc#1256375
* bsc#1256379
* bsc#1256387
* bsc#1256394
* bsc#1256395
* bsc#1256396
* bsc#1256528
* jsc#PED-14062
* jsc#PED-3527
* jsc#PED-4866
* jsc#PED-5065
* jsc#PED-5453
* jsc#PED-5475
* jsc#PED-5477
* jsc#PED-5511
* jsc#PED-6036
* jsc#PED-6041
* jsc#PED-6045
* jsc#PED-6067
* jsc#PED-6068
* jsc#PED-6069
* jsc#PED-6070
* jsc#PED-6071
* jsc#PED-6104
* jsc#PED-6114
* jsc#PED-6116
* jsc#PED-6120
* jsc#PED-6123
* jsc#PED-6811
* jsc#PED-7514
* jsc#PED-7542
* jsc#PED-7779
* jsc#PED-7780

Cross-References:

* CVE-2023-42752
* CVE-2023-53743
* CVE-2023-53750
* CVE-2023-53752
* CVE-2023-53759
* CVE-2023-53762
* CVE-2023-53766
* CVE-2023-53768
* CVE-2023-53777
* CVE-2023-53778
* CVE-2023-53782
* CVE-2023-53784
* CVE-2023-53785
* CVE-2023-53787
* CVE-2023-53791
* CVE-2023-53792
* CVE-2023-53793
* CVE-2023-53794
* CVE-2023-53795
* CVE-2023-53797
* CVE-2023-53799
* CVE-2023-53807
* CVE-2023-53808
* CVE-2023-53813
* CVE-2023-53815
* CVE-2023-53819
* CVE-2023-53821
* CVE-2023-53823
* CVE-2023-53825
* CVE-2023-53828
* CVE-2023-53831
* CVE-2023-53834
* CVE-2023-53836
* CVE-2023-53839
* CVE-2023-53841
* CVE-2023-53842
* CVE-2023-53843
* CVE-2023-53844
* CVE-2023-53846
* CVE-2023-53847
* CVE-2023-53848
* CVE-2023-53850
* CVE-2023-53851
* CVE-2023-53852
* CVE-2023-53855
* CVE-2023-53856
* CVE-2023-53857
* CVE-2023-53858
* CVE-2023-53860
* CVE-2023-53861
* CVE-2023-53863
* CVE-2023-53864
* CVE-2023-53865
* CVE-2023-53989
* CVE-2023-53992
* CVE-2023-53994
* CVE-2023-53995
* CVE-2023-53996
* CVE-2023-53997
* CVE-2023-53998
* CVE-2023-53999
* CVE-2023-54000
* CVE-2023-54001
* CVE-2023-54005
* CVE-2023-54006
* CVE-2023-54008
* CVE-2023-54014
* CVE-2023-54016
* CVE-2023-54017
* CVE-2023-54019
* CVE-2023-54022
* CVE-2023-54023
* CVE-2023-54025
* CVE-2023-54026
* CVE-2023-54027
* CVE-2023-54030
* CVE-2023-54031
* CVE-2023-54032
* CVE-2023-54035
* CVE-2023-54037
* CVE-2023-54038
* CVE-2023-54042
* CVE-2023-54045
* CVE-2023-54048
* CVE-2023-54049
* CVE-2023-54051
* CVE-2023-54052
* CVE-2023-54060
* CVE-2023-54064
* CVE-2023-54066
* CVE-2023-54067
* CVE-2023-54069
* CVE-2023-54070
* CVE-2023-54072
* CVE-2023-54076
* CVE-2023-54080
* CVE-2023-54081
* CVE-2023-54083
* CVE-2023-54088
* CVE-2023-54089
* CVE-2023-54091
* CVE-2023-54092
* CVE-2023-54093
* CVE-2023-54094
* CVE-2023-54095
* CVE-2023-54096
* CVE-2023-54099
* CVE-2023-54101
* CVE-2023-54104
* CVE-2023-54106
* CVE-2023-54112
* CVE-2023-54113
* CVE-2023-54115
* CVE-2023-54117
* CVE-2023-54121
* CVE-2023-54125
* CVE-2023-54127
* CVE-2023-54133
* CVE-2023-54134
* CVE-2023-54135
* CVE-2023-54136
* CVE-2023-54137
* CVE-2023-54140
* CVE-2023-54141
* CVE-2023-54142
* CVE-2023-54143
* CVE-2023-54145
* CVE-2023-54148
* CVE-2023-54149
* CVE-2023-54153
* CVE-2023-54154
* CVE-2023-54155
* CVE-2023-54156
* CVE-2023-54164
* CVE-2023-54166
* CVE-2023-54169
* CVE-2023-54170
* CVE-2023-54171
* CVE-2023-54172
* CVE-2023-54173
* CVE-2023-54177
* CVE-2023-54178
* CVE-2023-54179
* CVE-2023-54181
* CVE-2023-54183
* CVE-2023-54185
* CVE-2023-54189
* CVE-2023-54194
* CVE-2023-54201
* CVE-2023-54204
* CVE-2023-54207
* CVE-2023-54209
* CVE-2023-54210
* CVE-2023-54211
* CVE-2023-54215
* CVE-2023-54219
* CVE-2023-54220
* CVE-2023-54221
* CVE-2023-54223
* CVE-2023-54224
* CVE-2023-54225
* CVE-2023-54227
* CVE-2023-54229
* CVE-2023-54230
* CVE-2023-54235
* CVE-2023-54240
* CVE-2023-54241
* CVE-2023-54246
* CVE-2023-54247
* CVE-2023-54251
* CVE-2023-54253
* CVE-2023-54254
* CVE-2023-54255
* CVE-2023-54258
* CVE-2023-54261
* CVE-2023-54263
* CVE-2023-54264
* CVE-2023-54266
* CVE-2023-54267
* CVE-2023-54271
* CVE-2023-54276
* CVE-2023-54278
* CVE-2023-54281
* CVE-2023-54282
* CVE-2023-54283
* CVE-2023-54285
* CVE-2023-54289
* CVE-2023-54291
* CVE-2023-54292
* CVE-2023-54293
* CVE-2023-54296
* CVE-2023-54297
* CVE-2023-54299
* CVE-2023-54300
* CVE-2023-54302
* CVE-2023-54303
* CVE-2023-54304
* CVE-2023-54309
* CVE-2023-54312
* CVE-2023-54313
* CVE-2023-54314
* CVE-2023-54315
* CVE-2023-54316
* CVE-2023-54318
* CVE-2023-54319
* CVE-2023-54322
* CVE-2023-54324
* CVE-2023-54326
* CVE-2024-26944
* CVE-2025-38321
* CVE-2025-38728
* CVE-2025-39890
* CVE-2025-39977
* CVE-2025-40006
* CVE-2025-40024
* CVE-2025-40033
* CVE-2025-40042
* CVE-2025-40053
* CVE-2025-40081
* CVE-2025-40102
* CVE-2025-40134
* CVE-2025-40135
* CVE-2025-40153
* CVE-2025-40158
* CVE-2025-40167
* CVE-2025-40170
* CVE-2025-40178
* CVE-2025-40179
* CVE-2025-40187
* CVE-2025-40211
* CVE-2025-40215
* CVE-2025-40219
* CVE-2025-40220
* CVE-2025-40223
* CVE-2025-40233
* CVE-2025-40242
* CVE-2025-40244
* CVE-2025-40256
* CVE-2025-40258
* CVE-2025-40262
* CVE-2025-40263
* CVE-2025-40269
* CVE-2025-40272
* CVE-2025-40273
* CVE-2025-40275
* CVE-2025-40277
* CVE-2025-40280
* CVE-2025-40282
* CVE-2025-40283
* CVE-2025-40284
* CVE-2025-40288
* CVE-2025-40297
* CVE-2025-40301
* CVE-2025-40304
* CVE-2025-40306
* CVE-2025-40308
* CVE-2025-40309
* CVE-2025-40310
* CVE-2025-40311
* CVE-2025-40312
* CVE-2025-40314
* CVE-2025-40315
* CVE-2025-40316
* CVE-2025-40317
* CVE-2025-40318
* CVE-2025-40320
* CVE-2025-40321
* CVE-2025-40322
* CVE-2025-40323
* CVE-2025-40324
* CVE-2025-40328
* CVE-2025-40329
* CVE-2025-40331
* CVE-2025-40342
* CVE-2025-40343
* CVE-2025-40345
* CVE-2025-40349
* CVE-2025-40351
* CVE-2025-68168
* CVE-2025-68172
* CVE-2025-68176
* CVE-2025-68180
* CVE-2025-68183
* CVE-2025-68185
* CVE-2025-68192
* CVE-2025-68194
* CVE-2025-68195
* CVE-2025-68217
* CVE-2025-68218
* CVE-2025-68222
* CVE-2025-68233
* CVE-2025-68235
* CVE-2025-68237
* CVE-2025-68238
* CVE-2025-68244
* CVE-2025-68249
* CVE-2025-68252
* CVE-2025-68257
* CVE-2025-68258
* CVE-2025-68259
* CVE-2025-68286
* CVE-2025-68287
* CVE-2025-68289
* CVE-2025-68290
* CVE-2025-68303
* CVE-2025-68305
* CVE-2025-68307
* CVE-2025-68308
* CVE-2025-68312
* CVE-2025-68313
* CVE-2025-68328
* CVE-2025-68330
* CVE-2025-68331
* CVE-2025-68332
* CVE-2025-68335
* CVE-2025-68339
* CVE-2025-68345
* CVE-2025-68346
* CVE-2025-68347
* CVE-2025-68354
* CVE-2025-68362
* CVE-2025-68380
* CVE-2025-68724
* CVE-2025-68732
* CVE-2025-68734
* CVE-2025-68740
* CVE-2025-68746
* CVE-2025-68750
* CVE-2025-68753
* CVE-2025-68757
* CVE-2025-68758
* CVE-2025-68759
* CVE-2025-68765
* CVE-2025-68766

CVSS scores:

* CVE-2023-42752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-42752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53759 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53766 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53777 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53782 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53782 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-53784 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53794 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53841 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53841 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53995 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53995 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53996 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-53997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54016 ( SUSE ): 5.3
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54016 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54017 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54023 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54030 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54030 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54042 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54045 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54072 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54076 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54080 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54080 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54083 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54088 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54089 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54091 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54092 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54093 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54095 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54099 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54101 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54101 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54125 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54125 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2023-54127 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54133 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54133 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54135 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54135 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54136 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54137 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54137 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54142 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54143 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54143 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54145 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54145 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54148 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2023-54149 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54149 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54153 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54154 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54155 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54166 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54173 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54178 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54179 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54181 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54183 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54185 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54185 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54189 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54194 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54201 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54207 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54207 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54209 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54209 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54215 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54215 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54219 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54220 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54221 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54221 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54223 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54224 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54225 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54225 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54227 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54229 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54230 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54235 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54235 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54240 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54241 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54247 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54247 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54253 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54253 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2023-54254 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54255 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54255 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54258 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54261 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54263 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54266 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54267 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54271 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54278 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54278 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54281 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54282 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54282 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54283 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54283 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54285 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54285 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54289 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54291 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54292 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54293 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54296 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54297 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54297 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54300 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54302 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54303 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54303 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54309 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54312 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54312 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54314 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54316 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54316 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54318 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54322 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54324 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54324 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54326 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38321 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38728 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39890 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39890 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40024 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40033 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40053 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40102 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-40134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40135 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40153 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40158 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40167 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40170 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40170 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40179 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40179 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40211 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40211 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40215 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40219 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40220 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40242 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40258 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40263 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40269 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40280 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40282 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40282 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40283 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40283 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40284 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40284 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40288 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40297 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40301 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40301 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-40304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40306 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40308 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40309 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40310 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40311 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40314 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40314 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40322 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40322 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-40323 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40323 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40342 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40342 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40343 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40343 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40345 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40345 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40349 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40351 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68168 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68183 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68194 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68307 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68307 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68308 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68313 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68313 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68328 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68328 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68330 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68331 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68331 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68339 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68339 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-68345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68347 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68347 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68732 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68734 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68740 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68746 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68746 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68750 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68750 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-68753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-68757 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68758 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68758 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-68759 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68765 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68766 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68766 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 334 vulnerabilities, contains 26 features and has 23
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails
(bsc#1246328).
* CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd
(bsc#1249256).
* CVE-2025-39890: wifi: ath12k: fix memory leak in
ath12k_service_ready_ext_event (bsc#1250334).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252046).
* CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted
(bsc#1252342).
* CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task
(bsc#1252686).
* CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in
pru_rproc_set_ctable() (bsc#1252824).
* CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing
NULL pointer dereference (bsc#1252861).
* CVE-2025-40053: net: dlink: handle copy_thresh allocation failure
(bsc#1252808).
* CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
(bsc#1252776).
* CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init
(bsc#1252919).
* CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend()
(bsc#1253386).
* CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
* CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory
area (bsc#1253408).
* CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
* CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination
(bsc#1253458).
* CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
* CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
* CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
* CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition
sctp_sf_do_5_1D_ce() (bsc#1253647).
* CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
* CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
workers (bsc#1254520).
* CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
(bsc#1254813).
* CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
* CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
(bsc#1254843).
* CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
(bsc#1254847).
* CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass
(bsc#1255187).
* CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid()
(bsc#1254624).
* CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
* CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is
replaced (bsc#1255199).

The following non security issues were fixed:

* ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).
* ACPI: property: Fix fwnode refcount leak in
acpi_fwnode_graph_parse_endpoint() (git-fixes).
* ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).
* ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-
fixes).
* ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-
fixes).
* ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()
(git-fixes).
* ALSA: uapi: Fix typo in asound.h comment (git-fixes).
* ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).
* ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).
* ASoC: ak4458: Disable regulator when error happens (git-fixes).
* ASoC: ak5558: Disable regulator when error happens (git-fixes).
* ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).
* ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).
* ASoC: qcom: q6adm: the the copp device only during last instance (git-
fixes).
* ASoC: qcom: q6asm-dai: perform correct state check before closing (git-
fixes).
* ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-
fixes).
* ASoC: stm32: sai: fix OF node leak on probe (git-fixes).
* ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).
* ASoC: stm32: sai: fix device leak on probe (git-fixes).
* Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).
* Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-
fixes).
* Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-
fixes).
* Documentation/kernel-parameters: fix typo in retbleed= kernel parameter
description (git-fixes).
* Documentation: hid-alps: Fix packet format section headings (git-fixes).
* Documentation: parport-lowlevel: Separate function listing code blocks (git-
fixes).
* HID: logitech-dj: Remove duplicate error logging (git-fixes).
* HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-
fixes).
* Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).
* Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).
* Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).
* KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).
* KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
* PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-
fixes).
* PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).
* PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).
* PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).
* Revert "mtd: rawnand: marvell: fix layouts" (git-fixes).
* USB: Fix descriptor count when handling invalid MBIM extended descriptor
(git-fixes).
* USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).
* USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).
* USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).
* USB: serial: option: add Quectel RG255C (stable-fixes).
* USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).
* USB: serial: option: add UNISOC UIS7720 (stable-fixes).
* USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).
* USB: storage: Remove subclass and protocol overrides from Novatek quirk
(git-fixes).
* arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes).
* arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes).
* atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).
* atm: idt77252: Add missing `dma_map_error()` (stable-fixes).
* backlight: led-bl: Add devlink to supplier LEDs (git-fixes).
* backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).
* bs-upload-kernel: Fix cve branch uploads.
* btrfs: make sure extent and csum paths are always released in
scrub_raid56_parity_stripe() (git-fixes).
* can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs
(git-fixes).
* can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-
fixes).
* can: sja1000: fix max irq loop handling (git-fixes).
* can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-
fixes).
* cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).
* cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).
* cifs: avoid redundant calls to disable multichannel (git-fixes).
* cifs: cifs_pick_channel should try selecting active channels (git-fixes).
* cifs: deal with the channel loading lag while picking channels (git-fixes).
* cifs: dns resolution is needed only for primary channel (git-fixes).
* cifs: do not disable interface polling on failure (git-fixes).
* cifs: do not search for channel if server is terminating (git-fixes).
* cifs: fix a pending undercount of srv_count (git-fixes).
* cifs: fix lock ordering while disabling multichannel (git-fixes).
* cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).
* cifs: fix use after free for iface while disabling secondary channels (git-
fixes).
* cifs: handle servers that still advertise multichannel after disabling (git-
fixes).
* cifs: handle when server starts supporting multichannel (git-fixes).
* cifs: handle when server stops supporting multichannel (git-fixes).
* cifs: make cifs_chan_update_iface() a void function (git-fixes).
* cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).
* cifs: make sure that channel scaling is done only once (git-fixes).
* cifs: reconnect worker should take reference on server struct
unconditionally (git-fixes).
* cifs: reset connections for all channels when reconnect requested (git-
fixes).
* cifs: reset iface weights when we cannot find a candidate (git-fixes).
* cifs: serialize other channels when query server interfaces is pending (git-
fixes).
* cifs: update dstaddr whenever channel iface is updated (git-fixes).
* clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).
* clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to
other (git-fixes).
* clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback
(git-fixes).
* clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).
* comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).
* comedi: check device's attached status in compat ioctls (git-fixes).
* comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).
* comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).
* cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-
fixes).
* cpuidle: menu: Use residency threshold in polling state override decisions
(bsc#1255026).
* crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id
(git-fixes).
* crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-
fixes).
* crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).
* crypto: hisilicon/qm - restore original qos values (git-fixes).
* crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).
* crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-
fixes).
* dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).
* dm-verity: fix unreliable memory allocation (git-fixes).
* dm: fix queue start/stop imbalance under suspend/load/resume races
(bsc#1253386).
* drivers/usb/dwc3: fix PCI parent check (git-fixes).
* drm/amd/display: Check NULL before accessing (stable-fixes).
* drm/amd/display: Fix logical vs bitwise bug in
get_embedded_panel_info_v2_1() (git-fixes).
* drm/amd/display: Increase DPCD read retries (stable-fixes).
* drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-
fixes).
* drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-
fixes).
* drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).
* drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).
* drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).
* drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).
* drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-
fixes).
* drm/mgag200: Fix big-endian support (git-fixes).
* drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).
* drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-
fixes).
* drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).
* drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-
fixes).
* drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).
* drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).
* drm/vgem-fence: Fix potential deadlock on release (git-fixes).
* drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).
* drm: sti: fix device leaks at component probe (git-fixes).
* efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-
fixes).
* efi/libstub: Fix page table access in 5-level to 4-level paging transition
(git-fixes).
* fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-
fixes).
* fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).
* fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).
* firmware: imx: scu-irq: fix OF node leak in (git-fixes).
* firmware: stratix10-svc: Add mutex in stratix10 memory management (git-
fixes).
* firmware: stratix10-svc: fix bug in saving controller data (git-fixes).
* firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-
fixes).
* gpu: host1x: Fix race in syncpt alloc/free (git-fixes).
* hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).
* hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).
* hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).
* hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-
fixes).
* i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).
* i2c: i2c.h: fix a bad kernel-doc line (git-fixes).
* i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).
* iio: accel: bmc150: Fix irq assumption regression (stable-fixes).
* iio: accel: fix ADXL355 startup race condition (git-fixes).
* iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).
* iio: core: Clean up device correctly on iio_device_alloc() failure (git-
fixes).
* iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).
* iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-
fixes).
* iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-
fixes).
* iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).
* ima: Handle error code returned by ima_filter_rule_match() (git-fixes).
* intel_th: Fix error handling in intel_th_output_open (git-fixes).
* ipmi: Fix handling of messages with provided receive message pointer (git-
fixes).
* ipmi: Rework user message limit handling (git-fixes).
* irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).
* kconfig/mconf: Initialize the default locale at startup (stable-fixes).
* kconfig/nconf: Initialize the default locale at startup (stable-fixes).
* leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).
* leds: leds-lp50xx: Enable chip before any communication (git-fixes).
* leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-
fixes).
* leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).
* lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-
fixes).
* mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).
* media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).
* media: adv7842: Avoid possible out-of-bounds array accesses in
adv7842_cp_log_status() (git-fixes).
* media: amphion: Cancel message work before releasing the VPU core (git-
fixes).
* media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973).
* media: atomisp: Remove firmware_name module parameter (bsc#1252973).
* media: cec: Fix debugfs leak on bus_register() failure (git-fixes).
* media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).
* media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-
fixes).
* media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-
fixes).
* media: msp3400: Avoid possible out-of-bounds array accesses in
msp3400c_thread() (git-fixes).
* media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).
* media: rc: st_rc: Fix reset control resource leak (git-fixes).
* media: renesas: rcar_drif: fix device node reference leak in
rcar_drif_bond_enabled (git-fixes).
* media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).
* media: v4l2-mem2mem: Fix outdated documentation (git-fixes).
* media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-
fixes).
* media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-
fixes).
* media: vidtv: initialize local pointers upon transfer of memory ownership
(git-fixes).
* media: vpif_capture: fix section mismatch (git-fixes).
* media: vpif_display: fix section mismatch (git-fixes).
* mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).
* mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).
* mfd: max77620: Fix potential IRQ chip conflict when probing two devices
(git-fixes).
* mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).
* mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).
* most: usb: fix double free on late probe failure (git-fixes).
* mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).
* mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).
* mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-
fixes).
* mtd: nand: relax ECC parameter validation check (git-fixes).
* mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and
remove (git-fixes).
* mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).
* net: phy: adin1100: Fix software power-down ready condition (git-fixes).
* net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-
fixes).
* net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-
fixes).
* nvme: Use non zero KATO for persistent discovery connections (git-fixes).
* orangefs: fix xattr related buffer overflow.. (git-fixes).
* phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).
* phy: renesas: rcar-gen3-usb2: Fix an error handling path in
rcar_gen3_phy_usb2_probe() (git-fixes).
* pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).
* platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).
* platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-
fixes).
* platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git-
fixes).
* platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).
* power: supply: apm_power: only unset own apm_get_power_status (git-fixes).
* power: supply: cw2015: Check devm_delayed_work_autocancel() return code
(git-fixes).
* power: supply: rt9467: Prevent using uninitialized local variable in
rt9467_set_value_from_ranges() (git-fixes).
* power: supply: rt9467: Return error on failure in
rt9467_set_value_from_ranges() (git-fixes).
* power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).
* powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022
ltc#211187).
* powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event
handling (bsc#1253262 ltc#216029).
* pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-
fixes).
* regulator: core: Protect regulator_supply_alias_list with
regulator_list_mutex (git-fixes).
* regulator: core: disable supply if enabling main regulator fails (git-
fixes).
* rpmsg: glink: fix rpmsg device leak (git-fixes).
* rtc: gamecube: Check the return value of ioremap() (git-fixes).
* scripts: teaapi: Add paging.
* scrits: teaapi: Add list_repos.
* scsi: lpfc: Add capability to register Platform Name ID to fabric
(bsc#1254119).
* scsi: lpfc: Allow support for BB credit recovery in point-to-point topology
(bsc#1254119).
* scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
* scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology
(bsc#1254119).
* scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI
(bsc#1254119).
* scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
* scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb()
(bsc#1254119).
* scsi: lpfc: Revise discovery related function headers and comments
(bsc#1254119).
* scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
* scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
* serial: amba-pl011: prefer dma_mapping_error() over explicit address
checking (git-fixes).
* slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-
fixes).
* smb3: add missing null server pointer check (git-fixes).
* smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).
* smb: client: fix warning when reconnecting channel (git-fixes).
* smb: client: introduce close_cached_dir_locked() (git-fixes).
* soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
* soc: amlogic: canvas: fix device leak on lookup (git-fixes).
* soc: qcom: ocmem: fix device leak on lookup (git-fixes).
* soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-
fixes).
* spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).
* spi: bcm63xx: drop wrong casts in probe() (git-fixes).
* spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-
fixes).
* spi: tegra210-qspi: Remove cache operations (git-fixes).
* spi: tegra210-quad: Add support for internal DMA (git-fixes).
* spi: tegra210-quad: Check hardware status on timeout (bsc#1253155).
* spi: tegra210-quad: Fix timeout handling (bsc#1253155).
* spi: tegra210-quad: Fix timeout handling (git-fixes).
* spi: tegra210-quad: Refactor error handling into helper functions
(bsc#1253155).
* spi: tegra210-quad: Update dummy sequence configuration (git-fixes).
* staging: fbtft: core: fix potential memory leak in fbtft_probe_common()
(git-fixes).
* thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).
* tracing: Fix access to trace_event_file (bsc#1254373).
* uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe
(git-fixes).
* usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).
* usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).
* usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).
* usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).
* usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).
* usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call
paths (git-fixes).
* usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).
* usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).
* usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
* usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).
* usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-
fixes).
* usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt
(git-fixes).
* usb: phy: Initialize struct usb_phy list_head (git-fixes).
* usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).
* usb: raw-gadget: do not limit transfer length (git-fixes).
* usb: storage: Fix memory leak in USB bulk transport (git-fixes).
* usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).
* usb: typec: tipd: Clear interrupts first (git-fixes).
* usb: typec: ucsi: psy: Set max current to zero when disconnected (git-
fixes).
* usb: uas: fix urb unmapping issue when the uas device is remove during
ongoing data transfer (git-fixes).
* usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).
* usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
* watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).
* wifi: ath11k: fix peer HE MCS assignment (git-fixes).
* wifi: ath11k: restore register window after global reset (git-fixes).
* wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-
fixes).
* wifi: ieee80211: correct FILS status codes (git-fixes).
* wifi: mac80211: fix CMAC functions not handling errors (git-fixes).
* wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).
* wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-
fixes).
* wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-
fixes).
* wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()
(git-fixes).
* x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-
fixes).
* x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).
* x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).
* x86/microcode/AMD: Add more known models to entry sign checking
(bsc#1256528).
* x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).
* x86/microcode/AMD: Clean the cache if update did not load microcode
(bsc#1256528).
* x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any
unreleased standalone Zen5 microcode patches (bsc#1256528).
* x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo
(bsc#1256528).
* x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).
* x86/microcode/AMD: Limit Entrysign signature checking to known generations
(bsc#1256528).
* x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).
* x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).
* x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).
* x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).
* xhci: dbgtty: fix device unregister (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-293=1 openSUSE-SLE-15.6-2026-293=1

* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-293=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-293=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-293=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-293=1

## Package List:

* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (noarch)
* kernel-docs-html-6.4.0-150600.23.84.1
* kernel-devel-6.4.0-150600.23.84.1
* kernel-source-vanilla-6.4.0-150600.23.84.1
* kernel-source-6.4.0-150600.23.84.1
* kernel-macros-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-devel-6.4.0-150600.23.84.1
* kernel-debug-debuginfo-6.4.0-150600.23.84.1
* kernel-debug-debugsource-6.4.0-150600.23.84.1
* kernel-debug-devel-debuginfo-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.84.1
* kernel-kvmsmall-vdso-6.4.0-150600.23.84.1
* kernel-default-vdso-debuginfo-6.4.0-150600.23.84.1
* kernel-default-vdso-6.4.0-150600.23.84.1
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.84.1
* kernel-debug-vdso-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1
* kernel-kvmsmall-devel-6.4.0-150600.23.84.1
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.84.1
* kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.84.1
* kernel-kvmsmall-debugsource-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-6.4.0-150600.23.84.1
* kernel-default-debugsource-6.4.0-150600.23.84.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
* kernel-obs-build-debugsource-6.4.0-150600.23.84.1
* kernel-syms-6.4.0-150600.23.84.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
* kselftests-kmp-default-6.4.0-150600.23.84.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.84.1
* kernel-default-debuginfo-6.4.0-150600.23.84.1
* kernel-default-devel-6.4.0-150600.23.84.1
* dlm-kmp-default-6.4.0-150600.23.84.1
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.84.1
* ocfs2-kmp-default-6.4.0-150600.23.84.1
* kernel-default-extra-debuginfo-6.4.0-150600.23.84.1
* kernel-obs-build-6.4.0-150600.23.84.1
* kernel-default-extra-6.4.0-150600.23.84.1
* reiserfs-kmp-default-6.4.0-150600.23.84.1
* kernel-default-optional-debuginfo-6.4.0-150600.23.84.1
* kernel-default-optional-6.4.0-150600.23.84.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1
* kernel-obs-qa-6.4.0-150600.23.84.1
* kernel-default-livepatch-6.4.0-150600.23.84.1
* gfs2-kmp-default-6.4.0-150600.23.84.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1
* kernel-livepatch-SLE15-SP6_Update_19-debugsource-1-150600.13.3.1
* kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-1-150600.13.3.1
* kernel-default-livepatch-devel-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.84.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (aarch64)
* dtb-amlogic-6.4.0-150600.23.84.1
* dtb-exynos-6.4.0-150600.23.84.1
* dtb-altera-6.4.0-150600.23.84.1
* dtb-amazon-6.4.0-150600.23.84.1
* dtb-marvell-6.4.0-150600.23.84.1
* dtb-nvidia-6.4.0-150600.23.84.1
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
* dtb-socionext-6.4.0-150600.23.84.1
* ocfs2-kmp-64kb-6.4.0-150600.23.84.1
* dtb-arm-6.4.0-150600.23.84.1
* dtb-mediatek-6.4.0-150600.23.84.1
* kernel-64kb-devel-6.4.0-150600.23.84.1
* kselftests-kmp-64kb-6.4.0-150600.23.84.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
* dtb-lg-6.4.0-150600.23.84.1
* dtb-broadcom-6.4.0-150600.23.84.1
* cluster-md-kmp-64kb-6.4.0-150600.23.84.1
* kernel-64kb-debugsource-6.4.0-150600.23.84.1
* kernel-64kb-extra-6.4.0-150600.23.84.1
* dtb-apm-6.4.0-150600.23.84.1
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
* reiserfs-kmp-64kb-6.4.0-150600.23.84.1
* dtb-apple-6.4.0-150600.23.84.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.84.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
* dtb-cavium-6.4.0-150600.23.84.1
* dtb-freescale-6.4.0-150600.23.84.1
* dtb-rockchip-6.4.0-150600.23.84.1
* dtb-allwinner-6.4.0-150600.23.84.1
* dtb-hisilicon-6.4.0-150600.23.84.1
* gfs2-kmp-64kb-6.4.0-150600.23.84.1
* dtb-sprd-6.4.0-150600.23.84.1
* kernel-64kb-optional-6.4.0-150600.23.84.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.84.1
* dtb-xilinx-6.4.0-150600.23.84.1
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.84.1
* kernel-64kb-debuginfo-6.4.0-150600.23.84.1
* dlm-kmp-64kb-6.4.0-150600.23.84.1
* dtb-amd-6.4.0-150600.23.84.1
* dtb-qcom-6.4.0-150600.23.84.1
* dtb-renesas-6.4.0-150600.23.84.1
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.84.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.84.1
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.84.1
* kernel-default-debugsource-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-debuginfo-6.4.0-150600.23.84.1
* kernel-default-debuginfo-6.4.0-150600.23.84.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1
* cluster-md-kmp-default-6.4.0-150600.23.84.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1
* dlm-kmp-default-6.4.0-150600.23.84.1
* kernel-default-debugsource-6.4.0-150600.23.84.1
* kernel-default-devel-6.4.0-150600.23.84.1
* kernel-obs-build-6.4.0-150600.23.84.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
* kernel-obs-build-debugsource-6.4.0-150600.23.84.1
* reiserfs-kmp-default-6.4.0-150600.23.84.1
* kernel-syms-6.4.0-150600.23.84.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
* ocfs2-kmp-default-6.4.0-150600.23.84.1
* gfs2-kmp-default-6.4.0-150600.23.84.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64)
* kernel-64kb-devel-6.4.0-150600.23.84.1
* kernel-64kb-debugsource-6.4.0-150600.23.84.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.84.1
* kernel-64kb-debuginfo-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* kernel-devel-6.4.0-150600.23.84.1
* kernel-source-6.4.0-150600.23.84.1
* kernel-macros-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch nosrc)
* kernel-docs-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.84.1
* kernel-zfcpdump-debugsource-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1
* kernel-default-debuginfo-6.4.0-150600.23.84.1
* kernel-default-devel-debuginfo-6.4.0-150600.23.84.1
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1
* cluster-md-kmp-default-6.4.0-150600.23.84.1
* dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1
* dlm-kmp-default-6.4.0-150600.23.84.1
* kernel-default-debugsource-6.4.0-150600.23.84.1
* kernel-default-devel-6.4.0-150600.23.84.1
* kernel-obs-build-6.4.0-150600.23.84.1
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
* kernel-obs-build-debugsource-6.4.0-150600.23.84.1
* reiserfs-kmp-default-6.4.0-150600.23.84.1
* kernel-syms-6.4.0-150600.23.84.1
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
* ocfs2-kmp-default-6.4.0-150600.23.84.1
* gfs2-kmp-default-6.4.0-150600.23.84.1
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le
x86_64)
* kernel-default-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* kernel-devel-6.4.0-150600.23.84.1
* kernel-source-6.4.0-150600.23.84.1
* kernel-macros-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.84.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1
* kernel-default-debuginfo-6.4.0-150600.23.84.1
* kernel-default-debugsource-6.4.0-150600.23.84.1
* kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-1-150600.13.3.1
* kernel-default-livepatch-6.4.0-150600.23.84.1
* kernel-livepatch-SLE15-SP6_Update_19-debugsource-1-150600.13.3.1
* kernel-default-livepatch-devel-6.4.0-150600.23.84.1

## References:

* https://www.suse.com/security/cve/CVE-2023-42752.html
* https://www.suse.com/security/cve/CVE-2023-53743.html
* https://www.suse.com/security/cve/CVE-2023-53750.html
* https://www.suse.com/security/cve/CVE-2023-53752.html
* https://www.suse.com/security/cve/CVE-2023-53759.html
* https://www.suse.com/security/cve/CVE-2023-53762.html
* https://www.suse.com/security/cve/CVE-2023-53766.html
* https://www.suse.com/security/cve/CVE-2023-53768.html
* https://www.suse.com/security/cve/CVE-2023-53777.html
* https://www.suse.com/security/cve/CVE-2023-53778.html
* https://www.suse.com/security/cve/CVE-2023-53782.html
* https://www.suse.com/security/cve/CVE-2023-53784.html
* https://www.suse.com/security/cve/CVE-2023-53785.html
* https://www.suse.com/security/cve/CVE-2023-53787.html
* https://www.suse.com/security/cve/CVE-2023-53791.html
* https://www.suse.com/security/cve/CVE-2023-53792.html
* https://www.suse.com/security/cve/CVE-2023-53793.html
* https://www.suse.com/security/cve/CVE-2023-53794.html
* https://www.suse.com/security/cve/CVE-2023-53795.html
* https://www.suse.com/security/cve/CVE-2023-53797.html
* https://www.suse.com/security/cve/CVE-2023-53799.html
* https://www.suse.com/security/cve/CVE-2023-53807.html
* https://www.suse.com/security/cve/CVE-2023-53808.html
* https://www.suse.com/security/cve/CVE-2023-53813.html
* https://www.suse.com/security/cve/CVE-2023-53815.html
* https://www.suse.com/security/cve/CVE-2023-53819.html
* https://www.suse.com/security/cve/CVE-2023-53821.html
* https://www.suse.com/security/cve/CVE-2023-53823.html
* https://www.suse.com/security/cve/CVE-2023-53825.html
* https://www.suse.com/security/cve/CVE-2023-53828.html
* https://www.suse.com/security/cve/CVE-2023-53831.html
* https://www.suse.com/security/cve/CVE-2023-53834.html
* https://www.suse.com/security/cve/CVE-2023-53836.html
* https://www.suse.com/security/cve/CVE-2023-53839.html
* https://www.suse.com/security/cve/CVE-2023-53841.html
* https://www.suse.com/security/cve/CVE-2023-53842.html
* https://www.suse.com/security/cve/CVE-2023-53843.html
* https://www.suse.com/security/cve/CVE-2023-53844.html
* https://www.suse.com/security/cve/CVE-2023-53846.html
* https://www.suse.com/security/cve/CVE-2023-53847.html
* https://www.suse.com/security/cve/CVE-2023-53848.html
* https://www.suse.com/security/cve/CVE-2023-53850.html
* https://www.suse.com/security/cve/CVE-2023-53851.html
* https://www.suse.com/security/cve/CVE-2023-53852.html
* https://www.suse.com/security/cve/CVE-2023-53855.html
* https://www.suse.com/security/cve/CVE-2023-53856.html
* https://www.suse.com/security/cve/CVE-2023-53857.html
* https://www.suse.com/security/cve/CVE-2023-53858.html
* https://www.suse.com/security/cve/CVE-2023-53860.html
* https://www.suse.com/security/cve/CVE-2023-53861.html
* https://www.suse.com/security/cve/CVE-2023-53863.html
* https://www.suse.com/security/cve/CVE-2023-53864.html
* https://www.suse.com/security/cve/CVE-2023-53865.html
* https://www.suse.com/security/cve/CVE-2023-53989.html
* https://www.suse.com/security/cve/CVE-2023-53992.html
* https://www.suse.com/security/cve/CVE-2023-53994.html
* https://www.suse.com/security/cve/CVE-2023-53995.html
* https://www.suse.com/security/cve/CVE-2023-53996.html
* https://www.suse.com/security/cve/CVE-2023-53997.html
* https://www.suse.com/security/cve/CVE-2023-53998.html
* https://www.suse.com/security/cve/CVE-2023-53999.html
* https://www.suse.com/security/cve/CVE-2023-54000.html
* https://www.suse.com/security/cve/CVE-2023-54001.html
* https://www.suse.com/security/cve/CVE-2023-54005.html
* https://www.suse.com/security/cve/CVE-2023-54006.html
* https://www.suse.com/security/cve/CVE-2023-54008.html
* https://www.suse.com/security/cve/CVE-2023-54014.html
* https://www.suse.com/security/cve/CVE-2023-54016.html
* https://www.suse.com/security/cve/CVE-2023-54017.html
* https://www.suse.com/security/cve/CVE-2023-54019.html
* https://www.suse.com/security/cve/CVE-2023-54022.html
* https://www.suse.com/security/cve/CVE-2023-54023.html
* https://www.suse.com/security/cve/CVE-2023-54025.html
* https://www.suse.com/security/cve/CVE-2023-54026.html
* https://www.suse.com/security/cve/CVE-2023-54027.html
* https://www.suse.com/security/cve/CVE-2023-54030.html
* https://www.suse.com/security/cve/CVE-2023-54031.html
* https://www.suse.com/security/cve/CVE-2023-54032.html
* https://www.suse.com/security/cve/CVE-2023-54035.html
* https://www.suse.com/security/cve/CVE-2023-54037.html
* https://www.suse.com/security/cve/CVE-2023-54038.html
* https://www.suse.com/security/cve/CVE-2023-54042.html
* https://www.suse.com/security/cve/CVE-2023-54045.html
* https://www.suse.com/security/cve/CVE-2023-54048.html
* https://www.suse.com/security/cve/CVE-2023-54049.html
* https://www.suse.com/security/cve/CVE-2023-54051.html
* https://www.suse.com/security/cve/CVE-2023-54052.html
* https://www.suse.com/security/cve/CVE-2023-54060.html
* https://www.suse.com/security/cve/CVE-2023-54064.html
* https://www.suse.com/security/cve/CVE-2023-54066.html
* https://www.suse.com/security/cve/CVE-2023-54067.html
* https://www.suse.com/security/cve/CVE-2023-54069.html
* https://www.suse.com/security/cve/CVE-2023-54070.html
* https://www.suse.com/security/cve/CVE-2023-54072.html
* https://www.suse.com/security/cve/CVE-2023-54076.html
* https://www.suse.com/security/cve/CVE-2023-54080.html
* https://www.suse.com/security/cve/CVE-2023-54081.html
* https://www.suse.com/security/cve/CVE-2023-54083.html
* https://www.suse.com/security/cve/CVE-2023-54088.html
* https://www.suse.com/security/cve/CVE-2023-54089.html
* https://www.suse.com/security/cve/CVE-2023-54091.html
* https://www.suse.com/security/cve/CVE-2023-54092.html
* https://www.suse.com/security/cve/CVE-2023-54093.html
* https://www.suse.com/security/cve/CVE-2023-54094.html
* https://www.suse.com/security/cve/CVE-2023-54095.html
* https://www.suse.com/security/cve/CVE-2023-54096.html
* https://www.suse.com/security/cve/CVE-2023-54099.html
* https://www.suse.com/security/cve/CVE-2023-54101.html
* https://www.suse.com/security/cve/CVE-2023-54104.html
* https://www.suse.com/security/cve/CVE-2023-54106.html
* https://www.suse.com/security/cve/CVE-2023-54112.html
* https://www.suse.com/security/cve/CVE-2023-54113.html
* https://www.suse.com/security/cve/CVE-2023-54115.html
* https://www.suse.com/security/cve/CVE-2023-54117.html
* https://www.suse.com/security/cve/CVE-2023-54121.html
* https://www.suse.com/security/cve/CVE-2023-54125.html
* https://www.suse.com/security/cve/CVE-2023-54127.html
* https://www.suse.com/security/cve/CVE-2023-54133.html
* https://www.suse.com/security/cve/CVE-2023-54134.html
* https://www.suse.com/security/cve/CVE-2023-54135.html
* https://www.suse.com/security/cve/CVE-2023-54136.html
* https://www.suse.com/security/cve/CVE-2023-54137.html
* https://www.suse.com/security/cve/CVE-2023-54140.html
* https://www.suse.com/security/cve/CVE-2023-54141.html
* https://www.suse.com/security/cve/CVE-2023-54142.html
* https://www.suse.com/security/cve/CVE-2023-54143.html
* https://www.suse.com/security/cve/CVE-2023-54145.html
* https://www.suse.com/security/cve/CVE-2023-54148.html
* https://www.suse.com/security/cve/CVE-2023-54149.html
* https://www.suse.com/security/cve/CVE-2023-54153.html
* https://www.suse.com/security/cve/CVE-2023-54154.html
* https://www.suse.com/security/cve/CVE-2023-54155.html
* https://www.suse.com/security/cve/CVE-2023-54156.html
* https://www.suse.com/security/cve/CVE-2023-54164.html
* https://www.suse.com/security/cve/CVE-2023-54166.html
* https://www.suse.com/security/cve/CVE-2023-54169.html
* https://www.suse.com/security/cve/CVE-2023-54170.html
* https://www.suse.com/security/cve/CVE-2023-54171.html
* https://www.suse.com/security/cve/CVE-2023-54172.html
* https://www.suse.com/security/cve/CVE-2023-54173.html
* https://www.suse.com/security/cve/CVE-2023-54177.html
* https://www.suse.com/security/cve/CVE-2023-54178.html
* https://www.suse.com/security/cve/CVE-2023-54179.html
* https://www.suse.com/security/cve/CVE-2023-54181.html
* https://www.suse.com/security/cve/CVE-2023-54183.html
* https://www.suse.com/security/cve/CVE-2023-54185.html
* https://www.suse.com/security/cve/CVE-2023-54189.html
* https://www.suse.com/security/cve/CVE-2023-54194.html
* https://www.suse.com/security/cve/CVE-2023-54201.html
* https://www.suse.com/security/cve/CVE-2023-54204.html
* https://www.suse.com/security/cve/CVE-2023-54207.html
* https://www.suse.com/security/cve/CVE-2023-54209.html
* https://www.suse.com/security/cve/CVE-2023-54210.html
* https://www.suse.com/security/cve/CVE-2023-54211.html
* https://www.suse.com/security/cve/CVE-2023-54215.html
* https://www.suse.com/security/cve/CVE-2023-54219.html
* https://www.suse.com/security/cve/CVE-2023-54220.html
* https://www.suse.com/security/cve/CVE-2023-54221.html
* https://www.suse.com/security/cve/CVE-2023-54223.html
* https://www.suse.com/security/cve/CVE-2023-54224.html
* https://www.suse.com/security/cve/CVE-2023-54225.html
* https://www.suse.com/security/cve/CVE-2023-54227.html
* https://www.suse.com/security/cve/CVE-2023-54229.html
* https://www.suse.com/security/cve/CVE-2023-54230.html
* https://www.suse.com/security/cve/CVE-2023-54235.html
* https://www.suse.com/security/cve/CVE-2023-54240.html
* https://www.suse.com/security/cve/CVE-2023-54241.html
* https://www.suse.com/security/cve/CVE-2023-54246.html
* https://www.suse.com/security/cve/CVE-2023-54247.html
* https://www.suse.com/security/cve/CVE-2023-54251.html
* https://www.suse.com/security/cve/CVE-2023-54253.html
* https://www.suse.com/security/cve/CVE-2023-54254.html
* https://www.suse.com/security/cve/CVE-2023-54255.html
* https://www.suse.com/security/cve/CVE-2023-54258.html
* https://www.suse.com/security/cve/CVE-2023-54261.html
* https://www.suse.com/security/cve/CVE-2023-54263.html
* https://www.suse.com/security/cve/CVE-2023-54264.html
* https://www.suse.com/security/cve/CVE-2023-54266.html
* https://www.suse.com/security/cve/CVE-2023-54267.html
* https://www.suse.com/security/cve/CVE-2023-54271.html
* https://www.suse.com/security/cve/CVE-2023-54276.html
* https://www.suse.com/security/cve/CVE-2023-54278.html
* https://www.suse.com/security/cve/CVE-2023-54281.html
* https://www.suse.com/security/cve/CVE-2023-54282.html
* https://www.suse.com/security/cve/CVE-2023-54283.html
* https://www.suse.com/security/cve/CVE-2023-54285.html
* https://www.suse.com/security/cve/CVE-2023-54289.html
* https://www.suse.com/security/cve/CVE-2023-54291.html
* https://www.suse.com/security/cve/CVE-2023-54292.html
* https://www.suse.com/security/cve/CVE-2023-54293.html
* https://www.suse.com/security/cve/CVE-2023-54296.html
* https://www.suse.com/security/cve/CVE-2023-54297.html
* https://www.suse.com/security/cve/CVE-2023-54299.html
* https://www.suse.com/security/cve/CVE-2023-54300.html
* https://www.suse.com/security/cve/CVE-2023-54302.html
* https://www.suse.com/security/cve/CVE-2023-54303.html
* https://www.suse.com/security/cve/CVE-2023-54304.html
* https://www.suse.com/security/cve/CVE-2023-54309.html
* https://www.suse.com/security/cve/CVE-2023-54312.html
* https://www.suse.com/security/cve/CVE-2023-54313.html
* https://www.suse.com/security/cve/CVE-2023-54314.html
* https://www.suse.com/security/cve/CVE-2023-54315.html
* https://www.suse.com/security/cve/CVE-2023-54316.html
* https://www.suse.com/security/cve/CVE-2023-54318.html
* https://www.suse.com/security/cve/CVE-2023-54319.html
* https://www.suse.com/security/cve/CVE-2023-54322.html
* https://www.suse.com/security/cve/CVE-2023-54324.html
* https://www.suse.com/security/cve/CVE-2023-54326.html
* https://www.suse.com/security/cve/CVE-2024-26944.html
* https://www.suse.com/security/cve/CVE-2025-38321.html
* https://www.suse.com/security/cve/CVE-2025-38728.html
* https://www.suse.com/security/cve/CVE-2025-39890.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-40006.html
* https://www.suse.com/security/cve/CVE-2025-40024.html
* https://www.suse.com/security/cve/CVE-2025-40033.html
* https://www.suse.com/security/cve/CVE-2025-40042.html
* https://www.suse.com/security/cve/CVE-2025-40053.html
* https://www.suse.com/security/cve/CVE-2025-40081.html
* https://www.suse.com/security/cve/CVE-2025-40102.html
* https://www.suse.com/security/cve/CVE-2025-40134.html
* https://www.suse.com/security/cve/CVE-2025-40135.html
* https://www.suse.com/security/cve/CVE-2025-40153.html
* https://www.suse.com/security/cve/CVE-2025-40158.html
* https://www.suse.com/security/cve/CVE-2025-40167.html
* https://www.suse.com/security/cve/CVE-2025-40170.html
* https://www.suse.com/security/cve/CVE-2025-40178.html
* https://www.suse.com/security/cve/CVE-2025-40179.html
* https://www.suse.com/security/cve/CVE-2025-40187.html
* https://www.suse.com/security/cve/CVE-2025-40211.html
* https://www.suse.com/security/cve/CVE-2025-40215.html
* https://www.suse.com/security/cve/CVE-2025-40219.html
* https://www.suse.com/security/cve/CVE-2025-40220.html
* https://www.suse.com/security/cve/CVE-2025-40223.html
* https://www.suse.com/security/cve/CVE-2025-40233.html
* https://www.suse.com/security/cve/CVE-2025-40242.html
* https://www.suse.com/security/cve/CVE-2025-40244.html
* https://www.suse.com/security/cve/CVE-2025-40256.html
* https://www.suse.com/security/cve/CVE-2025-40258.html
* https://www.suse.com/security/cve/CVE-2025-40262.html
* https://www.suse.com/security/cve/CVE-2025-40263.html
* https://www.suse.com/security/cve/CVE-2025-40269.html
* https://www.suse.com/security/cve/CVE-2025-40272.html
* https://www.suse.com/security/cve/CVE-2025-40273.html
* https://www.suse.com/security/cve/CVE-2025-40275.html
* https://www.suse.com/security/cve/CVE-2025-40277.html
* https://www.suse.com/security/cve/CVE-2025-40280.html
* https://www.suse.com/security/cve/CVE-2025-40282.html
* https://www.suse.com/security/cve/CVE-2025-40283.html
* https://www.suse.com/security/cve/CVE-2025-40284.html
* https://www.suse.com/security/cve/CVE-2025-40288.html
* https://www.suse.com/security/cve/CVE-2025-40297.html
* https://www.suse.com/security/cve/CVE-2025-40301.html
* https://www.suse.com/security/cve/CVE-2025-40304.html
* https://www.suse.com/security/cve/CVE-2025-40306.html
* https://www.suse.com/security/cve/CVE-2025-40308.html
* https://www.suse.com/security/cve/CVE-2025-40309.html
* https://www.suse.com/security/cve/CVE-2025-40310.html
* https://www.suse.com/security/cve/CVE-2025-40311.html
* https://www.suse.com/security/cve/CVE-2025-40312.html
* https://www.suse.com/security/cve/CVE-2025-40314.html
* https://www.suse.com/security/cve/CVE-2025-40315.html
* https://www.suse.com/security/cve/CVE-2025-40316.html
* https://www.suse.com/security/cve/CVE-2025-40317.html
* https://www.suse.com/security/cve/CVE-2025-40318.html
* https://www.suse.com/security/cve/CVE-2025-40320.html
* https://www.suse.com/security/cve/CVE-2025-40321.html
* https://www.suse.com/security/cve/CVE-2025-40322.html
* https://www.suse.com/security/cve/CVE-2025-40323.html
* https://www.suse.com/security/cve/CVE-2025-40324.html
* https://www.suse.com/security/cve/CVE-2025-40328.html
* https://www.suse.com/security/cve/CVE-2025-40329.html
* https://www.suse.com/security/cve/CVE-2025-40331.html
* https://www.suse.com/security/cve/CVE-2025-40342.html
* https://www.suse.com/security/cve/CVE-2025-40343.html
* https://www.suse.com/security/cve/CVE-2025-40345.html
* https://www.suse.com/security/cve/CVE-2025-40349.html
* https://www.suse.com/security/cve/CVE-2025-40351.html
* https://www.suse.com/security/cve/CVE-2025-68168.html
* https://www.suse.com/security/cve/CVE-2025-68172.html
* https://www.suse.com/security/cve/CVE-2025-68176.html
* https://www.suse.com/security/cve/CVE-2025-68180.html
* https://www.suse.com/security/cve/CVE-2025-68183.html
* https://www.suse.com/security/cve/CVE-2025-68185.html
* https://www.suse.com/security/cve/CVE-2025-68192.html
* https://www.suse.com/security/cve/CVE-2025-68194.html
* https://www.suse.com/security/cve/CVE-2025-68195.html
* https://www.suse.com/security/cve/CVE-2025-68217.html
* https://www.suse.com/security/cve/CVE-2025-68218.html
* https://www.suse.com/security/cve/CVE-2025-68222.html
* https://www.suse.com/security/cve/CVE-2025-68233.html
* https://www.suse.com/security/cve/CVE-2025-68235.html
* https://www.suse.com/security/cve/CVE-2025-68237.html
* https://www.suse.com/security/cve/CVE-2025-68238.html
* https://www.suse.com/security/cve/CVE-2025-68244.html
* https://www.suse.com/security/cve/CVE-2025-68249.html
* https://www.suse.com/security/cve/CVE-2025-68252.html
* https://www.suse.com/security/cve/CVE-2025-68257.html
* https://www.suse.com/security/cve/CVE-2025-68258.html
* https://www.suse.com/security/cve/CVE-2025-68259.html
* https://www.suse.com/security/cve/CVE-2025-68286.html
* https://www.suse.com/security/cve/CVE-2025-68287.html
* https://www.suse.com/security/cve/CVE-2025-68289.html
* https://www.suse.com/security/cve/CVE-2025-68290.html
* https://www.suse.com/security/cve/CVE-2025-68303.html
* https://www.suse.com/security/cve/CVE-2025-68305.html
* https://www.suse.com/security/cve/CVE-2025-68307.html
* https://www.suse.com/security/cve/CVE-2025-68308.html
* https://www.suse.com/security/cve/CVE-2025-68312.html
* https://www.suse.com/security/cve/CVE-2025-68313.html
* https://www.suse.com/security/cve/CVE-2025-68328.html
* https://www.suse.com/security/cve/CVE-2025-68330.html
* https://www.suse.com/security/cve/CVE-2025-68331.html
* https://www.suse.com/security/cve/CVE-2025-68332.html
* https://www.suse.com/security/cve/CVE-2025-68335.html
* https://www.suse.com/security/cve/CVE-2025-68339.html
* https://www.suse.com/security/cve/CVE-2025-68345.html
* https://www.suse.com/security/cve/CVE-2025-68346.html
* https://www.suse.com/security/cve/CVE-2025-68347.html
* https://www.suse.com/security/cve/CVE-2025-68354.html
* https://www.suse.com/security/cve/CVE-2025-68362.html
* https://www.suse.com/security/cve/CVE-2025-68380.html
* https://www.suse.com/security/cve/CVE-2025-68724.html
* https://www.suse.com/security/cve/CVE-2025-68732.html
* https://www.suse.com/security/cve/CVE-2025-68734.html
* https://www.suse.com/security/cve/CVE-2025-68740.html
* https://www.suse.com/security/cve/CVE-2025-68746.html
* https://www.suse.com/security/cve/CVE-2025-68750.html
* https://www.suse.com/security/cve/CVE-2025-68753.html
* https://www.suse.com/security/cve/CVE-2025-68757.html
* https://www.suse.com/security/cve/CVE-2025-68758.html
* https://www.suse.com/security/cve/CVE-2025-68759.html
* https://www.suse.com/security/cve/CVE-2025-68765.html
* https://www.suse.com/security/cve/CVE-2025-68766.html
* https://bugzilla.suse.com/show_bug.cgi?id=1012628
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1214635
* https://bugzilla.suse.com/show_bug.cgi?id=1214847
* https://bugzilla.suse.com/show_bug.cgi?id=1215146
* https://bugzilla.suse.com/show_bug.cgi?id=1215211
* https://bugzilla.suse.com/show_bug.cgi?id=1215344
* https://bugzilla.suse.com/show_bug.cgi?id=1216062
* https://bugzilla.suse.com/show_bug.cgi?id=1216436
* https://bugzilla.suse.com/show_bug.cgi?id=1219165
* https://bugzilla.suse.com/show_bug.cgi?id=1220419
* https://bugzilla.suse.com/show_bug.cgi?id=1223731
* https://bugzilla.suse.com/show_bug.cgi?id=1234163
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1245449
* https://bugzilla.suse.com/show_bug.cgi?id=1246328
* https://bugzilla.suse.com/show_bug.cgi?id=1247500
* https://bugzilla.suse.com/show_bug.cgi?id=1248886
* https://bugzilla.suse.com/show_bug.cgi?id=1249256
* https://bugzilla.suse.com/show_bug.cgi?id=1250334
* https://bugzilla.suse.com/show_bug.cgi?id=1252046
* https://bugzilla.suse.com/show_bug.cgi?id=1252342
* https://bugzilla.suse.com/show_bug.cgi?id=1252686
* https://bugzilla.suse.com/show_bug.cgi?id=1252776
* https://bugzilla.suse.com/show_bug.cgi?id=1252808
* https://bugzilla.suse.com/show_bug.cgi?id=1252824
* https://bugzilla.suse.com/show_bug.cgi?id=1252861
* https://bugzilla.suse.com/show_bug.cgi?id=1252919
* https://bugzilla.suse.com/show_bug.cgi?id=1252973
* https://bugzilla.suse.com/show_bug.cgi?id=1253155
* https://bugzilla.suse.com/show_bug.cgi?id=1253262
* https://bugzilla.suse.com/show_bug.cgi?id=1253342
* https://bugzilla.suse.com/show_bug.cgi?id=1253386
* https://bugzilla.suse.com/show_bug.cgi?id=1253402
* https://bugzilla.suse.com/show_bug.cgi?id=1253408
* https://bugzilla.suse.com/show_bug.cgi?id=1253413
* https://bugzilla.suse.com/show_bug.cgi?id=1253442
* https://bugzilla.suse.com/show_bug.cgi?id=1253458
* https://bugzilla.suse.com/show_bug.cgi?id=1253463
* https://bugzilla.suse.com/show_bug.cgi?id=1253647
* https://bugzilla.suse.com/show_bug.cgi?id=1254119
* https://bugzilla.suse.com/show_bug.cgi?id=1254126
* https://bugzilla.suse.com/show_bug.cgi?id=1254373
* https://bugzilla.suse.com/show_bug.cgi?id=1254518
* https://bugzilla.suse.com/show_bug.cgi?id=1254520
* https://bugzilla.suse.com/show_bug.cgi?id=1254599
* https://bugzilla.suse.com/show_bug.cgi?id=1254606
* https://bugzilla.suse.com/show_bug.cgi?id=1254611
* https://bugzilla.suse.com/show_bug.cgi?id=1254613
* https://bugzilla.suse.com/show_bug.cgi?id=1254615
* https://bugzilla.suse.com/show_bug.cgi?id=1254621
* https://bugzilla.suse.com/show_bug.cgi?id=1254623
* https://bugzilla.suse.com/show_bug.cgi?id=1254624
* https://bugzilla.suse.com/show_bug.cgi?id=1254626
* https://bugzilla.suse.com/show_bug.cgi?id=1254648
* https://bugzilla.suse.com/show_bug.cgi?id=1254649
* https://bugzilla.suse.com/show_bug.cgi?id=1254653
* https://bugzilla.suse.com/show_bug.cgi?id=1254655
* https://bugzilla.suse.com/show_bug.cgi?id=1254657
* https://bugzilla.suse.com/show_bug.cgi?id=1254660
* https://bugzilla.suse.com/show_bug.cgi?id=1254661
* https://bugzilla.suse.com/show_bug.cgi?id=1254663
* https://bugzilla.suse.com/show_bug.cgi?id=1254669
* https://bugzilla.suse.com/show_bug.cgi?id=1254677
* https://bugzilla.suse.com/show_bug.cgi?id=1254678
* https://bugzilla.suse.com/show_bug.cgi?id=1254688
* https://bugzilla.suse.com/show_bug.cgi?id=1254690
* https://bugzilla.suse.com/show_bug.cgi?id=1254691
* https://bugzilla.suse.com/show_bug.cgi?id=1254693
* https://bugzilla.suse.com/show_bug.cgi?id=1254695
* https://bugzilla.suse.com/show_bug.cgi?id=1254698
* https://bugzilla.suse.com/show_bug.cgi?id=1254701
* https://bugzilla.suse.com/show_bug.cgi?id=1254704
* https://bugzilla.suse.com/show_bug.cgi?id=1254705
* https://bugzilla.suse.com/show_bug.cgi?id=1254707
* https://bugzilla.suse.com/show_bug.cgi?id=1254712
* https://bugzilla.suse.com/show_bug.cgi?id=1254715
* https://bugzilla.suse.com/show_bug.cgi?id=1254717
* https://bugzilla.suse.com/show_bug.cgi?id=1254723
* https://bugzilla.suse.com/show_bug.cgi?id=1254724
* https://bugzilla.suse.com/show_bug.cgi?id=1254732
* https://bugzilla.suse.com/show_bug.cgi?id=1254733
* https://bugzilla.suse.com/show_bug.cgi?id=1254737
* https://bugzilla.suse.com/show_bug.cgi?id=1254739
* https://bugzilla.suse.com/show_bug.cgi?id=1254742
* https://bugzilla.suse.com/show_bug.cgi?id=1254743
* https://bugzilla.suse.com/show_bug.cgi?id=1254749
* https://bugzilla.suse.com/show_bug.cgi?id=1254750
* https://bugzilla.suse.com/show_bug.cgi?id=1254753
* https://bugzilla.suse.com/show_bug.cgi?id=1254754
* https://bugzilla.suse.com/show_bug.cgi?id=1254758
* https://bugzilla.suse.com/show_bug.cgi?id=1254761
* https://bugzilla.suse.com/show_bug.cgi?id=1254762
* https://bugzilla.suse.com/show_bug.cgi?id=1254765
* https://bugzilla.suse.com/show_bug.cgi?id=1254782
* https://bugzilla.suse.com/show_bug.cgi?id=1254791
* https://bugzilla.suse.com/show_bug.cgi?id=1254793
* https://bugzilla.suse.com/show_bug.cgi?id=1254795
* https://bugzilla.suse.com/show_bug.cgi?id=1254796
* https://bugzilla.suse.com/show_bug.cgi?id=1254797
* https://bugzilla.suse.com/show_bug.cgi?id=1254798
* https://bugzilla.suse.com/show_bug.cgi?id=1254813
* https://bugzilla.suse.com/show_bug.cgi?id=1254828
* https://bugzilla.suse.com/show_bug.cgi?id=1254829
* https://bugzilla.suse.com/show_bug.cgi?id=1254832
* https://bugzilla.suse.com/show_bug.cgi?id=1254840
* https://bugzilla.suse.com/show_bug.cgi?id=1254843
* https://bugzilla.suse.com/show_bug.cgi?id=1254847
* https://bugzilla.suse.com/show_bug.cgi?id=1254850
* https://bugzilla.suse.com/show_bug.cgi?id=1254851
* https://bugzilla.suse.com/show_bug.cgi?id=1254858
* https://bugzilla.suse.com/show_bug.cgi?id=1254860
* https://bugzilla.suse.com/show_bug.cgi?id=1254894
* https://bugzilla.suse.com/show_bug.cgi?id=1254918
* https://bugzilla.suse.com/show_bug.cgi?id=1254957
* https://bugzilla.suse.com/show_bug.cgi?id=1254959
* https://bugzilla.suse.com/show_bug.cgi?id=1254983
* https://bugzilla.suse.com/show_bug.cgi?id=1255005
* https://bugzilla.suse.com/show_bug.cgi?id=1255009
* https://bugzilla.suse.com/show_bug.cgi?id=1255026
* https://bugzilla.suse.com/show_bug.cgi?id=1255033
* https://bugzilla.suse.com/show_bug.cgi?id=1255034
* https://bugzilla.suse.com/show_bug.cgi?id=1255035
* https://bugzilla.suse.com/show_bug.cgi?id=1255041
* https://bugzilla.suse.com/show_bug.cgi?id=1255046
* https://bugzilla.suse.com/show_bug.cgi?id=1255057
* https://bugzilla.suse.com/show_bug.cgi?id=1255062
* https://bugzilla.suse.com/show_bug.cgi?id=1255064
* https://bugzilla.suse.com/show_bug.cgi?id=1255065
* https://bugzilla.suse.com/show_bug.cgi?id=1255068
* https://bugzilla.suse.com/show_bug.cgi?id=1255072
* https://bugzilla.suse.com/show_bug.cgi?id=1255075
* https://bugzilla.suse.com/show_bug.cgi?id=1255077
* https://bugzilla.suse.com/show_bug.cgi?id=1255083
* https://bugzilla.suse.com/show_bug.cgi?id=1255092
* https://bugzilla.suse.com/show_bug.cgi?id=1255094
* https://bugzilla.suse.com/show_bug.cgi?id=1255100
* https://bugzilla.suse.com/show_bug.cgi?id=1255122
* https://bugzilla.suse.com/show_bug.cgi?id=1255135
* https://bugzilla.suse.com/show_bug.cgi?id=1255146
* https://bugzilla.suse.com/show_bug.cgi?id=1255149
* https://bugzilla.suse.com/show_bug.cgi?id=1255152
* https://bugzilla.suse.com/show_bug.cgi?id=1255154
* https://bugzilla.suse.com/show_bug.cgi?id=1255155
* https://bugzilla.suse.com/show_bug.cgi?id=1255163
* https://bugzilla.suse.com/show_bug.cgi?id=1255167
* https://bugzilla.suse.com/show_bug.cgi?id=1255169
* https://bugzilla.suse.com/show_bug.cgi?id=1255171
* https://bugzilla.suse.com/show_bug.cgi?id=1255182
* https://bugzilla.suse.com/show_bug.cgi?id=1255187
* https://bugzilla.suse.com/show_bug.cgi?id=1255190
* https://bugzilla.suse.com/show_bug.cgi?id=1255193
* https://bugzilla.suse.com/show_bug.cgi?id=1255197
* https://bugzilla.suse.com/show_bug.cgi?id=1255199
* https://bugzilla.suse.com/show_bug.cgi?id=1255202
* https://bugzilla.suse.com/show_bug.cgi?id=1255203
* https://bugzilla.suse.com/show_bug.cgi?id=1255206
* https://bugzilla.suse.com/show_bug.cgi?id=1255209
* https://bugzilla.suse.com/show_bug.cgi?id=1255218
* https://bugzilla.suse.com/show_bug.cgi?id=1255221
* https://bugzilla.suse.com/show_bug.cgi?id=1255233
* https://bugzilla.suse.com/show_bug.cgi?id=1255245
* https://bugzilla.suse.com/show_bug.cgi?id=1255246
* https://bugzilla.suse.com/show_bug.cgi?id=1255251
* https://bugzilla.suse.com/show_bug.cgi?id=1255252
* https://bugzilla.suse.com/show_bug.cgi?id=1255253
* https://bugzilla.suse.com/show_bug.cgi?id=1255259
* https://bugzilla.suse.com/show_bug.cgi?id=1255274
* https://bugzilla.suse.com/show_bug.cgi?id=1255276
* https://bugzilla.suse.com/show_bug.cgi?id=1255279
* https://bugzilla.suse.com/show_bug.cgi?id=1255280
* https://bugzilla.suse.com/show_bug.cgi?id=1255281
* https://bugzilla.suse.com/show_bug.cgi?id=1255325
* https://bugzilla.suse.com/show_bug.cgi?id=1255329
* https://bugzilla.suse.com/show_bug.cgi?id=1255351
* https://bugzilla.suse.com/show_bug.cgi?id=1255415
* https://bugzilla.suse.com/show_bug.cgi?id=1255480
* https://bugzilla.suse.com/show_bug.cgi?id=1255483
* https://bugzilla.suse.com/show_bug.cgi?id=1255489
* https://bugzilla.suse.com/show_bug.cgi?id=1255493
* https://bugzilla.suse.com/show_bug.cgi?id=1255495
* https://bugzilla.suse.com/show_bug.cgi?id=1255505
* https://bugzilla.suse.com/show_bug.cgi?id=1255538
* https://bugzilla.suse.com/show_bug.cgi?id=1255540
* https://bugzilla.suse.com/show_bug.cgi?id=1255545
* https://bugzilla.suse.com/show_bug.cgi?id=1255549
* https://bugzilla.suse.com/show_bug.cgi?id=1255550
* https://bugzilla.suse.com/show_bug.cgi?id=1255553
* https://bugzilla.suse.com/show_bug.cgi?id=1255557
* https://bugzilla.suse.com/show_bug.cgi?id=1255558
* https://bugzilla.suse.com/show_bug.cgi?id=1255563
* https://bugzilla.suse.com/show_bug.cgi?id=1255564
* https://bugzilla.suse.com/show_bug.cgi?id=1255570
* https://bugzilla.suse.com/show_bug.cgi?id=1255578
* https://bugzilla.suse.com/show_bug.cgi?id=1255579
* https://bugzilla.suse.com/show_bug.cgi?id=1255580
* https://bugzilla.suse.com/show_bug.cgi?id=1255583
* https://bugzilla.suse.com/show_bug.cgi?id=1255591
* https://bugzilla.suse.com/show_bug.cgi?id=1255601
* https://bugzilla.suse.com/show_bug.cgi?id=1255603
* https://bugzilla.suse.com/show_bug.cgi?id=1255605
* https://bugzilla.suse.com/show_bug.cgi?id=1255611
* https://bugzilla.suse.com/show_bug.cgi?id=1255616
* https://bugzilla.suse.com/show_bug.cgi?id=1255617
* https://bugzilla.suse.com/show_bug.cgi?id=1255618
* https://bugzilla.suse.com/show_bug.cgi?id=1255621
* https://bugzilla.suse.com/show_bug.cgi?id=1255628
* https://bugzilla.suse.com/show_bug.cgi?id=1255629
* https://bugzilla.suse.com/show_bug.cgi?id=1255630
* https://bugzilla.suse.com/show_bug.cgi?id=1255632
* https://bugzilla.suse.com/show_bug.cgi?id=1255636
* https://bugzilla.suse.com/show_bug.cgi?id=1255688
* https://bugzilla.suse.com/show_bug.cgi?id=1255691
* https://bugzilla.suse.com/show_bug.cgi?id=1255702
* https://bugzilla.suse.com/show_bug.cgi?id=1255704
* https://bugzilla.suse.com/show_bug.cgi?id=1255706
* https://bugzilla.suse.com/show_bug.cgi?id=1255722
* https://bugzilla.suse.com/show_bug.cgi?id=1255758
* https://bugzilla.suse.com/show_bug.cgi?id=1255759
* https://bugzilla.suse.com/show_bug.cgi?id=1255760
* https://bugzilla.suse.com/show_bug.cgi?id=1255763
* https://bugzilla.suse.com/show_bug.cgi?id=1255769
* https://bugzilla.suse.com/show_bug.cgi?id=1255770
* https://bugzilla.suse.com/show_bug.cgi?id=1255772
* https://bugzilla.suse.com/show_bug.cgi?id=1255774
* https://bugzilla.suse.com/show_bug.cgi?id=1255775
* https://bugzilla.suse.com/show_bug.cgi?id=1255776
* https://bugzilla.suse.com/show_bug.cgi?id=1255780
* https://bugzilla.suse.com/show_bug.cgi?id=1255785
* https://bugzilla.suse.com/show_bug.cgi?id=1255786
* https://bugzilla.suse.com/show_bug.cgi?id=1255789
* https://bugzilla.suse.com/show_bug.cgi?id=1255790
* https://bugzilla.suse.com/show_bug.cgi?id=1255792
* https://bugzilla.suse.com/show_bug.cgi?id=1255793
* https://bugzilla.suse.com/show_bug.cgi?id=1255795
* https://bugzilla.suse.com/show_bug.cgi?id=1255798
* https://bugzilla.suse.com/show_bug.cgi?id=1255800
* https://bugzilla.suse.com/show_bug.cgi?id=1255801
* https://bugzilla.suse.com/show_bug.cgi?id=1255806
* https://bugzilla.suse.com/show_bug.cgi?id=1255807
* https://bugzilla.suse.com/show_bug.cgi?id=1255809
* https://bugzilla.suse.com/show_bug.cgi?id=1255810
* https://bugzilla.suse.com/show_bug.cgi?id=1255812
* https://bugzilla.suse.com/show_bug.cgi?id=1255814
* https://bugzilla.suse.com/show_bug.cgi?id=1255820
* https://bugzilla.suse.com/show_bug.cgi?id=1255838
* https://bugzilla.suse.com/show_bug.cgi?id=1255842
* https://bugzilla.suse.com/show_bug.cgi?id=1255843
* https://bugzilla.suse.com/show_bug.cgi?id=1255872
* https://bugzilla.suse.com/show_bug.cgi?id=1255875
* https://bugzilla.suse.com/show_bug.cgi?id=1255879
* https://bugzilla.suse.com/show_bug.cgi?id=1255883
* https://bugzilla.suse.com/show_bug.cgi?id=1255884
* https://bugzilla.suse.com/show_bug.cgi?id=1255886
* https://bugzilla.suse.com/show_bug.cgi?id=1255888
* https://bugzilla.suse.com/show_bug.cgi?id=1255890
* https://bugzilla.suse.com/show_bug.cgi?id=1255891
* https://bugzilla.suse.com/show_bug.cgi?id=1255892
* https://bugzilla.suse.com/show_bug.cgi?id=1255899
* https://bugzilla.suse.com/show_bug.cgi?id=1255902
* https://bugzilla.suse.com/show_bug.cgi?id=1255907
* https://bugzilla.suse.com/show_bug.cgi?id=1255911
* https://bugzilla.suse.com/show_bug.cgi?id=1255915
* https://bugzilla.suse.com/show_bug.cgi?id=1255918
* https://bugzilla.suse.com/show_bug.cgi?id=1255921
* https://bugzilla.suse.com/show_bug.cgi?id=1255924
* https://bugzilla.suse.com/show_bug.cgi?id=1255925
* https://bugzilla.suse.com/show_bug.cgi?id=1255931
* https://bugzilla.suse.com/show_bug.cgi?id=1255932
* https://bugzilla.suse.com/show_bug.cgi?id=1255934
* https://bugzilla.suse.com/show_bug.cgi?id=1255943
* https://bugzilla.suse.com/show_bug.cgi?id=1255944
* https://bugzilla.suse.com/show_bug.cgi?id=1255949
* https://bugzilla.suse.com/show_bug.cgi?id=1255951
* https://bugzilla.suse.com/show_bug.cgi?id=1255952
* https://bugzilla.suse.com/show_bug.cgi?id=1255955
* https://bugzilla.suse.com/show_bug.cgi?id=1255957
* https://bugzilla.suse.com/show_bug.cgi?id=1255961
* https://bugzilla.suse.com/show_bug.cgi?id=1255963
* https://bugzilla.suse.com/show_bug.cgi?id=1255964
* https://bugzilla.suse.com/show_bug.cgi?id=1255967
* https://bugzilla.suse.com/show_bug.cgi?id=1255974
* https://bugzilla.suse.com/show_bug.cgi?id=1255978
* https://bugzilla.suse.com/show_bug.cgi?id=1255984
* https://bugzilla.suse.com/show_bug.cgi?id=1255988
* https://bugzilla.suse.com/show_bug.cgi?id=1255990
* https://bugzilla.suse.com/show_bug.cgi?id=1255992
* https://bugzilla.suse.com/show_bug.cgi?id=1255993
* https://bugzilla.suse.com/show_bug.cgi?id=1255994
* https://bugzilla.suse.com/show_bug.cgi?id=1255996
* https://bugzilla.suse.com/show_bug.cgi?id=1256033
* https://bugzilla.suse.com/show_bug.cgi?id=1256034
* https://bugzilla.suse.com/show_bug.cgi?id=1256045
* https://bugzilla.suse.com/show_bug.cgi?id=1256050
* https://bugzilla.suse.com/show_bug.cgi?id=1256058
* https://bugzilla.suse.com/show_bug.cgi?id=1256071
* https://bugzilla.suse.com/show_bug.cgi?id=1256074
* https://bugzilla.suse.com/show_bug.cgi?id=1256081
* https://bugzilla.suse.com/show_bug.cgi?id=1256082
* https://bugzilla.suse.com/show_bug.cgi?id=1256083
* https://bugzilla.suse.com/show_bug.cgi?id=1256084
* https://bugzilla.suse.com/show_bug.cgi?id=1256085
* https://bugzilla.suse.com/show_bug.cgi?id=1256090
* https://bugzilla.suse.com/show_bug.cgi?id=1256093
* https://bugzilla.suse.com/show_bug.cgi?id=1256094
* https://bugzilla.suse.com/show_bug.cgi?id=1256095
* https://bugzilla.suse.com/show_bug.cgi?id=1256096
* https://bugzilla.suse.com/show_bug.cgi?id=1256099
* https://bugzilla.suse.com/show_bug.cgi?id=1256100
* https://bugzilla.suse.com/show_bug.cgi?id=1256104
* https://bugzilla.suse.com/show_bug.cgi?id=1256106
* https://bugzilla.suse.com/show_bug.cgi?id=1256107
* https://bugzilla.suse.com/show_bug.cgi?id=1256117
* https://bugzilla.suse.com/show_bug.cgi?id=1256119
* https://bugzilla.suse.com/show_bug.cgi?id=1256121
* https://bugzilla.suse.com/show_bug.cgi?id=1256145
* https://bugzilla.suse.com/show_bug.cgi?id=1256153
* https://bugzilla.suse.com/show_bug.cgi?id=1256178
* https://bugzilla.suse.com/show_bug.cgi?id=1256197
* https://bugzilla.suse.com/show_bug.cgi?id=1256231
* https://bugzilla.suse.com/show_bug.cgi?id=1256233
* https://bugzilla.suse.com/show_bug.cgi?id=1256234
* https://bugzilla.suse.com/show_bug.cgi?id=1256238
* https://bugzilla.suse.com/show_bug.cgi?id=1256263
* https://bugzilla.suse.com/show_bug.cgi?id=1256267
* https://bugzilla.suse.com/show_bug.cgi?id=1256268
* https://bugzilla.suse.com/show_bug.cgi?id=1256271
* https://bugzilla.suse.com/show_bug.cgi?id=1256273
* https://bugzilla.suse.com/show_bug.cgi?id=1256274
* https://bugzilla.suse.com/show_bug.cgi?id=1256279
* https://bugzilla.suse.com/show_bug.cgi?id=1256285
* https://bugzilla.suse.com/show_bug.cgi?id=1256291
* https://bugzilla.suse.com/show_bug.cgi?id=1256292
* https://bugzilla.suse.com/show_bug.cgi?id=1256300
* https://bugzilla.suse.com/show_bug.cgi?id=1256301
* https://bugzilla.suse.com/show_bug.cgi?id=1256302
* https://bugzilla.suse.com/show_bug.cgi?id=1256335
* https://bugzilla.suse.com/show_bug.cgi?id=1256348
* https://bugzilla.suse.com/show_bug.cgi?id=1256351
* https://bugzilla.suse.com/show_bug.cgi?id=1256354
* https://bugzilla.suse.com/show_bug.cgi?id=1256358
* https://bugzilla.suse.com/show_bug.cgi?id=1256361
* https://bugzilla.suse.com/show_bug.cgi?id=1256364
* https://bugzilla.suse.com/show_bug.cgi?id=1256367
* https://bugzilla.suse.com/show_bug.cgi?id=1256368
* https://bugzilla.suse.com/show_bug.cgi?id=1256369
* https://bugzilla.suse.com/show_bug.cgi?id=1256370
* https://bugzilla.suse.com/show_bug.cgi?id=1256371
* https://bugzilla.suse.com/show_bug.cgi?id=1256373
* https://bugzilla.suse.com/show_bug.cgi?id=1256375
* https://bugzilla.suse.com/show_bug.cgi?id=1256379
* https://bugzilla.suse.com/show_bug.cgi?id=1256387
* https://bugzilla.suse.com/show_bug.cgi?id=1256394
* https://bugzilla.suse.com/show_bug.cgi?id=1256395
* https://bugzilla.suse.com/show_bug.cgi?id=1256396
* https://bugzilla.suse.com/show_bug.cgi?id=1256528
* https://jira.suse.com/browse/PED-14062
* https://jira.suse.com/browse/PED-3527
* https://jira.suse.com/browse/PED-4866
* https://jira.suse.com/browse/PED-5065
* https://jira.suse.com/browse/PED-5453
* https://jira.suse.com/browse/PED-5475
* https://jira.suse.com/browse/PED-5477
* https://jira.suse.com/browse/PED-5511
* https://jira.suse.com/browse/PED-6036
* https://jira.suse.com/browse/PED-6041
* https://jira.suse.com/browse/PED-6045
* https://jira.suse.com/browse/PED-6067
* https://jira.suse.com/browse/PED-6068
* https://jira.suse.com/browse/PED-6069
* https://jira.suse.com/browse/PED-6070
* https://jira.suse.com/browse/PED-6071
* https://jira.suse.com/browse/PED-6104
* https://jira.suse.com/browse/PED-6114
* https://jira.suse.com/browse/PED-6116
* https://jira.suse.com/browse/PED-6120
* https://jira.suse.com/browse/PED-6123
* https://jira.suse.com/browse/PED-6811
* https://jira.suse.com/browse/PED-7514
* https://jira.suse.com/browse/PED-7542
* https://jira.suse.com/browse/PED-7779
* https://jira.suse.com/browse/PED-7780



SUSE-SU-2026:0290-1: important: Security update for openvswitch3


# Security update for openvswitch3

Announcement ID: SUSE-SU-2026:0290-1
Release Date: 2026-01-26T10:34:27Z
Rating: important
References:

* bsc#1210054
* bsc#1212125
* bsc#1216002
* bsc#1219465
* bsc#1255435

Cross-References:

* CVE-2023-1668
* CVE-2023-3152
* CVE-2023-3153
* CVE-2023-3966
* CVE-2023-5366
* CVE-2024-2182
* CVE-2025-0650

CVSS scores:

* CVE-2023-1668 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-3152 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3152 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-3152 ( NVD ): 6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-3153 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-3153 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-3966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-5366 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-5366 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2182 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2182 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-0650 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves seven vulnerabilities can now be installed.

## Description:

This update for openvswitch3 fixes the following issues:

Update to v3.1.7:

* CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve
with HW offload (bsc#1219465).
* CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD
packets may lead to denial of service (bsc#1255435).
* CVE-2023-1668: openvswitch: remote traffic denial of service via crafted
packets with IP proto 0 (bsc#1210054).
* CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not
rate limited (bsc#1212125).
* CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie
(bsc#1216002).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-290=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-290=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-290=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-290=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-290=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-290=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-290=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libovn-23_03-0-23.03.3-150500.3.25.1
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-3.1.7-150500.3.25.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-ipsec-3.1.7-150500.3.25.1
* libopenvswitch-3_1-0-3.1.7-150500.3.25.1
* ovn3-devel-23.03.3-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* openvswitch3-test-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-devel-3.1.7-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.25.1
* openSUSE Leap 15.5 (noarch)
* ovn3-doc-23.03.3-150500.3.25.1
* openvswitch3-doc-3.1.7-150500.3.25.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-3.1.7-150500.3.25.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-ipsec-3.1.7-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* ovn3-devel-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* openvswitch3-test-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-devel-3.1.7-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* openSUSE Leap 15.6 (noarch)
* ovn3-doc-23.03.3-150500.3.25.1
* openvswitch3-doc-3.1.7-150500.3.25.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* openvswitch3-3.1.7-150500.3.25.1
* libovn-23_03-0-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.25.1
* libopenvswitch-3_1-0-3.1.7-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.25.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libovn-23_03-0-23.03.3-150500.3.25.1
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-3.1.7-150500.3.25.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-ipsec-3.1.7-150500.3.25.1
* libopenvswitch-3_1-0-3.1.7-150500.3.25.1
* ovn3-devel-23.03.3-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* openvswitch3-test-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-devel-3.1.7-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.25.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libovn-23_03-0-23.03.3-150500.3.25.1
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-3.1.7-150500.3.25.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-ipsec-3.1.7-150500.3.25.1
* libopenvswitch-3_1-0-3.1.7-150500.3.25.1
* ovn3-devel-23.03.3-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* openvswitch3-test-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-devel-3.1.7-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.25.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libovn-23_03-0-23.03.3-150500.3.25.1
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-3.1.7-150500.3.25.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-ipsec-3.1.7-150500.3.25.1
* libopenvswitch-3_1-0-3.1.7-150500.3.25.1
* ovn3-devel-23.03.3-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* openvswitch3-test-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-devel-3.1.7-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.25.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libovn-23_03-0-23.03.3-150500.3.25.1
* ovn3-host-debuginfo-23.03.3-150500.3.25.1
* ovn3-vtep-23.03.3-150500.3.25.1
* ovn3-central-23.03.3-150500.3.25.1
* ovn3-docker-23.03.3-150500.3.25.1
* ovn3-central-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-3.1.7-150500.3.25.1
* openvswitch3-test-debuginfo-3.1.7-150500.3.25.1
* ovn3-vtep-debuginfo-23.03.3-150500.3.25.1
* openvswitch3-pki-3.1.7-150500.3.25.1
* python3-ovs3-3.1.7-150500.3.25.1
* openvswitch3-ipsec-3.1.7-150500.3.25.1
* libopenvswitch-3_1-0-3.1.7-150500.3.25.1
* ovn3-devel-23.03.3-150500.3.25.1
* ovn3-host-23.03.3-150500.3.25.1
* openvswitch3-debugsource-3.1.7-150500.3.25.1
* openvswitch3-test-3.1.7-150500.3.25.1
* ovn3-23.03.3-150500.3.25.1
* openvswitch3-vtep-3.1.7-150500.3.25.1
* ovn3-debuginfo-23.03.3-150500.3.25.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-devel-3.1.7-150500.3.25.1
* openvswitch3-vtep-debuginfo-3.1.7-150500.3.25.1
* openvswitch3-debuginfo-3.1.7-150500.3.25.1
* libovn-23_03-0-debuginfo-23.03.3-150500.3.25.1

## References:

* https://www.suse.com/security/cve/CVE-2023-1668.html
* https://www.suse.com/security/cve/CVE-2023-3152.html
* https://www.suse.com/security/cve/CVE-2023-3153.html
* https://www.suse.com/security/cve/CVE-2023-3966.html
* https://www.suse.com/security/cve/CVE-2023-5366.html
* https://www.suse.com/security/cve/CVE-2024-2182.html
* https://www.suse.com/security/cve/CVE-2025-0650.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210054
* https://bugzilla.suse.com/show_bug.cgi?id=1212125
* https://bugzilla.suse.com/show_bug.cgi?id=1216002
* https://bugzilla.suse.com/show_bug.cgi?id=1219465
* https://bugzilla.suse.com/show_bug.cgi?id=1255435



SUSE-SU-2026:0295-1: important: Security update for nodejs22


# Security update for nodejs22

Announcement ID: SUSE-SU-2026:0295-1
Release Date: 2026-01-26T13:19:07Z
Rating: important
References:

* bsc#1256569
* bsc#1256570
* bsc#1256571
* bsc#1256573
* bsc#1256574
* bsc#1256576
* bsc#1256848

Cross-References:

* CVE-2025-55130
* CVE-2025-55131
* CVE-2025-55132
* CVE-2025-59465
* CVE-2025-59466
* CVE-2026-21637
* CVE-2026-22036

CVSS scores:

* CVE-2025-55130 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55130 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55130 ( NVD ): 7.1 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-55131 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55131 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-55131 ( NVD ): 7.1 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2025-55132 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-55132 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-55132 ( NVD ): 2.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-59465 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59465 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59465 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-59466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-59466 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-21637 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21637 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-21637 ( NVD ): 5.9 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22036 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-22036 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22036 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22036 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities can now be installed.

## Description:

This update for nodejs22 fixes the following issues:

Security fixes:

* CVE-2026-22036: Fixed unbounded decompression chain in HTTP response leading
to resource exhaustion (bsc#1256848)
* CVE-2026-21637: Fixed synchronous exceptions thrown during callbacks that
bypass TLS error handling and causing denial of service (bsc#1256576)
* CVE-2025-55132: Fixed futimes() ability to acces file even if process has
read permissions only (bsc#1256571)
* CVE-2025-55131: Fixed race condition that allowed allocations with leftover
data leading to in-process secrets exposure (bsc#1256570)
* CVE-2025-55130: Fixed filesystem permissions bypass via crafted symlinks
(bsc#1256569)
* CVE-2025-59465: Fixed malformed HTTP/2 HEADERS frame with invalid HPACK
leading to crash (bsc#1256573)
* CVE-2025-59466: Fixed uncatchable "Maximum call stack size exceeded" error
leading to crash (bsc#1256574)

Other fixes:

* Update to 22.22.0:
* deps: updated undici to 6.23.0
* deps: updated bundled c-ares to 1.34.6 (if used)
* add TLSSocket default error handler
* disable futimes when permission model is enabled
* require full read and write to symlink APIs
* rethrow stack overflow exceptions in async_hooks
* refactor unsafe buffer creation to remove zero-fill toggle
* route callback exceptions through error handlers

* Update to 22.21.1:

* src: avoid unnecessary string -> char* -> string round trips
* src: remove unnecessary shadowed functions on Utf8Value & BufferValue
* process: fix hrtime fast call signatures
* http: improve writeEarlyHints by avoiding for-of loop

* Update to 22.21.0:

* cli: add --use-env-proxy
* http: support http proxy for fetch under NODE_USE_ENV_PROXY
* http: add shouldUpgradeCallback to let servers control HTTP upgrades
* http,https: add built-in proxy support in http/https.request and Agent
* src: add percentage support to --max-old-space-size

* Update to 22.20.0

* doc: stabilize --disable-sigusr1
* doc: mark path.matchesGlob as stable
* http: add Agent.agentKeepAliveTimeoutBuffer option
* http2: add support for raw header arrays in h2Stream.respond()
* inspector: add http2 tracking support
* sea: implement execArgvExtension
* sea: support execArgv in sea config
* stream: add brotli support to CompressionStream and DecompressionStream
* test_runner: support object property mocking
* worker: add cpu profile APIs for worker

* Update to 22.19.0

* cli: add NODE_USE_SYSTEM_CA=1
* cli: support ${pid} placeholder in --cpu-prof-name
* crypto: add tls.setDefaultCACertificates()
* dns: support max timeout
* doc: update the instruction on how to verify releases
* esm: unflag --experimental-wasm-modules
* http: add server.keepAliveTimeoutBuffer option
* lib: docs deprecate _http_ *
* net: update net.blocklist to allow file save and file management
* process: add threadCpuUsage
* zlib: add dictionary support to zstdCompress and zstdDecompress

* Update to 22.18.0:

* deps: update amaro to 1.1.0
* doc: add all watch-mode related flags to node.1
* doc: add islandryu to collaborators
* esm: implement import.meta.main
* fs: allow correct handling of burst in fs-events with AsyncIterator
* permission: propagate permission model flags on spawn
* sqlite: add support for readBigInts option in db connection level
* src,permission: add support to permission.has(addon)
* url: add fileURLToPathBuffer API
* watch: add --watch-kill-signal flag
* worker: make Worker async disposable

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-295=1 SUSE-2026-295=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-295=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-295=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* npm22-22.22.0-150600.13.12.1
* nodejs22-debugsource-22.22.0-150600.13.12.1
* nodejs22-devel-22.22.0-150600.13.12.1
* nodejs22-22.22.0-150600.13.12.1
* corepack22-22.22.0-150600.13.12.1
* nodejs22-debuginfo-22.22.0-150600.13.12.1
* openSUSE Leap 15.6 (noarch)
* nodejs22-docs-22.22.0-150600.13.12.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* npm22-22.22.0-150600.13.12.1
* nodejs22-debugsource-22.22.0-150600.13.12.1
* nodejs22-devel-22.22.0-150600.13.12.1
* nodejs22-22.22.0-150600.13.12.1
* nodejs22-debuginfo-22.22.0-150600.13.12.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* nodejs22-docs-22.22.0-150600.13.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* npm22-22.22.0-150600.13.12.1
* nodejs22-debugsource-22.22.0-150600.13.12.1
* nodejs22-devel-22.22.0-150600.13.12.1
* nodejs22-22.22.0-150600.13.12.1
* nodejs22-debuginfo-22.22.0-150600.13.12.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* nodejs22-docs-22.22.0-150600.13.12.1

## References:

* https://www.suse.com/security/cve/CVE-2025-55130.html
* https://www.suse.com/security/cve/CVE-2025-55131.html
* https://www.suse.com/security/cve/CVE-2025-55132.html
* https://www.suse.com/security/cve/CVE-2025-59465.html
* https://www.suse.com/security/cve/CVE-2025-59466.html
* https://www.suse.com/security/cve/CVE-2026-21637.html
* https://www.suse.com/security/cve/CVE-2026-22036.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256569
* https://bugzilla.suse.com/show_bug.cgi?id=1256570
* https://bugzilla.suse.com/show_bug.cgi?id=1256571
* https://bugzilla.suse.com/show_bug.cgi?id=1256573
* https://bugzilla.suse.com/show_bug.cgi?id=1256574
* https://bugzilla.suse.com/show_bug.cgi?id=1256576
* https://bugzilla.suse.com/show_bug.cgi?id=1256848