SUSE 5494 Published by

Security updates have been released for several SUSE Linux packages, including the Linux Kernel and proftpd. The updates address various vulnerabilities and are categorized as important (kernel, proftpd), moderate (pam, ffmpeg-4), or low (cmake3):

SUSE-SU-2025:02969-1: important: Security update for the Linux Kernel
openSUSE-SU-2025:0315-1: important: Security update for proftpd
SUSE-SU-2025:02970-1: moderate: Security update for pam
SUSE-SU-2025:02975-1: low: Security update for cmake3
SUSE-SU-2025:02972-1: moderate: Security update for ffmpeg-4




SUSE-SU-2025:02969-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:02969-1
Release Date: 2025-08-25T06:22:25Z
Rating: important
References:

* bsc#1139073
* bsc#1204142
* bsc#1219338
* bsc#1225707
* bsc#1230216
* bsc#1233300
* bsc#1235613
* bsc#1235837
* bsc#1236333
* bsc#1236897
* bsc#1238896
* bsc#1239061
* bsc#1239470
* bsc#1240323
* bsc#1240885
* bsc#1240966
* bsc#1241166
* bsc#1241345
* bsc#1241537
* bsc#1242086
* bsc#1242414
* bsc#1242837
* bsc#1242960
* bsc#1242965
* bsc#1242993
* bsc#1243068
* bsc#1243100
* bsc#1243479
* bsc#1243669
* bsc#1243806
* bsc#1244309
* bsc#1244337
* bsc#1244457
* bsc#1244735
* bsc#1244749
* bsc#1244750
* bsc#1244792
* bsc#1244801
* bsc#1245151
* bsc#1245201
* bsc#1245202
* bsc#1245216
* bsc#1245260
* bsc#1245431
* bsc#1245440
* bsc#1245457
* bsc#1245498
* bsc#1245499
* bsc#1245504
* bsc#1245506
* bsc#1245508
* bsc#1245510
* bsc#1245540
* bsc#1245598
* bsc#1245599
* bsc#1245646
* bsc#1245647
* bsc#1245649
* bsc#1245650
* bsc#1245654
* bsc#1245658
* bsc#1245660
* bsc#1245665
* bsc#1245666
* bsc#1245668
* bsc#1245669
* bsc#1245670
* bsc#1245671
* bsc#1245675
* bsc#1245676
* bsc#1245677
* bsc#1245679
* bsc#1245682
* bsc#1245683
* bsc#1245684
* bsc#1245688
* bsc#1245689
* bsc#1245690
* bsc#1245691
* bsc#1245695
* bsc#1245705
* bsc#1245708
* bsc#1245711
* bsc#1245713
* bsc#1245714
* bsc#1245719
* bsc#1245723
* bsc#1245729
* bsc#1245730
* bsc#1245731
* bsc#1245735
* bsc#1245737
* bsc#1245744
* bsc#1245745
* bsc#1245746
* bsc#1245747
* bsc#1245748
* bsc#1245749
* bsc#1245750
* bsc#1245751
* bsc#1245752
* bsc#1245757
* bsc#1245758
* bsc#1245765
* bsc#1245768
* bsc#1245769
* bsc#1245777
* bsc#1245781
* bsc#1245789
* bsc#1245937
* bsc#1245945
* bsc#1245951
* bsc#1245952
* bsc#1245954
* bsc#1245957
* bsc#1245966
* bsc#1245970
* bsc#1245976
* bsc#1245980
* bsc#1245983
* bsc#1245986
* bsc#1246000
* bsc#1246002
* bsc#1246006
* bsc#1246008
* bsc#1246020
* bsc#1246023
* bsc#1246029
* bsc#1246031
* bsc#1246037
* bsc#1246041
* bsc#1246042
* bsc#1246044
* bsc#1246045
* bsc#1246047
* bsc#1246049
* bsc#1246050
* bsc#1246055
* bsc#1246073
* bsc#1246093
* bsc#1246098
* bsc#1246109
* bsc#1246122
* bsc#1246125
* bsc#1246171
* bsc#1246173
* bsc#1246178
* bsc#1246182
* bsc#1246183
* bsc#1246186
* bsc#1246195
* bsc#1246203
* bsc#1246212
* bsc#1246220
* bsc#1246236
* bsc#1246240
* bsc#1246243
* bsc#1246246
* bsc#1246249
* bsc#1246250
* bsc#1246253
* bsc#1246258
* bsc#1246262
* bsc#1246264
* bsc#1246266
* bsc#1246268
* bsc#1246273
* bsc#1246283
* bsc#1246287
* bsc#1246292
* bsc#1246293
* bsc#1246295
* bsc#1246334
* bsc#1246337
* bsc#1246342
* bsc#1246349
* bsc#1246354
* bsc#1246358
* bsc#1246361
* bsc#1246364
* bsc#1246370
* bsc#1246375
* bsc#1246384
* bsc#1246386
* bsc#1246387
* bsc#1246438
* bsc#1246453
* bsc#1246473
* bsc#1246490
* bsc#1246506
* bsc#1246547
* bsc#1246777
* bsc#1246781
* bsc#1246870
* bsc#1246879
* bsc#1246911
* bsc#1247018
* bsc#1247023
* bsc#1247028
* bsc#1247031
* bsc#1247033
* bsc#1247035
* bsc#1247061
* bsc#1247089
* bsc#1247091
* bsc#1247097
* bsc#1247098
* bsc#1247101
* bsc#1247103
* bsc#1247104
* bsc#1247113
* bsc#1247118
* bsc#1247123
* bsc#1247125
* bsc#1247128
* bsc#1247132
* bsc#1247138
* bsc#1247141
* bsc#1247143
* bsc#1247145
* bsc#1247146
* bsc#1247147
* bsc#1247149
* bsc#1247150
* bsc#1247151
* bsc#1247153
* bsc#1247154
* bsc#1247156
* bsc#1247160
* bsc#1247164
* bsc#1247169
* bsc#1247170
* bsc#1247171
* bsc#1247172
* bsc#1247174
* bsc#1247176
* bsc#1247177
* bsc#1247178
* bsc#1247181
* bsc#1247209
* bsc#1247210
* bsc#1247227
* bsc#1247233
* bsc#1247236
* bsc#1247238
* bsc#1247241
* bsc#1247251
* bsc#1247252
* bsc#1247253
* bsc#1247255
* bsc#1247271
* bsc#1247273
* bsc#1247274
* bsc#1247276
* bsc#1247277
* bsc#1247278
* bsc#1247279
* bsc#1247284
* bsc#1247285
* bsc#1247288
* bsc#1247289
* bsc#1247293
* bsc#1247311
* bsc#1247314
* bsc#1247317
* bsc#1247347
* bsc#1247348
* bsc#1247349
* bsc#1247374
* bsc#1247437
* bsc#1247450

Cross-References:

* CVE-2019-11135
* CVE-2024-36028
* CVE-2024-36348
* CVE-2024-36349
* CVE-2024-36350
* CVE-2024-36357
* CVE-2024-44963
* CVE-2024-49861
* CVE-2024-56742
* CVE-2024-57947
* CVE-2025-21839
* CVE-2025-21854
* CVE-2025-21872
* CVE-2025-22090
* CVE-2025-23163
* CVE-2025-37798
* CVE-2025-37856
* CVE-2025-37864
* CVE-2025-37885
* CVE-2025-37920
* CVE-2025-37984
* CVE-2025-38034
* CVE-2025-38035
* CVE-2025-38051
* CVE-2025-38052
* CVE-2025-38058
* CVE-2025-38061
* CVE-2025-38062
* CVE-2025-38063
* CVE-2025-38064
* CVE-2025-38074
* CVE-2025-38084
* CVE-2025-38085
* CVE-2025-38087
* CVE-2025-38088
* CVE-2025-38089
* CVE-2025-38090
* CVE-2025-38094
* CVE-2025-38095
* CVE-2025-38097
* CVE-2025-38098
* CVE-2025-38099
* CVE-2025-38100
* CVE-2025-38102
* CVE-2025-38105
* CVE-2025-38107
* CVE-2025-38108
* CVE-2025-38109
* CVE-2025-38110
* CVE-2025-38111
* CVE-2025-38112
* CVE-2025-38113
* CVE-2025-38115
* CVE-2025-38117
* CVE-2025-38118
* CVE-2025-38120
* CVE-2025-38122
* CVE-2025-38123
* CVE-2025-38124
* CVE-2025-38126
* CVE-2025-38127
* CVE-2025-38129
* CVE-2025-38131
* CVE-2025-38132
* CVE-2025-38135
* CVE-2025-38136
* CVE-2025-38138
* CVE-2025-38142
* CVE-2025-38143
* CVE-2025-38145
* CVE-2025-38147
* CVE-2025-38148
* CVE-2025-38149
* CVE-2025-38151
* CVE-2025-38153
* CVE-2025-38154
* CVE-2025-38155
* CVE-2025-38157
* CVE-2025-38158
* CVE-2025-38159
* CVE-2025-38161
* CVE-2025-38162
* CVE-2025-38165
* CVE-2025-38166
* CVE-2025-38173
* CVE-2025-38174
* CVE-2025-38177
* CVE-2025-38180
* CVE-2025-38181
* CVE-2025-38182
* CVE-2025-38183
* CVE-2025-38187
* CVE-2025-38188
* CVE-2025-38192
* CVE-2025-38193
* CVE-2025-38194
* CVE-2025-38197
* CVE-2025-38198
* CVE-2025-38200
* CVE-2025-38202
* CVE-2025-38203
* CVE-2025-38204
* CVE-2025-38206
* CVE-2025-38210
* CVE-2025-38211
* CVE-2025-38212
* CVE-2025-38213
* CVE-2025-38214
* CVE-2025-38215
* CVE-2025-38217
* CVE-2025-38220
* CVE-2025-38222
* CVE-2025-38225
* CVE-2025-38226
* CVE-2025-38227
* CVE-2025-38229
* CVE-2025-38231
* CVE-2025-38236
* CVE-2025-38239
* CVE-2025-38244
* CVE-2025-38246
* CVE-2025-38248
* CVE-2025-38249
* CVE-2025-38250
* CVE-2025-38257
* CVE-2025-38259
* CVE-2025-38264
* CVE-2025-38272
* CVE-2025-38273
* CVE-2025-38275
* CVE-2025-38277
* CVE-2025-38279
* CVE-2025-38283
* CVE-2025-38286
* CVE-2025-38289
* CVE-2025-38290
* CVE-2025-38292
* CVE-2025-38293
* CVE-2025-38300
* CVE-2025-38303
* CVE-2025-38304
* CVE-2025-38305
* CVE-2025-38307
* CVE-2025-38310
* CVE-2025-38312
* CVE-2025-38313
* CVE-2025-38319
* CVE-2025-38323
* CVE-2025-38326
* CVE-2025-38328
* CVE-2025-38332
* CVE-2025-38334
* CVE-2025-38335
* CVE-2025-38336
* CVE-2025-38337
* CVE-2025-38338
* CVE-2025-38342
* CVE-2025-38343
* CVE-2025-38344
* CVE-2025-38345
* CVE-2025-38348
* CVE-2025-38349
* CVE-2025-38350
* CVE-2025-38352
* CVE-2025-38354
* CVE-2025-38362
* CVE-2025-38363
* CVE-2025-38364
* CVE-2025-38365
* CVE-2025-38369
* CVE-2025-38371
* CVE-2025-38373
* CVE-2025-38375
* CVE-2025-38376
* CVE-2025-38377
* CVE-2025-38380
* CVE-2025-38382
* CVE-2025-38384
* CVE-2025-38385
* CVE-2025-38386
* CVE-2025-38387
* CVE-2025-38389
* CVE-2025-38391
* CVE-2025-38392
* CVE-2025-38393
* CVE-2025-38395
* CVE-2025-38396
* CVE-2025-38399
* CVE-2025-38400
* CVE-2025-38401
* CVE-2025-38403
* CVE-2025-38404
* CVE-2025-38406
* CVE-2025-38409
* CVE-2025-38410
* CVE-2025-38412
* CVE-2025-38414
* CVE-2025-38415
* CVE-2025-38416
* CVE-2025-38420
* CVE-2025-38424
* CVE-2025-38425
* CVE-2025-38426
* CVE-2025-38428
* CVE-2025-38429
* CVE-2025-38430
* CVE-2025-38436
* CVE-2025-38443
* CVE-2025-38448
* CVE-2025-38449
* CVE-2025-38455
* CVE-2025-38457
* CVE-2025-38460
* CVE-2025-38461
* CVE-2025-38462
* CVE-2025-38463
* CVE-2025-38465
* CVE-2025-38467
* CVE-2025-38468
* CVE-2025-38470
* CVE-2025-38471
* CVE-2025-38473
* CVE-2025-38474
* CVE-2025-38476
* CVE-2025-38477
* CVE-2025-38478
* CVE-2025-38480
* CVE-2025-38481
* CVE-2025-38482
* CVE-2025-38483
* CVE-2025-38485
* CVE-2025-38487
* CVE-2025-38489
* CVE-2025-38494
* CVE-2025-38495
* CVE-2025-38496
* CVE-2025-38497
* CVE-2025-38498

CVSS scores:

* CVE-2019-11135 ( SUSE ): 6.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2019-11135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36348 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-36349 ( NVD ): 3.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
* CVE-2024-36350 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-36357 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-44963 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2024-44963 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-44963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49861 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49861 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49861 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-56742 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56742 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56742 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57947 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57947 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21872 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23163 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37856 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37856 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37920 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37920 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-37984 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37984 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38034 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38034 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38035 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38035 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38058 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38058 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38061 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38061 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38062 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38062 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38063 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38063 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38064 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38064 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38074 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38084 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38085 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38087 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38088 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38088 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38089 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38089 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38090 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38090 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38094 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38097 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38097 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38098 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38098 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38099 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38099 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38100 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38100 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38102 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38102 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38105 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38105 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38107 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38107 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38108 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38108 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38109 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38109 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38110 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38110 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38111 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38111 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38112 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38113 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38115 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38117 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38117 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38118 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38120 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-38120 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-38122 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38123 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38124 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38126 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38126 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38127 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38129 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38129 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38131 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38131 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38132 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38132 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38135 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38136 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38142 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38142 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38143 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38145 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38147 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38148 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38149 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38149 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38153 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38153 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38154 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38154 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38155 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38157 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38157 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38158 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38158 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38159 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38159 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38161 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38161 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38162 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38162 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38165 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38166 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38166 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38173 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38173 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38174 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38174 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38180 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38181 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38181 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38182 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38183 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38183 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38187 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38187 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38192 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38192 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38193 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38193 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38194 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38197 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38197 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38200 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38200 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38203 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38203 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38204 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38204 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38206 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38206 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38211 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38211 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38212 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38212 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38213 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38213 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38214 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38215 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38217 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38217 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38220 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38220 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38222 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38222 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2025-38225 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38226 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38226 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38227 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38227 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38229 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38229 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-38231 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38231 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38236 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38236 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38239 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38239 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38244 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38244 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38246 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38248 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38249 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38249 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38250 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38250 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38257 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38259 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38272 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38273 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38273 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38275 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38277 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38277 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38279 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38283 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38286 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38286 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38289 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38289 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38290 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38290 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38292 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38292 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38293 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38293 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38300 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38300 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38303 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38303 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38307 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38310 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38310 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38312 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38323 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38326 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38328 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38332 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38334 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38334 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38335 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38336 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38337 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38338 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38338 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38342 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38343 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-38344 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38345 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38345 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38348 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38349 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38349 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38350 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38350 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-38352 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38352 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38354 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38354 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38362 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38363 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38363 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38364 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38365 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38365 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-38369 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38371 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38373 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38373 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38375 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38375 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38376 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38377 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38377 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38380 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38380 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38382 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38382 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38384 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38384 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38385 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38385 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38386 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38387 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38387 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38389 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38391 ( SUSE ): 5.2
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38391 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38392 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38393 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38393 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38395 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38395 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38396 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38396 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38399 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38400 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38400 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38401 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38401 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38403 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38403 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38404 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38404 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38406 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38409 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38409 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38410 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38412 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38414 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38415 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38415 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38416 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38416 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38420 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38420 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38424 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38425 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38425 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38426 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38428 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38428 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38429 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38429 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38430 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38436 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38443 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38443 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38448 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38448 ( SUSE ): 4.0 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38449 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38449 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38455 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38455 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38457 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38457 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38460 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38461 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38461 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38462 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38462 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38463 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38463 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-38465 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38465 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38467 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38467 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38468 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38468 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38470 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38471 ( SUSE ): 8.4
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38471 ( SUSE ): 7.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H
* CVE-2025-38473 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38473 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38474 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38476 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38477 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38477 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38478 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38478 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38480 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38480 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38481 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38481 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-38482 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38482 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38483 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38483 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-38485 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38485 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38487 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38489 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38489 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38494 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38494 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38495 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38495 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38496 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38496 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38497 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38497 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-38498 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38498 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 238 vulnerabilities and has 33 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2024-36028: mm/hugetlb: fix DEBUG_LOCKS_WARN_ON(1) when
dissolve_free_hugetlb_folio() (bsc#1225707).
* CVE-2024-36348, CVE-2024-36349, CVE-2024-36350, CVE-2024-36357: x86/process:
Move the buffer clearing before MONITOR (bsc#1238896).
* CVE-2024-44963: btrfs: do not BUG_ON() when freeing tree block after error
(bsc#1230216).
* CVE-2024-49861: net: clear the dst when changing skb protocol (bsc#1245954).
* CVE-2024-56742: vfio/mlx5: Fix an unwind issue in
mlx5vf_add_migration_pages() (bsc#1235613).
* CVE-2025-21839: KVM: x86: Load DR6 with guest value only before entering
.vcpu_run() loop (bsc#1239061).
* CVE-2025-21854: selftest/bpf: Add vsock test for sockmap rejecting
unconnected (bsc#1239470).
* CVE-2025-21872: efi/mokvar-table: Avoid repeated map/unmap of the same page
(bsc#1240323).
* CVE-2025-22090: mm: (un)track_pfn_copy() fix + doc improvements
(bsc#1241537).
* CVE-2025-23163: net: vlan: do not propagate flags on open (bsc#1242837).
* CVE-2025-37856: btrfs: harden block_group::bg_list against list_del() races
(bsc#1243068).
* CVE-2025-37864: net: dsa: clean up FDB, MDB, VLAN entries on unbind
(bsc#1242965).
* CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't
postable (bsc#1242960).
* CVE-2025-37920: kABI workaround for xsk: Fix race condition in AF_XDP
generic RX path (bsc#1243479).
* CVE-2025-37984: crypto: ecdsa - Harden against integer overflows in
DIV_ROUND_UP() (bsc#1243669).
* CVE-2025-38034: btrfs: correct the order of prelim_ref arguments in
btrfs__prelim_ref (bsc#1244792).
* CVE-2025-38035: nvmet-tcp: do not restore null sk_state_change
(bsc#1244801).
* CVE-2025-38051: smb: client: Fix use-after-free in cifs_fill_dirent
(bsc#1244750).
* CVE-2025-38058: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be
under mount_lock (bsc#1245151).
* CVE-2025-38061: net: pktgen: fix access outside of user given buffer in
pktgen_thread_write() (bsc#1245440).
* CVE-2025-38062: kABI: restore layout of struct msi_desc (bsc#1245216).
* CVE-2025-38063: dm: fix unconditional IO throttle caused by REQ_PREFLUSH
(bsc#1245202).
* CVE-2025-38064: virtio: break and reset virtio devices on device_shutdown()
(bsc#1245201).
* CVE-2025-38074: vhost-scsi: protect vq->log_used with vq->mutex
(bsc#1244735).
* CVE-2025-38094: net: cadence: macb: Fix a possible deadlock in macb_halt_tx
(bsc#1245649).
* CVE-2025-38097: kabi: restore encap_sk in struct xfrm_state (bsc#1245660).
* CVE-2025-38098: drm/amd/display: Do not treat wb connector as physical in
(bsc#1245654).
* CVE-2025-38099: Bluetooth: btusb: Fix regression in the initialization of
fake Bluetooth controllers (bsc#1245671).
* CVE-2025-38100: x86/iopl: Cure TIF_IO_BITMAP inconsistencies (bsc#1245650).
* CVE-2025-38105: ALSA: usb-audio: Kill timer properly at removal
(bsc#1245682).
* CVE-2025-38115: net_sched: sch_sfq: fix a potential crash on gso_skb
handling (bsc#1245689).
* CVE-2025-38117: hci_dev centralize extra lock (bsc#1245695).
* CVE-2025-38126: net: stmmac: make sure that ptp_rate is not 0 before
configuring timestamping (bsc#1245708).
* CVE-2025-38131: coresight: prevent deactivate active config while enabling
the config (bsc#1245677).
* CVE-2025-38132: coresight: holding cscfg_csdev_lock while removing cscfg
from csdev (bsc#1245679).
* CVE-2025-38147: calipso: unlock rcu before returning -EAFNOSUPPORT
(bsc#1245768).
* CVE-2025-38158: hisi_acc_vfio_pci: fix XQE dma address error (bsc#1245750).
* CVE-2025-38162: netfilter: nft_set_pipapo: prevent overflow in lookup table
allocation (bsc#1245752).
* CVE-2025-38166: bpf: fix ktls panic with sockmap (bsc#1245758).
* CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
* CVE-2025-38182: ublk: santizize the arguments from userspace when adding a
device (bsc#1245937).
* CVE-2025-38183: net: lan743x: fix potential out-of-bounds write in
lan743x_ptp_io_event_clock_get() (bsc#1246006).
* CVE-2025-38187: drm/nouveau: fix a use-after-free in r535_gsp_rpc_push()
(bsc#1245951).
* CVE-2025-38188: drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE (bsc#1246098).
* CVE-2025-38200: i40e: fix MMIO write access to an invalid page in
i40e_clear_hw (bsc#1246045).
* CVE-2025-38202: bpf: Check rcu_read_lock_trace_held() in
bpf_map_lookup_percpu_elem() (bsc#1245980).
* CVE-2025-38203: jfs: Fix null-ptr-deref in jfs_ioc_trim (bsc#1246044).
* CVE-2025-38204: jfs: fix array-index-out-of-bounds read in
add_missing_indices (bsc#1245983).
* CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
* CVE-2025-38210: configfs-tsm-report: Fix NULL dereference of tsm_ops
(bsc#1246020).
* CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
* CVE-2025-38220: ext4: only dirty folios when data journaling regular files
(bsc#1245966).
* CVE-2025-38222: ext4: inline: fix len overflow in ext4_prepare_inline_data
(bsc#1245976).
* CVE-2025-38236: af_unix: Disable MSG_OOB for unprivileged users
(bsc#1246093).
* CVE-2025-38239: scsi: megaraid_sas: Fix invalid node index (bsc#1246178).
* CVE-2025-38244: smb: client: fix potential deadlock when reconnecting
channels (bsc#1246183).
* CVE-2025-38248: bridge: mcast: Fix use-after-free during router port
configuration (bsc#1246173).
* CVE-2025-38250: kABI workaround for bluetooth hci_dev changes (bsc#1246182).
* CVE-2025-38264: llist: add interface to check if a node is on a list
(bsc#1246387).
* CVE-2025-38272: net: dsa: b53: do not enable EEE on bcm63xx (bsc#1246268).
* CVE-2025-38279: selftests/bpf: Add tests with stack ptr register in
conditional jmp (bsc#1246264).
* CVE-2025-38283: hisi_acc_vfio_pci: bugfix live migration function without VF
device driver (bsc#1246273).
* CVE-2025-38303: Bluetooth: eir: Fix possible crashes on eir_create_adv_data
(bsc#1246354).
* CVE-2025-38310: seg6: Fix validation of nexthop addresses (bsc#1246361).
* CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
* CVE-2025-38334: x86/sgx: Prevent attempts to reclaim poisoned pages
(bsc#1246384).
* CVE-2025-38335: Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT
(bsc#1246250).
* CVE-2025-38337: jbd2: fix data-race and null-ptr-deref in
jbd2_journal_dirty_metadata() (bsc#1246253).
* CVE-2025-38349: eventpoll: do not decrement ep refcount while still holding
the ep mutex (bsc#1246777).
* CVE-2025-38350: net/sched: Always pass notifications when child class
becomes empty (bsc#1246781).
* CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers()
and posix_cpu_timer_del() (bsc#1246911).
* CVE-2025-38364: maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()
(bsc#1247091).
* CVE-2025-38365: btrfs: fix a race between renames and directory logging
(bsc#1247023).
* CVE-2025-38371: drm/v3d: Disable interrupts before resetting the GPU
(bsc#1247178).
* CVE-2025-38375: virtio-net: ensure the received length does not exceed
allocated size (bsc#1247177).
* CVE-2025-38382: btrfs: fix iteration of extrefs during log replay
(bsc#1247031).
* CVE-2025-38392: idpf: convert control queue mutex to a spinlock
(bsc#1247169).
* CVE-2025-38396: fs: export anon_inode_make_secure_inode() and fix secretmem
LSM bypass (bsc#1247156).
* CVE-2025-38399: scsi: target: Fix NULL pointer dereference in
core_scsi3_decode_spec_i_port() (bsc#1247097).
* CVE-2025-38403: vsock/vmci: Clear the vmci transport packet properly when
initializing it (bsc#1247141).
* CVE-2025-38414: wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for
WCN7850 (bsc#1247145).
* CVE-2025-38426: drm/amdgpu: Add basic validation for RAS header
(bsc#1247252).
* CVE-2025-38429: bus: mhi: ep: Update read pointer only after buffer is
written (bsc#1247253).
* CVE-2025-38455: KVM: SVM: Reject SEV{-ES} intra host migration if vCPU
creation is in-flight (bsc#1247101).
* CVE-2025-38457: net/sched: Abort __tc_modify_qdisc if parent class does not
exist (bsc#1247098).
* CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd()
(bsc#1247143).
* CVE-2025-38461: vsock: Fix transport_* TOCTOU (bsc#1247103).
* CVE-2025-38462: vsock: Fix transport_{g2h,h2g} TOCTOU (bsc#1247104).
* CVE-2025-38463: tcp: Correct signedness in skb remaining space calculation
(bsc#1247113).
* CVE-2025-38465: netlink: make sure we allow at least one dump skb
(bsc#1247118).
* CVE-2025-38470: kABI fix for net: vlan: fix VLAN 0 refcount imbalance of
toggling (bsc#1247288).
* CVE-2025-38471: tls: always refresh the queue when reading sock
(bsc#1247450).
* CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write
(bsc#1247347).
* CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours
mounts (bsc#1247374).

The following non-security bugs were fixed:

* Documentation: ACPI: Fix parent device references (git-fixes).
* Documentation: usb: gadget: Wrap remaining usage snippets in literal code
block (git-fixes).
* Fix dma_unmap_sg() nents value (git-fixes)
* Reapply "wifi: mac80211: Update skb's control block key in
ieee80211_tx_dequeue()" (git-fixes).
* Revert "ACPI: battery: negate current when discharging" (stable-fixes).
* Revert "cgroup_freezer: cgroup_freezing: Check if not frozen" (bsc#1219338).
* Revert "drm/i915/gem: Allow EXEC_CAPTURE on recoverable contexts on DG1"
(stable-fixes).
* Revert "mmc: sdhci: Disable SD card clock before changing parameters" (git-
fixes).
* Revert "usb: xhci: Implement xhci_handshake_check_state() helper" (git-
fixes).
* Revert "vgacon: Add check for vc_origin address range in vgacon_scroll()"
(stable-fixes).
* acpi: LPSS: Remove AudioDSP related ID (git-fixes).
* acpi: PRM: Reduce unnecessary printing to avoid user confusion
(bsc#1246122).
* acpi: processor: perflib: Fix initial _PPC limit application (git-fixes).
* acpica: Refuse to evaluate a method if arguments are missing (stable-fixes).
* af_packet: fix the SO_SNDTIMEO constraint not effective on tpacked_snd()
(git-fixes).
* af_unix: Add a prompt to CONFIG_AF_UNIX_OOB (bsc#1246093).
* alsa: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()
(git-fixes).
* alsa: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx (stable-
fixes).
* alsa: hda/realtek - Enable mute LED on HP Pavilion Laptop 15-eg100 (stable-
fixes).
* alsa: hda/realtek: Add quirk for ASUS ROG Strix G712LWS (stable-fixes).
* alsa: hda/tegra: Add Tegra264 support (stable-fixes).
* alsa: hda: Add missing NVIDIA HDA codec IDs (stable-fixes).
* alsa: hda: Add new pci id for AMD GPU display HD audio controller (stable-
fixes).
* alsa: hda: Ignore unsol events for cards being shut down (stable-fixes).
* alsa: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe() (git-
fixes).
* alsa: sb: Do not allow changing the DMA mode during operations (stable-
fixes).
* alsa: sb: Force to disable DMAs once when DMA mode is changed (stable-
fixes).
* amd/amdkfd: fix a kfd_process ref leak (stable-fixes).
* aoe: clean device rq_list in aoedev_downdev() (git-fixes).
* apple-mfi-fastcharge: protect first device name (git-fixes).
* asoc: amd: yc: Add DMI quirk for Lenovo IdeaPad Slim 5 15 (stable-fixes).
* asoc: amd: yc: Add quirk for MSI Bravo 17 D7VF internal mic (stable-fixes).
* asoc: amd: yc: add quirk for Acer Nitro ANV15-41 internal mic (stable-
fixes).
* asoc: amd: yc: update quirk data for HP Victus (stable-fixes).
* asoc: codec: wcd9335: Convert to GPIO descriptors (stable-fixes).
* asoc: codecs: wcd9335: Fix missing free of regulator supplies (git-fixes).
* asoc: codecs: wcd9335: Handle nicer probe deferral and simplify with
dev_err_probe() (stable-fixes).
* asoc: cs35l56: probe() should fail if the device ID is not recognized (git-
fixes).
* asoc: fsl_asrc: use internal measured ratio for non-ideal ratio mode (git-
fixes).
* asoc: fsl_xcvr: get channel status data when PHY is not exists (git-fixes).
* asoc: ops: dynamically allocate struct snd_ctl_elem_value (git-fixes).
* asoc: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask() (git-
fixes).
* ata: pata_cs5536: fix build on 32-bit UML (stable-fixes).
* audit,module: restore audit logging in load failure case (git-fixes).
* bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb() (git-fixes).
* bluetooth: L2CAP: Fix L2CAP MTU negotiation (stable-fixes).
* bluetooth: L2CAP: Fix attempting to adjust outgoing MTU (git-fixes).
* bluetooth: MGMT: Fix not generating command complete for MGMT_OP_DISCONNECT
(git-fixes).
* bluetooth: MGMT: mesh_send: check instances prior disabling advertising
(git-fixes).
* bluetooth: MGMT: set_mesh: update LE scan interval and window (git-fixes).
* bluetooth: Prevent unintended pause by checking if advertising is active
(git-fixes).
* bluetooth: SMP: Fix using HCI_ERROR_REMOTE_USER_TERM on timeout (git-fixes).
* bluetooth: SMP: If an unallowed command is received consider it a failure
(git-fixes).
* bluetooth: btusb: QCA: Fix downloading wrong NVM for WCN6855 GF variant
without board ID (git-fixes).
* bluetooth: hci_conn: Fix sending BT_HCI_CMD_LE_CREATE_CONN_CANCEL (git-
fixes).
* bluetooth: hci_event: Fix not marking Broadcast Sink BIS as connected (git-
fixes).
* bluetooth: hci_event: Mask data status from LE ext adv reports (git-fixes).
* bluetooth: hci_sync: Attempt to dequeue connection attempt (git-fixes).
* bluetooth: hci_sync: Fix UAF on create_le_conn_complete (git-fixes).
* bluetooth: hci_sync: Fix handling of HCI_OP_CREATE_CONN_CANCEL (git-fixes).
* bluetooth: hci_sync: Fix not disabling advertising instance (git-fixes).
* bluetooth: hci_sync: fix connectable extended advertising when using static
random address (git-fixes).
* bluetooth: hci_sync: revert some mesh modifications (git-fixes).
* bpf, sockmap: Fix sk_msg_reset_curr (git-fixes).
* bpf/lpm_trie: Inline longest_prefix_match for fastpath (git-fixes).
* bpf/selftests: Check errno when percpu map value size exceeds (git-fixes).
* bpf: Add a possibly-zero-sized read test (git-fixes).
* bpf: Avoid **hidden** attribute in static object (git-fixes).
* bpf: Check percpu map value size first (git-fixes).
* bpf: Disable some `attribute ignored' warnings in GCC (git-fixes).
* bpf: Fix memory leak in bpf_core_apply (git-fixes).
* bpf: Fix potential integer overflow in resolve_btfids (git-fixes).
* bpf: Harden __bpf_kfunc tag against linker kfunc removal (git-fixes).
* bpf: Make the pointer returned by iter next method valid (git-fixes).
* bpf: Simplify checking size of helper accesses (git-fixes).
* bpf: fix order of args in call to bpf_map_kvcalloc (git-fixes).
* bpf: sockmap, updating the sg structure should also update curr (git-fixes).
* bpftool: Fix missing pids during link show (git-fixes).
* bpftool: Fix undefined behavior caused by shifting into the sign bit (git-
fixes).
* bpftool: Mount bpffs on provided dir instead of parent dir (git-fixes).
* bpftool: Remove unnecessary source files from bootstrap version (git-fixes).
* bpftool: Un-const bpf_func_info to fix it for llvm 17 and newer (git-fixes).
* btrfs: do not ignore inode missing when replaying log tree (git-fixes).
* btrfs: do not silently ignore unexpected extent type when replaying log
(git-fixes).
* btrfs: do not skip remaining extrefs if dir not found during log replay
(git-fixes).
* btrfs: explicitly ref count block_group on new_bgs list (bsc#1243068)
* btrfs: fix assertion when building free space tree (git-fixes).
* btrfs: fix inode lookup error handling during log replay (git-fixes).
* btrfs: fix invalid inode pointer dereferences during log replay (git-fixes).
* btrfs: fix log tree replay failure due to file with 0 links and extents
(git-fixes).
* btrfs: fix missing error handling when searching for inode refs during log
replay (git-fixes).
* btrfs: fix non-empty delayed iputs list on unmount due to async workers
(git-fixes).
* btrfs: fix ssd_spread overallocation (git-fixes).
* btrfs: make btrfs_discard_workfn() block_group ref explicit (bsc#1243068)
* btrfs: propagate last_unlink_trans earlier when doing a rmdir (git-fixes).
* btrfs: rename err to ret in btrfs_rmdir() (git-fixes).
* btrfs: return a btrfs_inode from btrfs_iget_logging() (git-fixes).
* btrfs: return a btrfs_inode from read_one_inode() (git-fixes).
* btrfs: tests: fix chunk map leak after failure to add it to the tree (git-
fixes).
* btrfs: update superblock's device bytes_used when dropping chunk (git-
fixes).
* btrfs: use NOFS context when getting inodes during logging and log replay
(git-fixes).
* btrfs: use btrfs_record_snapshot_destroy() during rmdir (git-fixes).
* bus: fsl-mc: Fix potential double device reference in fsl_mc_get_endpoint()
(git-fixes).
* bus: mhi: host: Detect events pointing to unexpected TREs (git-fixes).
* can: dev: can_restart(): move debug message and stats after successful
restart (stable-fixes).
* can: dev: can_restart(): reverse logic to remove need for goto (stable-
fixes).
* can: kvaser_pciefd: Store device channel index (git-fixes).
* can: kvaser_usb: Assign netdev.dev_port based on device channel index (git-
fixes).
* can: m_can: m_can_handle_lost_msg(): downgrade msg lost in rx message to
debug level (git-fixes).
* can: netlink: can_changelink(): fix NULL pointer deref of struct
can_priv::do_set_mode (git-fixes).
* can: peak_usb: fix USB FD devices potential malfunction (git-fixes).
* cdc-acm: fix race between initial clearing halt and open (git-fixes).
* cgroup,freezer: fix incomplete freezing when attaching tasks (bsc#1245789).
* cgroup/cpuset: Extend kthread_is_per_cpu() check to all PF_NO_SETAFFINITY
tasks (bsc#1241166).
* cifs: reconnect helper should set reconnect for the right channel (git-
fixes).
* clk: clk-axi-clkgen: fix fpfd_max frequency for zynq (git-fixes).
* clk: davinci: Add NULL check in davinci_lpsc_clk_register() (git-fixes).
* clk: sunxi-ng: v3s: Fix de clock definition (git-fixes).
* clk: xilinx: vcu: unregister pll_post only if registered correctly (git-
fixes).
* clocksource: Scale the watchdog read retries automatically (bsc#1241345
bsc#1244457).
* clocksource: Set cs_watchdog_read() checks based on .uncertainty_margin
(bsc#1241345 bsc#1244457).
* comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large (git-fixes).
* comedi: Fix initialization of data for instructions that write to subdevice
(git-fixes).
* comedi: Fix some signed shift left operations (git-fixes).
* comedi: Fix use of uninitialized data in insn_rw_emulate_bits() (git-fixes).
* comedi: aio_iiro_16: Fix bit shift out of bounds (git-fixes).
* comedi: das16m1: Fix bit shift out of bounds (git-fixes).
* comedi: das6402: Fix bit shift out of bounds (git-fixes).
* comedi: pcl812: Fix bit shift out of bounds (git-fixes).
* compiler_types.h: Define **retain for __attribute** (( **retain** )) (git-
fixes).
* crypto: arm/aes-neonbs - work around gcc-15 warning (git-fixes).
* crypto: ccp - Fix crash when rebind ccp device for ccp.ko (git-fixes).
* crypto: ccp - Fix locking on alloc failure handling (git-fixes).
* crypto: img-hash - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: inside-secure - Fix `dma_unmap_sg()` nents value (git-fixes).
* crypto: keembay - Fix dma_unmap_sg() nents value (git-fixes).
* crypto: marvell/cesa - Fix engine load inaccuracy (git-fixes).
* crypto: qat - allow enabling VFs in the absence of IOMMU (git-fixes).
* crypto: qat - disable ZUC-256 capability for QAT GEN5 (git-fixes).
* crypto: qat - fix DMA direction for compression on GEN2 devices (git-fixes).
* crypto: qat - fix seq_file position update in adf_ring_next() (git-fixes).
* crypto: qat - fix state restore for banks with exceptions (git-fixes).
* crypto: qat - flush misc workqueue during device shutdown (git-fixes).
* crypto: qat - use unmanaged allocation for dc_data (git-fixes).
* crypto: sun8i-ce - fix nents passed to dma_unmap_sg() (git-fixes).
* dm-bufio: fix sched in atomic context (git-fixes).
* dm-flakey: error all IOs when num_features is absent (git-fixes).
* dm-flakey: make corrupting read bios work (git-fixes).
* dm-mirror: fix a tiny race condition (git-fixes).
* dm-raid: fix variable in journal device check (git-fixes).
* dm-verity: fix a memory leak if some arguments are specified multiple times
(git-fixes).
* dm: do not change md if dm_table_set_restrictions() fails (git-fixes).
* dm: free table mempools if not used in __bind (git-fixes).
* dm: restrict dm device size to 2^63-512 bytes (git-fixes).
* dma-buf: fix timeout handling in dma_resv_wait_timeout v2 (stable-fixes).
* dmaengine: dw-edma: Drop unused dchan2dev() and chan2dev() (git-fixes).
* dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver
before using (stable-fixes).
* dmaengine: mv_xor: Fix missing check after DMA map and missing unmap (git-
fixes).
* dmaengine: nbpfaxi: Add missing check after DMA map (git-fixes).
* dmaengine: nbpfaxi: Fix memory corruption in probe() (git-fixes).
* dmaengine: qcom: gpi: Drop unused gpi_write_reg_field() (git-fixes).
* dmaengine: xilinx_dma: Set dma_device directions (stable-fixes).
* docs/ABI: Fix sysfs-kernel-address_bits path (git-fixes).
* drm/amd/display: Do not overwrite dce60_clk_mgr (git-fixes).
* drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value (git-
fixes).
* drm/amdgpu/gfx8: reset compute ring wptr on the GPU on resume (git-fixes).
* drm/amdgpu: amdgpu_vram_mgr_new(): Clamp lpfn to total vram (stable-fixes).
* drm/amdkfd: Fix race in GWS queue scheduling (stable-fixes).
* drm/bridge: panel: move prepare_prev_first handling to
drm_panel_bridge_add_typed (git-fixes).
* drm/bridge: ti-sn65dsi86: Add HPD for DisplayPort connector type (git-
fixes).
* drm/bridge: ti-sn65dsi86: Remove extra semicolon in ti_sn_bridge_probe()
(git-fixes).
* drm/bridge: ti-sn65dsi86: make use of debugfs_init callback (stable-fixes).
* drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling (git-fixes).
* drm/exynos: fimd: Guard display clock control with runtime PM calls (git-
fixes).
* drm/framebuffer: Acquire internal references on GEM handles (git-fixes).
* drm/gem: Acquire references on GEM handles for framebuffers (stable-fixes).
* drm/gem: Fix race in drm_gem_handle_create_tail() (stable-fixes).
* drm/i915/gsc: mei interrupt top half should be in irq disabled context (git-
fixes).
* drm/i915/gt: Fix timeline left held on VMA alloc error (git-fixes).
* drm/i915/selftests: Change mock_request() to return error pointers (git-
fixes).
* drm/msm/dpu: Fill in min_prefill_lines for SC8180X (git-fixes).
* drm/msm: Fix a fence leak in submit error path (stable-fixes).
* drm/msm: Fix another leak in the submit error path (stable-fixes).
* drm/panfrost: Fix panfrost device variable name in devfreq (git-fixes).
* drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed (git-fixes).
* drm/sched: Increment job count before swapping tail spsc queue (git-fixes).
* drm/sched: Remove optimization that causes hang when killing dependent jobs
(git-fixes).
* drm/scheduler: signal scheduled fence when kill job (stable-fixes).
* drm/tegra: nvdec: Fix dma_alloc_coherent error check (git-fixes).
* drm/ttm: fix error handling in ttm_buffer_object_transfer (git-fixes).
* drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel (git-fixes).
* exfat: fdatasync flag should be same like generic_write_sync() (git-fixes).
* fbcon: Fix outdated registered_fb reference in comment (git-fixes).
* fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref (git-fixes).
* firewire: ohci: correct code comments about bus_reset tasklet (git-fixes).
* fs/jfs: consolidate sanity checking in dbMount (git-fixes).
* fs/orangefs: Allow 2 more characters in do_c_string() (git-fixes).
* gpio: mlxbf2: use platform_get_irq_optional() (git-fixes).
* gpio: pca953x: log an error when failing to get the reset GPIO (git-fixes).
* gpio: sim: include a missing header (git-fixes).
* gpio: vf610: add locking to gpio direction functions (git-fixes).
* gpio: virtio: Fix config space reading (git-fixes).
* gpiolib: Fix debug messaging in gpiod_find_and_request() (git-fixes).
* gpiolib: Handle no pin_ranges in gpiochip_generic_config() (git-fixes).
* gpiolib: acpi: Do not use GPIO chip fwnode in acpi_gpiochip_find()
(bsc#1233300).
* gpiolib: acpi: Fix failed in acpi_gpiochip_find() by adding parent node
match (bsc#1233300).
* gpiolib: cdev: Ignore reconfiguration without direction (git-fixes).
* gpiolib: of: Add polarity quirk for s5m8767 (stable-fixes).
* hfs: make splice write available again (git-fixes).
* hfsplus: make splice write available again (git-fixes).
* hfsplus: remove mutex_lock check in hfsplus_free_extents (git-fixes).
* hid: Add IGNORE quirk for SMARTLINKTECHNOLOGY (stable-fixes).
* hid: core: do not bypass hid_hw_raw_request (stable-fixes).
* hid: core: ensure __hid_request reserves the report ID as the first byte
(git-fixes).
* hid: core: ensure the allocated report buffer can contain the reserved
report ID (stable-fixes).
* hid: lenovo: Add support for ThinkPad X1 Tablet Thin Keyboard Gen2 (stable-
fixes).
* hid: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras (stable-
fixes).
* hv_netvsc: Use VF's tso_max_size value when data path is VF (bsc#1246203).
* hwmon: (corsair-cpro) Validate the size of the received input buffer (git-
fixes).
* hwmon: (gsc-hwmon) fix fan pwm setpoint show functions (git-fixes).
* hwmon: (pmbus/max34440) Fix support for max34451 (stable-fixes).
* hwrng: mtk - handle devm_pm_runtime_enable errors (git-fixes).
* i2c/designware: Fix an initialization issue (git-fixes).
* i2c: qup: jump out of the loop in case of timeout (git-fixes).
* i2c: stm32: fix the device used for the DMA map (git-fixes).
* i2c: tegra: Fix reset error handling with ACPI (git-fixes).
* i2c: virtio: Avoid hang by using interruptible completion wait (git-fixes).
* i3c: fix module_i3c_i2c_driver() with I3C=n (git-fixes).
* ib/mlx5: Fix potential deadlock in MR deregistration (git-fixes)
* iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush (git-
fixes).
* iio: adc: ad7949: use spi_is_bpw_supported() (git-fixes).
* iio: adc: ad_sigma_delta: Fix use of uninitialized status_pos (stable-
fixes).
* iio: adc: ad_sigma_delta: change to buffer predisable (git-fixes).
* iio: adc: max1363: Fix MAX1363_4X_CHANS/MAX1363_8X_CHANS[] (stable-fixes).
* iio: adc: max1363: Reorder mode_list[] entries (stable-fixes).
* iio: adc: stm32-adc: Fix race in installing chained IRQ handler (git-fixes).
* iio: imu: bno055: fix OOB access of hw_xlate array (git-fixes).
* iio: pressure: zpa2326: Use aligned_s64 for the timestamp (stable-fixes).
* input: iqs7222 - explicitly define number of external channels (git-fixes).
* input: xpad - adjust error handling for disconnect (git-fixes).
* input: xpad - set correct controller type for Acer NGR200 (git-fixes).
* input: xpad - support Acer NGR 200 Controller (stable-fixes).
* iommu/amd: Fix geometry.aperture_end for V2 tables (git-fixes).
* iommu/amd: Set the pgsize_bitmap correctly (git-fixes).
* iommu/arm-smmu-qcom: Add SM6115 MDSS compatible (git-fixes).
* iommu/vt-d: Fix possible circular locking dependency (git-fixes).
* iommu/vt-d: Fix system hang on reboot -f (git-fixes).
* ipv6: fix possible infinite loop in fib6_info_uses_dev() (git-fixes).
* ipv6: mcast: Delay put pmc->idev in mld_del_delrec() (git-fixes).
* ipv6: prevent infinite loop in rt6_nlmsg_size() (git-fixes).
* ipv6: reject malicious packets in ipv6_gso_segment() (git-fixes).
* iwlwifi: Add missing check for alloc_ordered_workqueue (git-fixes).
* jfs: fix metapage reference count leak in dbAllocCtl (git-fixes).
* kABI workaround for struct drm_framebuffer changes (git-fixes).
* kABI: Fix the module::name type in audit_context (git-fixes).
* kasan: remove kasan_find_vm_area() to prevent possible deadlock (git-fixes).
* kernel-obs-qa: Do not depend on srchash when qemu emulation is used In this
case the dependency is never fulfilled Fixes: 485ae1da2b88 ("kernel-obs-qa:
Use srchash for dependency as well")
* kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
* leds: multicolor: Fix intensity setting while SW blinking (stable-fixes).
* lib/group_cpus.c: avoid acquiring cpu hotplug lock in group_cpus_evenly
(bsc#1236897).
* lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()
(bsc#1236897).
* logitech C-270 even more broken (stable-fixes).
* maple_tree: fix mt_destroy_walk() on root leaf node (git-fixes).
* md/md-bitmap: fix dm-raid max_write_behind setting (git-fixes).
* media: gspca: Add bounds checking to firmware parser (git-fixes).
* media: hi556: correct the test pattern configuration (git-fixes).
* media: imx: fix a potential memory leak in
imx_media_csc_scaler_device_init() (git-fixes).
* media: ov2659: Fix memory leaks in ov2659_probe() (git-fixes).
* media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt() (git-
fixes).
* media: usbtv: Lock resolution while streaming (git-fixes).
* media: uvcvideo: Do not mark valid metadata as invalid (git-fixes).
* media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format() (git-
fixes).
* media: v4l2-ctrls: Do not reset handler's error in v4l2_ctrl_handler_free()
(git-fixes).
* media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check (git-fixes).
* media: venus: Add a check for packet size after reading from shared memory
(git-fixes).
* media: venus: hfi: explicitly release IRQ during teardown (git-fixes).
* media: venus: protect against spurious interrupts during probe (git-fixes).
* media: venus: vdec: Clamp param smaller than 1fps and bigger than 240 (git-
fixes).
* media: venus: venc: Clamp param smaller than 1fps and bigger than 240 (git-
fixes).
* media: vivid: fix wrong pixel_array control size (git-fixes).
* memstick: core: Zero initialize id_reg in h_memstick_read_dev_id() (git-
fixes).
* mfd: max14577: Fix wakeup source leaks on device unbind (stable-fixes).
* misc: rtsx: usb: Ensure mmc child device is active when card is present
(git-fixes).
* mmc: bcm2835: Fix dma_unmap_sg() nents value (git-fixes).
* mmc: core: sd: Apply BROKEN_SD_DISCARD quirk earlier (git-fixes).
* mmc: sdhci-pci: Quirk for broken command queuing on Intel GLK-based Positivo
models (git-fixes).
* mmc: sdhci: Add a helper function for dump register in dynamic debug mode
(stable-fixes).
* mmc: sdhci_am654: Workaround for Errata i2312 (git-fixes).
* module: Fix memory deallocation on error path in move_module() (git-fixes).
* module: Remove unnecessary +1 from last_unloaded_module::name size (git-
fixes).
* module: Restore the moduleparam prefix length check (git-fixes).
* mtd: fix possible integer overflow in erase_xfer() (git-fixes).
* mtd: rawnand: atmel: Fix dma_mapping_error() address (git-fixes).
* mtd: rawnand: atmel: set pmecc data setup time (git-fixes).
* mtd: rawnand: fsmc: Add missing check after DMA map (git-fixes).
* mtd: rawnand: renesas: Add missing check after DMA map (git-fixes).
* mtd: rawnand: rockchip: Add missing check after DMA map (git-fixes).
* mtd: spi-nor: Fix spi_nor_try_unlock_all() (git-fixes).
* mtd: spinand: fix memory leak of ECC engine conf (stable-fixes).
* mtd: spinand: propagate spinand_wait() errors from spinand_write_page()
(git-fixes).
* mtk-sd: Fix a pagefault in dma_unmap_sg() for not prepared data (git-fixes).
* mtk-sd: Prevent memory corruption from DMA map failure (git-fixes).
* mtk-sd: reset host->mrq on prepare_data() error (git-fixes).
* mwl8k: Add missing check after DMA map (git-fixes).
* nbd: fix uaf in nbd_genl_connect() error path (git-fixes).
* net/packet: fix a race in packet_set_ring() and packet_notifier() (git-
fixes).
* net/sched: Restrict conditions for adding duplicating netems to qdisc tree
(git-fixes).
* net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (git-
fixes).
* net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing (git-
fixes).
* net/sched: sch_qfq: Avoid triggering might_sleep in atomic context in
qfq_delete_class (git-fixes).
* net/sched: sch_qfq: Fix race condition on qfq_aggregate (git-fixes).
* net/sched: taprio: enforce minimum value for picos_per_byte (git-fixes).
* net: mana: Add debug logs in MANA network driver (bsc#1246212).
* net: mana: Add handler for hardware servicing events (bsc#1245730).
* net: mana: Allocate MSI-X vectors dynamically (bsc#1245457).
* net: mana: Allow irq_setup() to skip cpus for affinity (bsc#1245457).
* net: mana: Allow tso_max_size to go up-to GSO_MAX_SIZE (bsc#1246203).
* net: mana: Expose additional hardware counters for drop and TC via ethtool
(bsc#1245729).
* net: mana: Set tx_packets to post gso processing packet count (bsc#1245731).
* net: mana: explain irq_setup() algorithm (bsc#1245457).
* net: phy: Do not register LEDs for genphy (git-fixes).
* net: phy: micrel: fix KSZ8081/KSZ8091 cable test (git-fixes).
* net: phy: microchip: limit 100M workaround to link-down events on LAN88xx
(git-fixes).
* net: phy: smsc: Fix Auto-MDIX configuration when disabled by strap (git-
fixes).
* net: phy: smsc: Fix link failure in forced mode with Auto-MDIX (git-fixes).
* net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect (git-
fixes).
* net: usb: qmi_wwan: add SIMCom 8230C composition (stable-fixes).
* net: usbnet: Avoid potential RCU stall on LINK_CHANGE event (git-fixes).
* net: usbnet: Fix the wrong netif_carrier_on() call (git-fixes).
* netpoll: prevent hanging NAPI when netcons gets enabled (git-fixes).
* nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails (git-
fixes).
* nfs: Fix filehandle bounds checking in nfs_fh_to_dentry() (git-fixes).
* nfs: Fix the setting of capabilities when automounting a new filesystem
(git-fixes).
* nfs: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate() (git-
fixes).
* nfs: Fixup allocation flags for nfsiod's __GFP_NORETRY (git-fixes).
* nfsd: detect mismatch of file handle and delegation stateid in OPEN op (git-
fixes).
* nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
(git-fixes).
* nfsv4.2: another fix for listxattr (git-fixes).
* nfsv4.2: fix listxattr to return selinux security label (git-fixes).
* nfsv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN (git-fixes).
* nfsv4: Always set NLINK even if the server does not support it (git-fixes).
* nfsv4: xattr handlers should check for absent nfs filehandles (git-fixes).
* nilfs2: reject invalid file types when reading inodes (git-fixes).
* nvme-pci: refresh visible attrs after being checked (git-fixes).
* nvme: Fix incorrect cdw15 value in passthru error logging (git-fixes).
* nvme: fix endianness of command word prints in nvme_log_err_passthru() (git-
fixes).
* nvme: fix inconsistent RCU list manipulation in nvme_ns_add_to_ctrl_list()
(git-fixes).
* nvme: fix misaccounting of nvme-mpath inflight I/O (git-fixes).
* nvmet-tcp: fix callback lock for TLS handshake (git-fixes).
* objtool: Fix INSN_CONTEXT_SWITCH handling in validate_unret() (git-fixes).
* objtool: Fix UNWIND_HINT_{SAVE,RESTORE} across basic blocks (git-fixes).
* objtool: Fix _THIS_IP_ detection for cold functions (git-fixes).
* objtool: Fix error handling inconsistencies in check() (git-fixes).
* objtool: Ignore dangling jump table entries (git-fixes).
* objtool: Ignore end-of-section jumps for KCOV/GCOV (git-fixes).
* objtool: Properly disable uaccess validation (git-fixes).
* objtool: Silence more KCOV warnings (git-fixes).
* objtool: Silence more KCOV warnings, part 2 (git-fixes).
* objtool: Stop UNRET validation on UD2 (git-fixes).
* pNFS/flexfiles: do not attempt pnfs on fatal DS errors (git-fixes).
* pch_uart: Fix dma_sync_sg_for_device() nents value (git-fixes).
* pci/MSI: Export pci_msix_prepare_desc() for dynamic MSI-X allocations
(bsc#1245457).
* pci: dwc: Make link training more robust by setting PORT_LOGIC_LINK_WIDTH to
one lane (stable-fixes).
* pci: endpoint: Fix configfs group list head handling (git-fixes).
* pci: endpoint: Fix configfs group removal on driver teardown (git-fixes).
* pci: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute
(git-fixes).
* pci: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar()
fails (git-fixes).
* pci: hv: Allow dynamic MSI-X vector allocation (bsc#1245457).
* pci: rockchip-host: Fix "Unexpected Completion" log message (git-fixes).
* perf: Fix sample vs do_exit() (bsc#1246547).
* phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode (git-
fixes).
* pinctrl: amd: Clear GPIO debounce for suspend (git-fixes).
* pinctrl: qcom: msm: mark certain pins as invalid for interrupts (git-fixes).
* pinctrl: sunxi: Fix memory leak on krealloc failure (git-fixes).
* pinmux: fix race causing mux_owner NULL with active mux_usecount (git-
fixes).
* platform/chrome: cros_ec: Unregister notifier in cros_ec_unregister() (git-
fixes).
* platform/mellanox: mlxbf-pmc: Fix duplicate event ID for CACHE_DATA1 (git-
fixes).
* platform/mellanox: mlxbf-tmfifo: fix vring_desc.len assignment (git-fixes).
* platform/mellanox: mlxreg-lc: Fix logic error in power state check (git-
fixes).
* platform/mellanox: nvsw-sn2201: Fix bus number in adapter error message
(git-fixes).
* platform/x86/amd/pmc: Add PCSpecialist Lafite Pro V 14M to 8042 quirks list
(stable-fixes).
* platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs
callbacks (git-fixes).
* platform/x86: ideapad-laptop: Fix kbd backlight not remembered among boots
(git-fixes).
* platform/x86: think-lmi: Create ksets consecutively (stable-fixes).
* platform/x86: think-lmi: Fix kobject cleanup (git-fixes).
* platform/x86: think-lmi: Fix sysfs group cleanup (git-fixes).
* pm / devfreq: Check governor before using governor->name (git-fixes).
* power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
(git-fixes).
* power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set (git-
fixes).
* powercap: call put_device() on an error path in
powercap_register_control_type() (stable-fixes).
* powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw() (git-
fixes).
* powercap: intel_rapl: Do not change CLAMPING bit if ENABLE bit cannot be
changed (git-fixes).
* powerpc/bpf: enforce full ordering for ATOMIC operations with BPF_FETCH
(git-fixes).
* ptp: fix breakage after ptp_vclock_in_use() rework (bsc#1246506).
* pwm: imx-tpm: Reset counter if CMOD is 0 (git-fixes).
* pwm: mediatek: Ensure to disable clocks in error path (git-fixes).
* rdma/core: Rate limit GID cache warning messages (git-fixes)
* rdma/counter: Check CAP_NET_RAW check in user namespace for RDMA counters
(git-fixes)
* rdma/hns: Drop GFP_NOWARN (git-fixes)
* rdma/hns: Fix -Wframe-larger-than issue (git-fixes)
* rdma/hns: Fix HW configurations not cleared in error flow (git-fixes)
* rdma/hns: Fix accessing uninitialized resources (git-fixes)
* rdma/hns: Fix double destruction of rsv_qp (git-fixes)
* rdma/hns: Get message length of ack_req from FW (git-fixes)
* rdma/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes)
* rdma/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes)
* rdma/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
* rdma/mlx5: Fix CC counters query for MPV (git-fixes)
* rdma/mlx5: Fix HW counters query for non-representor devices (git-fixes)
* rdma/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes)
* rdma/mlx5: Fix vport loopback for MPV device (git-fixes)
* rdma/mlx5: Initialize obj_event->obj_sub_list before xa_insert (git-fixes)
* rdma/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes)
* rdma/siw: Fix the sendmsg byte count in siw_tcp_sendpages (git-fixes)
* rdma/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes)
* rdma/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes)
* rdma/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-
fixes)
* rdma/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes)
* regmap: fix potential memory leak of regmap_bus (git-fixes).
* regulator: fan53555: add enable_time support and soft-start times (stable-
fixes).
* regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods (git-
fixes).
* regulator: pwm-regulator: Calculate the output voltage for disabled PWMs
(stable-fixes).
* resource: fix false warning in __request_region() (git-fixes).
* restore UCSI_CONNECTOR_RESET_HARD definition (git-fixes).
* ring-buffer: Do not allow events in NMI with generic atomic64 cmpxchg()
(git-fixes).
* rose: fix dangling neighbour pointers in rose_rt_device_down() (git-fixes).
* rpl: Fix use-after-free in rpl_do_srh_inline() (git-fixes).
* rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation
(bsc#1246879) Put the same workaround to avoid file truncation of vmlinux
and co in kernel-default-base package, too.
* rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337)
* rtc: ds1307: fix incorrect maximum clock rate handling (git-fixes).
* rtc: hym8563: fix incorrect maximum clock rate handling (git-fixes).
* rtc: nct3018y: fix incorrect maximum clock rate handling (git-fixes).
* rtc: pcf85063: fix incorrect maximum clock rate handling (git-fixes).
* rtc: pcf8563: fix incorrect maximum clock rate handling (git-fixes).
* rtc: rv3028: fix incorrect maximum clock rate handling (git-fixes).
* s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again (git-fixes
bsc#1246870).
* s390/entry: Fix last breaking event handling in case of stack corruption
(git-fixes bsc#1243806).
* s390/pci: Do not try re-enabling load/store if device is disabled (git-fixes
bsc#1245646).
* s390/pci: Fix stale function handles in error handling (git-fixes
bsc#1245647).
* s390/pkey: Prevent overflow in size calculation for memdup_user() (git-fixes
bsc#1245598).
* s390: Add z17 elf platform (LTC#214086 bsc#1245540).
* samples: mei: Fix building on musl libc (git-fixes).
* sched,freezer: Remove unnecessary warning in __thaw_task (bsc#1219338).
* sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up() (git-
fixes).
* scsi: core: Enforce unlimited max_segment_size when virt_boundary_mask is
set (git-fixes).
* scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Early return out of FDMI cmpl for locally rejected statuses
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Ensure HBA_SETUP flag is used only for SLI4 in
dev_loss_tmo_callbk (bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Modify end-of-life adapters' model descriptions (bsc#1245260
bsc#1243100 bsc#1246125 bsc#1204142).
* scsi: lpfc: Move clearing of HBA_SETUP flag to before lpfc_sli4_queue_unset
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Relocate clearing initial phba flags from link up to link down
hdlr (bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Revise CQ_CREATE_SET mailbox bitfield definitions (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Revise logging format for failed CT MIB requests (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Simplify error handling for failed lpfc_get_sli4_parameters cmd
(bsc#1245260 bsc#1243100 bsc#1246125).
* scsi: lpfc: Skip RSCN processing when FC_UNLOADING flag is set (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Update debugfs trace ring initialization messages (bsc#1245260
bsc#1243100 bsc#1246125).
* scsi: lpfc: Update lpfc version to 14.4.0.10 (bsc#1245260 bsc#1243100
bsc#1246125).
* scsi: megaraid_sas: Fix invalid node index (git-fixes).
* scsi: qla2xxx: Fix DMA mapping test in qla24xx_get_port_database() (git-
fixes).
* scsi: qla4xxx: Fix missing DMA mapping error in qla4xxx_alloc_pdu() (git-
fixes).
* scsi: s390: zfcp: Ensure synchronous unit_add (git-fixes bsc#1245599).
* selftests/bpf: Add CFLAGS per source file and runner (git-fixes).
* selftests/bpf: Add tests for iter next method returning valid pointer (git-
fixes).
* selftests/bpf: Change functions definitions to support GCC (git-fixes).
* selftests/bpf: Fix a few tests for GCC related warnings (git-fixes).
* selftests/bpf: Fix pointer arithmetic in test_xdp_do_redirect (git-fixes).
* selftests/bpf: Fix prog numbers in test_sockmap (git-fixes).
* smb3: move server check earlier when setting channel sequence number (git-
fixes).
* smb3: rename macro CIFS_SERVER_IS_CHAN to avoid confusion (git-fixes).
* smb3: send channel sequence number in SMB3 requests after reconnects (git-
fixes).
* smb: client: fix parsing of device numbers (git-fixes).
* soc/tegra: cbb: Clear ERR_FORCE register with ERR_STATUS (git-fixes).
* soc: aspeed: lpc-snoop: Cleanup resources in stack-order (git-fixes).
* soc: aspeed: lpc-snoop: Do not disable channels that are not enabled (git-
fixes).
* soc: qcom: QMI encoding/decoding for big endian (git-fixes).
* soc: qcom: fix endianness for QMI header (git-fixes).
* soc: qcom: pmic_glink: fix OF node leak (git-fixes).
* soundwire: amd: fix for clearing command status register (git-fixes).
* soundwire: stream: restore params when prepare ports fail (git-fixes).
* spi: spi-fsl-dspi: Clear completion counter before initiating transfer (git-
fixes).
* staging: axis-fifo: remove sysfs interface (git-fixes).
* staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc() (git-
fixes).
* staging: nvec: Fix incorrect null termination of battery manufacturer (git-
fixes).
* struct cdns: move new member to the end (git-fixes).
* struct ucsi_operations: use padding for new operation (git-fixes).
* sunrpc: do not immediately retransmit on seqno miss (git-fixes).
* sunrpc: fix client side handling of tls alerts (git-fixes).
* sunrpc: fix handling of server side tls alerts (git-fixes).
* supported.conf: add missing entries for armv7hl
* supported.conf: move nvme-apple to optional again
* supported.conf: sort entries again
* tcp: call tcp_measure_rcv_mss() for ooo packets (git-fixes).
* thunderbolt: Fix bit masking in tb_dp_port_set_hops() (git-fixes).
* thunderbolt: Fix copy+paste error in match_service_id() (git-fixes).
* thunderbolt: Fix wake on connect at runtime (git-fixes).
* tracing/kprobe: Make trace_kprobe's module callback called after jump_label
update (git-fixes).
* tracing/kprobes: Fix to free objects when failed to copy a symbol (git-
fixes).
* types: Complement the aligned types with signed 64-bit one (stable-fixes).
* ucount: fix atomic_long_inc_below() argument type (git-fixes).
* ucsi-glink: adapt to kABI consistency (git-fixes).
* ucsi_ccg: Refine the UCSI Interrupt handling (git-fixes).
* ucsi_operations: add stubs for all operations (git-fixes).
* ucsi_ops: adapt update_connector to kABI consistency (git-fixes).
* usb: Add checks for snprintf() calls in usb_alloc_dev() (stable-fixes).
* usb: atm: cxacru: Merge cxacru_upload_firmware() into cxacru_heavy_init()
(git-fixes).
* usb: cdc-wdm: avoid setting WDM_READ for ZLP-s (stable-fixes).
* usb: cdnsp: Fix issue with CV Bad Descriptor test (git-fixes).
* usb: cdnsp: Fix issue with resuming from L1 (git-fixes).
* usb: cdnsp: Replace snprintf() with the safer scnprintf() variant (stable-
fixes).
* usb: cdnsp: do not disable slot for disabled slot (git-fixes).
* usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume
(git-fixes).
* usb: common: usb-conn-gpio: use a unique name for usb connector device
(stable-fixes).
* usb: dwc2: also exit clock_gating when stopping udc while suspended (stable-
fixes).
* usb: dwc3: meson-g12a: fix device leaks at unbind (git-fixes).
* usb: early: xhci-dbc: Fix early_ioremap leak (git-fixes).
* usb: gadget : fix use-after-free in composite_dev_cleanup() (git-fixes).
* usb: gadget: u_serial: Fix race condition in TTY wakeup (git-fixes).
* usb: gadget: udc: renesas_usb3: fix device leak at unbind (git-fixes).
* usb: host: xhci-plat: fix incorrect type for of_match variable in
xhci_plat_probe() (git-fixes).
* usb: hub: Do not try to recover devices lost during warm reset (git-fixes).
* usb: misc: apple-mfi-fastcharge: Make power supply names unique (git-fixes).
* usb: musb: fix gadget state on disconnect (git-fixes).
* usb: musb: omap2430: fix device leak at unbind (git-fixes).
* usb: net: sierra: check for no status endpoint (git-fixes).
* usb: potential integer overflow in usbg_make_tpg() (stable-fixes).
* usb: serial: ftdi_sio: add support for NDI EMGUIDE GEMINI (stable-fixes).
* usb: serial: option: add Foxconn T99W640 (stable-fixes).
* usb: serial: option: add Telit Cinterion FE910C04 (ECM) composition (stable-
fixes).
* usb: typec: Update sysfs when setting ops (git-fixes).
* usb: typec: altmodes/displayport: do not index invalid pin_assignments (git-
fixes).
* usb: typec: displayport: Fix potential deadlock (git-fixes).
* usb: typec: displayport: Receive DP Status Update NAK request exit dp
altmode (stable-fixes).
* usb: typec: mux: do not return on EOPNOTSUPP in {mux, switch}_set (stable-
fixes).
* usb: typec: tcpm: allow switching to mode accessory to mux properly (stable-
fixes).
* usb: typec: tcpm: allow to use sink in accessory mode (stable-fixes).
* usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach (git-
fixes).
* usb: typec: ucsi: Add DATA_RESET option of Connector Reset command (git-
fixes).
* usb: typec: ucsi: Add qcm6490-pmic-glink as needing PDOS quirk (git-fixes).
* usb: typec: ucsi: Delay alternate mode discovery (git-fixes).
* usb: typec: ucsi: Fix busy loop on ASUS VivoBooks (git-fixes).
* usb: typec: ucsi: Fix the partner PD revision (git-fixes).
* usb: typec: ucsi: Get PD revision for partner (git-fixes).
* usb: typec: ucsi: Set orientation as none when connector is unplugged (git-
fixes).
* usb: typec: ucsi: Update power_supply on power role change (git-fixes).
* usb: typec: ucsi: add callback for connector status updates (git-fixes).
* usb: typec: ucsi: add update_connector callback (git-fixes).
* usb: typec: ucsi: do not retrieve PDOs if not supported (git-fixes).
* usb: typec: ucsi: extract code to read PD caps (git-fixes).
* usb: typec: ucsi: fix UCSI on SM8550 & SM8650 Qualcomm devices (git-fixes).
* usb: typec: ucsi: glink: fix off-by-one in connector_status (git-fixes).
* usb: typec: ucsi: glink: increase max ports for x1e80100 (git-fixes).
* usb: typec: ucsi: glink: move GPIO reading into connector_status callback
(git-fixes).
* usb: typec: ucsi: glink: use typec_set_orientation (git-fixes).
* usb: typec: ucsi: move ucsi_acknowledge() from ucsi_read_error() (git-
fixes).
* usb: typec: ucsi: properly register partner's PD device (git-fixes).
* usb: typec: ucsi: support delaying GET_PDOS for device (git-fixes).
* usb: typec: ucsi_acpi: Add LG Gram quirk (git-fixes).
* usb: typec: ucsi_glink: drop NO_PARTNER_PDOS quirk for sm8550 / sm8650 (git-
fixes).
* usb: typec: ucsi_glink: enable the UCSI_DELAY_DEVICE_PDOS quirk (git-fixes).
* usb: typec: ucsi_glink: enable the UCSI_DELAY_DEVICE_PDOS quirk on qcm6490
(git-fixes).
* usb: typec: ucsi_glink: rework quirks implementation (git-fixes).
* usb: xhci: Skip xhci_reset in xhci_resume if xhci is being removed (git-
fixes).
* usb: xhci: quirk for data loss in ISOC transfers (stable-fixes).
* usb:cdnsp: remove TRB_FLUSH_ENDPOINT command (stable-fixes).
* virtgpu: do not reset on shutdown (git-fixes).
* vmci: Prevent the dispatching of uninitialized payloads (git-fixes).
* vt: add missing notification when switching back to text mode (stable-
fixes).
* vt: defkeymap: Map keycodes above 127 to K_HOLE (git-fixes).
* vt: keyboard: Do not process Unicode characters in K_OFF mode (git-fixes).
* watchdog: ziirave_wdt: check record length in ziirave_firm_verify() (git-
fixes).
* wifi: ath11k: clear initialized flag for deinit-ed srng lists (git-fixes).
* wifi: ath11k: fix dest ring-buffer corruption (git-fixes).
* wifi: ath11k: fix dest ring-buffer corruption when ring is full (git-fixes).
* wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()
(git-fixes).
* wifi: ath11k: fix source ring-buffer corruption (git-fixes).
* wifi: ath11k: fix suspend use-after-free after probe failure (git-fixes).
* wifi: ath12k: fix dest ring-buffer corruption (git-fixes).
* wifi: ath12k: fix dest ring-buffer corruption when ring is full (git-fixes).
* wifi: ath12k: fix endianness handling while accessing wmi service bit (git-
fixes).
* wifi: ath12k: fix source ring-buffer corruption (git-fixes).
* wifi: ath6kl: remove WARN on bad firmware input (stable-fixes).
* wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P IE
(git-fixes).
* wifi: brcmsmac: Remove const from tbl_ptr parameter in
wlc_lcnphy_common_read_table() (git-fixes).
* wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start() (git-fixes).
* wifi: iwlwifi: Fix memory leak in iwl_mvm_init() (git-fixes).
* wifi: iwlwifi: return ERR_PTR from opmode start() (stable-fixes).
* wifi: mac80211: Add link iteration macro for link data (stable-fixes).
* wifi: mac80211: Check 802.11 encaps offloading in
ieee80211_tx_h_select_key() (git-fixes).
* wifi: mac80211: Do not call fq_flow_idx() for management frames (git-fixes).
* wifi: mac80211: Do not schedule stopped TXQs (git-fixes).
* wifi: mac80211: chan: chandef is non-NULL for reserved (stable-fixes).
* wifi: mac80211: drop invalid source address OCB frames (stable-fixes).
* wifi: mac80211: reject TDLS operations when station is not associated (git-
fixes).
* wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init() (git-fixes).
* wifi: mt76: mt7925: fix invalid array index in ssid assignment during hw
scan (git-fixes).
* wifi: mt76: mt7925: fix the wrong config for tx interrupt (git-fixes).
* wifi: plfxlc: Fix error handling in usb driver probe (git-fixes).
* wifi: prevent A-MSDU attacks in mesh networks (stable-fixes).
* wifi: rtl818x: Kill URBs before clearing tx status queue (git-fixes).
* wifi: rtw89: avoid NULL dereference when RX problematic packet on
unsupported 6 GHz band (git-fixes).
* wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()
(git-fixes).
* x86/cpu/amd: Fix workaround for erratum 1054 (git-fixes).
* x86/mce/amd: Add default names for MCA banks and blocks (git-fixes).
* x86/mce/amd: Fix threshold limit reset (git-fixes).
* x86/mce: Do not remove sysfs if thresholding sysfs init fails (git-fixes).
* x86/mce: Make sure CMCI banks are cleared during shutdown on Intel (git-
fixes).
* x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-
fixes).
* x86/traps: Initialize DR6 by writing its architectural reset value (git-
fixes).
* x86/virt/tdx: Avoid indirect calls to TDX assembly functions (git-fixes).
* x86: UV RTC: Add parameter to disable RTC clocksource (bsc#1241345).
* xfs: fix off-by-one error in fsmap's end_daddr usage (bsc#1235837).
* xfs: only create event xfs_file_compat_ioctl when CONFIG_COMPAT is configure
(git-fixes).
* xfs: remove unused event xfs_alloc_near_error (git-fixes).
* xfs: remove unused event xfs_alloc_near_nominleft (git-fixes).
* xfs: remove unused event xfs_attr_node_removename (git-fixes).
* xfs: remove unused event xfs_ioctl_clone (git-fixes).
* xfs: remove unused event xfs_pagecache_inval (git-fixes).
* xfs: remove unused event xlog_iclog_want_sync (git-fixes).
* xfs: remove unused trace event xfs_attr_remove_iter_return (git-fixes).
* xfs: remove unused trace event xfs_attr_rmtval_set (git-fixes).
* xfs: remove unused trace event xfs_reflink_cow_enospc (git-fixes).
* xfs: remove unused xfs_attr events (git-fixes).
* xfs: remove unused xfs_reflink_compare_extents events (git-fixes).
* xfs: remove usused xfs_end_io_direct events (git-fixes).
* xhci: Disable stream for xHC controller with XHCI_BROKEN_STREAMS (git-
fixes).
* xhci: dbc: Flush queued requests before stopping dbc (git-fixes).
* xhci: dbctty: disable ECHO flag by default (git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2969=1 openSUSE-SLE-15.6-2025-2969=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-2969=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.48.1
* kernel-source-azure-6.4.0-150600.8.48.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.48.1
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.48.1
* reiserfs-kmp-azure-6.4.0-150600.8.48.1
* kernel-azure-devel-6.4.0-150600.8.48.1
* kernel-azure-debugsource-6.4.0-150600.8.48.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.48.1
* dlm-kmp-azure-6.4.0-150600.8.48.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.48.1
* kselftests-kmp-azure-6.4.0-150600.8.48.1
* kernel-syms-azure-6.4.0-150600.8.48.1
* cluster-md-kmp-azure-6.4.0-150600.8.48.1
* kernel-azure-optional-6.4.0-150600.8.48.1
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.48.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.48.1
* gfs2-kmp-azure-6.4.0-150600.8.48.1
* ocfs2-kmp-azure-6.4.0-150600.8.48.1
* kernel-azure-extra-6.4.0-150600.8.48.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.48.1
* kernel-azure-debuginfo-6.4.0-150600.8.48.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.48.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.48.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.48.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-6.4.0-150600.8.48.1
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.48.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.48.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-azure-debuginfo-6.4.0-150600.8.48.1
* kernel-azure-debugsource-6.4.0-150600.8.48.1
* kernel-syms-azure-6.4.0-150600.8.48.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.48.1
* kernel-azure-devel-6.4.0-150600.8.48.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.48.1
* kernel-source-azure-6.4.0-150600.8.48.1

## References:

* https://www.suse.com/security/cve/CVE-2019-11135.html
* https://www.suse.com/security/cve/CVE-2024-36028.html
* https://www.suse.com/security/cve/CVE-2024-36348.html
* https://www.suse.com/security/cve/CVE-2024-36349.html
* https://www.suse.com/security/cve/CVE-2024-36350.html
* https://www.suse.com/security/cve/CVE-2024-36357.html
* https://www.suse.com/security/cve/CVE-2024-44963.html
* https://www.suse.com/security/cve/CVE-2024-49861.html
* https://www.suse.com/security/cve/CVE-2024-56742.html
* https://www.suse.com/security/cve/CVE-2024-57947.html
* https://www.suse.com/security/cve/CVE-2025-21839.html
* https://www.suse.com/security/cve/CVE-2025-21854.html
* https://www.suse.com/security/cve/CVE-2025-21872.html
* https://www.suse.com/security/cve/CVE-2025-22090.html
* https://www.suse.com/security/cve/CVE-2025-23163.html
* https://www.suse.com/security/cve/CVE-2025-37798.html
* https://www.suse.com/security/cve/CVE-2025-37856.html
* https://www.suse.com/security/cve/CVE-2025-37864.html
* https://www.suse.com/security/cve/CVE-2025-37885.html
* https://www.suse.com/security/cve/CVE-2025-37920.html
* https://www.suse.com/security/cve/CVE-2025-37984.html
* https://www.suse.com/security/cve/CVE-2025-38034.html
* https://www.suse.com/security/cve/CVE-2025-38035.html
* https://www.suse.com/security/cve/CVE-2025-38051.html
* https://www.suse.com/security/cve/CVE-2025-38052.html
* https://www.suse.com/security/cve/CVE-2025-38058.html
* https://www.suse.com/security/cve/CVE-2025-38061.html
* https://www.suse.com/security/cve/CVE-2025-38062.html
* https://www.suse.com/security/cve/CVE-2025-38063.html
* https://www.suse.com/security/cve/CVE-2025-38064.html
* https://www.suse.com/security/cve/CVE-2025-38074.html
* https://www.suse.com/security/cve/CVE-2025-38084.html
* https://www.suse.com/security/cve/CVE-2025-38085.html
* https://www.suse.com/security/cve/CVE-2025-38087.html
* https://www.suse.com/security/cve/CVE-2025-38088.html
* https://www.suse.com/security/cve/CVE-2025-38089.html
* https://www.suse.com/security/cve/CVE-2025-38090.html
* https://www.suse.com/security/cve/CVE-2025-38094.html
* https://www.suse.com/security/cve/CVE-2025-38095.html
* https://www.suse.com/security/cve/CVE-2025-38097.html
* https://www.suse.com/security/cve/CVE-2025-38098.html
* https://www.suse.com/security/cve/CVE-2025-38099.html
* https://www.suse.com/security/cve/CVE-2025-38100.html
* https://www.suse.com/security/cve/CVE-2025-38102.html
* https://www.suse.com/security/cve/CVE-2025-38105.html
* https://www.suse.com/security/cve/CVE-2025-38107.html
* https://www.suse.com/security/cve/CVE-2025-38108.html
* https://www.suse.com/security/cve/CVE-2025-38109.html
* https://www.suse.com/security/cve/CVE-2025-38110.html
* https://www.suse.com/security/cve/CVE-2025-38111.html
* https://www.suse.com/security/cve/CVE-2025-38112.html
* https://www.suse.com/security/cve/CVE-2025-38113.html
* https://www.suse.com/security/cve/CVE-2025-38115.html
* https://www.suse.com/security/cve/CVE-2025-38117.html
* https://www.suse.com/security/cve/CVE-2025-38118.html
* https://www.suse.com/security/cve/CVE-2025-38120.html
* https://www.suse.com/security/cve/CVE-2025-38122.html
* https://www.suse.com/security/cve/CVE-2025-38123.html
* https://www.suse.com/security/cve/CVE-2025-38124.html
* https://www.suse.com/security/cve/CVE-2025-38126.html
* https://www.suse.com/security/cve/CVE-2025-38127.html
* https://www.suse.com/security/cve/CVE-2025-38129.html
* https://www.suse.com/security/cve/CVE-2025-38131.html
* https://www.suse.com/security/cve/CVE-2025-38132.html
* https://www.suse.com/security/cve/CVE-2025-38135.html
* https://www.suse.com/security/cve/CVE-2025-38136.html
* https://www.suse.com/security/cve/CVE-2025-38138.html
* https://www.suse.com/security/cve/CVE-2025-38142.html
* https://www.suse.com/security/cve/CVE-2025-38143.html
* https://www.suse.com/security/cve/CVE-2025-38145.html
* https://www.suse.com/security/cve/CVE-2025-38147.html
* https://www.suse.com/security/cve/CVE-2025-38148.html
* https://www.suse.com/security/cve/CVE-2025-38149.html
* https://www.suse.com/security/cve/CVE-2025-38151.html
* https://www.suse.com/security/cve/CVE-2025-38153.html
* https://www.suse.com/security/cve/CVE-2025-38154.html
* https://www.suse.com/security/cve/CVE-2025-38155.html
* https://www.suse.com/security/cve/CVE-2025-38157.html
* https://www.suse.com/security/cve/CVE-2025-38158.html
* https://www.suse.com/security/cve/CVE-2025-38159.html
* https://www.suse.com/security/cve/CVE-2025-38161.html
* https://www.suse.com/security/cve/CVE-2025-38162.html
* https://www.suse.com/security/cve/CVE-2025-38165.html
* https://www.suse.com/security/cve/CVE-2025-38166.html
* https://www.suse.com/security/cve/CVE-2025-38173.html
* https://www.suse.com/security/cve/CVE-2025-38174.html
* https://www.suse.com/security/cve/CVE-2025-38177.html
* https://www.suse.com/security/cve/CVE-2025-38180.html
* https://www.suse.com/security/cve/CVE-2025-38181.html
* https://www.suse.com/security/cve/CVE-2025-38182.html
* https://www.suse.com/security/cve/CVE-2025-38183.html
* https://www.suse.com/security/cve/CVE-2025-38187.html
* https://www.suse.com/security/cve/CVE-2025-38188.html
* https://www.suse.com/security/cve/CVE-2025-38192.html
* https://www.suse.com/security/cve/CVE-2025-38193.html
* https://www.suse.com/security/cve/CVE-2025-38194.html
* https://www.suse.com/security/cve/CVE-2025-38197.html
* https://www.suse.com/security/cve/CVE-2025-38198.html
* https://www.suse.com/security/cve/CVE-2025-38200.html
* https://www.suse.com/security/cve/CVE-2025-38202.html
* https://www.suse.com/security/cve/CVE-2025-38203.html
* https://www.suse.com/security/cve/CVE-2025-38204.html
* https://www.suse.com/security/cve/CVE-2025-38206.html
* https://www.suse.com/security/cve/CVE-2025-38210.html
* https://www.suse.com/security/cve/CVE-2025-38211.html
* https://www.suse.com/security/cve/CVE-2025-38212.html
* https://www.suse.com/security/cve/CVE-2025-38213.html
* https://www.suse.com/security/cve/CVE-2025-38214.html
* https://www.suse.com/security/cve/CVE-2025-38215.html
* https://www.suse.com/security/cve/CVE-2025-38217.html
* https://www.suse.com/security/cve/CVE-2025-38220.html
* https://www.suse.com/security/cve/CVE-2025-38222.html
* https://www.suse.com/security/cve/CVE-2025-38225.html
* https://www.suse.com/security/cve/CVE-2025-38226.html
* https://www.suse.com/security/cve/CVE-2025-38227.html
* https://www.suse.com/security/cve/CVE-2025-38229.html
* https://www.suse.com/security/cve/CVE-2025-38231.html
* https://www.suse.com/security/cve/CVE-2025-38236.html
* https://www.suse.com/security/cve/CVE-2025-38239.html
* https://www.suse.com/security/cve/CVE-2025-38244.html
* https://www.suse.com/security/cve/CVE-2025-38246.html
* https://www.suse.com/security/cve/CVE-2025-38248.html
* https://www.suse.com/security/cve/CVE-2025-38249.html
* https://www.suse.com/security/cve/CVE-2025-38250.html
* https://www.suse.com/security/cve/CVE-2025-38257.html
* https://www.suse.com/security/cve/CVE-2025-38259.html
* https://www.suse.com/security/cve/CVE-2025-38264.html
* https://www.suse.com/security/cve/CVE-2025-38272.html
* https://www.suse.com/security/cve/CVE-2025-38273.html
* https://www.suse.com/security/cve/CVE-2025-38275.html
* https://www.suse.com/security/cve/CVE-2025-38277.html
* https://www.suse.com/security/cve/CVE-2025-38279.html
* https://www.suse.com/security/cve/CVE-2025-38283.html
* https://www.suse.com/security/cve/CVE-2025-38286.html
* https://www.suse.com/security/cve/CVE-2025-38289.html
* https://www.suse.com/security/cve/CVE-2025-38290.html
* https://www.suse.com/security/cve/CVE-2025-38292.html
* https://www.suse.com/security/cve/CVE-2025-38293.html
* https://www.suse.com/security/cve/CVE-2025-38300.html
* https://www.suse.com/security/cve/CVE-2025-38303.html
* https://www.suse.com/security/cve/CVE-2025-38304.html
* https://www.suse.com/security/cve/CVE-2025-38305.html
* https://www.suse.com/security/cve/CVE-2025-38307.html
* https://www.suse.com/security/cve/CVE-2025-38310.html
* https://www.suse.com/security/cve/CVE-2025-38312.html
* https://www.suse.com/security/cve/CVE-2025-38313.html
* https://www.suse.com/security/cve/CVE-2025-38319.html
* https://www.suse.com/security/cve/CVE-2025-38323.html
* https://www.suse.com/security/cve/CVE-2025-38326.html
* https://www.suse.com/security/cve/CVE-2025-38328.html
* https://www.suse.com/security/cve/CVE-2025-38332.html
* https://www.suse.com/security/cve/CVE-2025-38334.html
* https://www.suse.com/security/cve/CVE-2025-38335.html
* https://www.suse.com/security/cve/CVE-2025-38336.html
* https://www.suse.com/security/cve/CVE-2025-38337.html
* https://www.suse.com/security/cve/CVE-2025-38338.html
* https://www.suse.com/security/cve/CVE-2025-38342.html
* https://www.suse.com/security/cve/CVE-2025-38343.html
* https://www.suse.com/security/cve/CVE-2025-38344.html
* https://www.suse.com/security/cve/CVE-2025-38345.html
* https://www.suse.com/security/cve/CVE-2025-38348.html
* https://www.suse.com/security/cve/CVE-2025-38349.html
* https://www.suse.com/security/cve/CVE-2025-38350.html
* https://www.suse.com/security/cve/CVE-2025-38352.html
* https://www.suse.com/security/cve/CVE-2025-38354.html
* https://www.suse.com/security/cve/CVE-2025-38362.html
* https://www.suse.com/security/cve/CVE-2025-38363.html
* https://www.suse.com/security/cve/CVE-2025-38364.html
* https://www.suse.com/security/cve/CVE-2025-38365.html
* https://www.suse.com/security/cve/CVE-2025-38369.html
* https://www.suse.com/security/cve/CVE-2025-38371.html
* https://www.suse.com/security/cve/CVE-2025-38373.html
* https://www.suse.com/security/cve/CVE-2025-38375.html
* https://www.suse.com/security/cve/CVE-2025-38376.html
* https://www.suse.com/security/cve/CVE-2025-38377.html
* https://www.suse.com/security/cve/CVE-2025-38380.html
* https://www.suse.com/security/cve/CVE-2025-38382.html
* https://www.suse.com/security/cve/CVE-2025-38384.html
* https://www.suse.com/security/cve/CVE-2025-38385.html
* https://www.suse.com/security/cve/CVE-2025-38386.html
* https://www.suse.com/security/cve/CVE-2025-38387.html
* https://www.suse.com/security/cve/CVE-2025-38389.html
* https://www.suse.com/security/cve/CVE-2025-38391.html
* https://www.suse.com/security/cve/CVE-2025-38392.html
* https://www.suse.com/security/cve/CVE-2025-38393.html
* https://www.suse.com/security/cve/CVE-2025-38395.html
* https://www.suse.com/security/cve/CVE-2025-38396.html
* https://www.suse.com/security/cve/CVE-2025-38399.html
* https://www.suse.com/security/cve/CVE-2025-38400.html
* https://www.suse.com/security/cve/CVE-2025-38401.html
* https://www.suse.com/security/cve/CVE-2025-38403.html
* https://www.suse.com/security/cve/CVE-2025-38404.html
* https://www.suse.com/security/cve/CVE-2025-38406.html
* https://www.suse.com/security/cve/CVE-2025-38409.html
* https://www.suse.com/security/cve/CVE-2025-38410.html
* https://www.suse.com/security/cve/CVE-2025-38412.html
* https://www.suse.com/security/cve/CVE-2025-38414.html
* https://www.suse.com/security/cve/CVE-2025-38415.html
* https://www.suse.com/security/cve/CVE-2025-38416.html
* https://www.suse.com/security/cve/CVE-2025-38420.html
* https://www.suse.com/security/cve/CVE-2025-38424.html
* https://www.suse.com/security/cve/CVE-2025-38425.html
* https://www.suse.com/security/cve/CVE-2025-38426.html
* https://www.suse.com/security/cve/CVE-2025-38428.html
* https://www.suse.com/security/cve/CVE-2025-38429.html
* https://www.suse.com/security/cve/CVE-2025-38430.html
* https://www.suse.com/security/cve/CVE-2025-38436.html
* https://www.suse.com/security/cve/CVE-2025-38443.html
* https://www.suse.com/security/cve/CVE-2025-38448.html
* https://www.suse.com/security/cve/CVE-2025-38449.html
* https://www.suse.com/security/cve/CVE-2025-38455.html
* https://www.suse.com/security/cve/CVE-2025-38457.html
* https://www.suse.com/security/cve/CVE-2025-38460.html
* https://www.suse.com/security/cve/CVE-2025-38461.html
* https://www.suse.com/security/cve/CVE-2025-38462.html
* https://www.suse.com/security/cve/CVE-2025-38463.html
* https://www.suse.com/security/cve/CVE-2025-38465.html
* https://www.suse.com/security/cve/CVE-2025-38467.html
* https://www.suse.com/security/cve/CVE-2025-38468.html
* https://www.suse.com/security/cve/CVE-2025-38470.html
* https://www.suse.com/security/cve/CVE-2025-38471.html
* https://www.suse.com/security/cve/CVE-2025-38473.html
* https://www.suse.com/security/cve/CVE-2025-38474.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38477.html
* https://www.suse.com/security/cve/CVE-2025-38478.html
* https://www.suse.com/security/cve/CVE-2025-38480.html
* https://www.suse.com/security/cve/CVE-2025-38481.html
* https://www.suse.com/security/cve/CVE-2025-38482.html
* https://www.suse.com/security/cve/CVE-2025-38483.html
* https://www.suse.com/security/cve/CVE-2025-38485.html
* https://www.suse.com/security/cve/CVE-2025-38487.html
* https://www.suse.com/security/cve/CVE-2025-38489.html
* https://www.suse.com/security/cve/CVE-2025-38494.html
* https://www.suse.com/security/cve/CVE-2025-38495.html
* https://www.suse.com/security/cve/CVE-2025-38496.html
* https://www.suse.com/security/cve/CVE-2025-38497.html
* https://www.suse.com/security/cve/CVE-2025-38498.html
* https://bugzilla.suse.com/show_bug.cgi?id=1139073
* https://bugzilla.suse.com/show_bug.cgi?id=1204142
* https://bugzilla.suse.com/show_bug.cgi?id=1219338
* https://bugzilla.suse.com/show_bug.cgi?id=1225707
* https://bugzilla.suse.com/show_bug.cgi?id=1230216
* https://bugzilla.suse.com/show_bug.cgi?id=1233300
* https://bugzilla.suse.com/show_bug.cgi?id=1235613
* https://bugzilla.suse.com/show_bug.cgi?id=1235837
* https://bugzilla.suse.com/show_bug.cgi?id=1236333
* https://bugzilla.suse.com/show_bug.cgi?id=1236897
* https://bugzilla.suse.com/show_bug.cgi?id=1238896
* https://bugzilla.suse.com/show_bug.cgi?id=1239061
* https://bugzilla.suse.com/show_bug.cgi?id=1239470
* https://bugzilla.suse.com/show_bug.cgi?id=1240323
* https://bugzilla.suse.com/show_bug.cgi?id=1240885
* https://bugzilla.suse.com/show_bug.cgi?id=1240966
* https://bugzilla.suse.com/show_bug.cgi?id=1241166
* https://bugzilla.suse.com/show_bug.cgi?id=1241345
* https://bugzilla.suse.com/show_bug.cgi?id=1241537
* https://bugzilla.suse.com/show_bug.cgi?id=1242086
* https://bugzilla.suse.com/show_bug.cgi?id=1242414
* https://bugzilla.suse.com/show_bug.cgi?id=1242837
* https://bugzilla.suse.com/show_bug.cgi?id=1242960
* https://bugzilla.suse.com/show_bug.cgi?id=1242965
* https://bugzilla.suse.com/show_bug.cgi?id=1242993
* https://bugzilla.suse.com/show_bug.cgi?id=1243068
* https://bugzilla.suse.com/show_bug.cgi?id=1243100
* https://bugzilla.suse.com/show_bug.cgi?id=1243479
* https://bugzilla.suse.com/show_bug.cgi?id=1243669
* https://bugzilla.suse.com/show_bug.cgi?id=1243806
* https://bugzilla.suse.com/show_bug.cgi?id=1244309
* https://bugzilla.suse.com/show_bug.cgi?id=1244337
* https://bugzilla.suse.com/show_bug.cgi?id=1244457
* https://bugzilla.suse.com/show_bug.cgi?id=1244735
* https://bugzilla.suse.com/show_bug.cgi?id=1244749
* https://bugzilla.suse.com/show_bug.cgi?id=1244750
* https://bugzilla.suse.com/show_bug.cgi?id=1244792
* https://bugzilla.suse.com/show_bug.cgi?id=1244801
* https://bugzilla.suse.com/show_bug.cgi?id=1245151
* https://bugzilla.suse.com/show_bug.cgi?id=1245201
* https://bugzilla.suse.com/show_bug.cgi?id=1245202
* https://bugzilla.suse.com/show_bug.cgi?id=1245216
* https://bugzilla.suse.com/show_bug.cgi?id=1245260
* https://bugzilla.suse.com/show_bug.cgi?id=1245431
* https://bugzilla.suse.com/show_bug.cgi?id=1245440
* https://bugzilla.suse.com/show_bug.cgi?id=1245457
* https://bugzilla.suse.com/show_bug.cgi?id=1245498
* https://bugzilla.suse.com/show_bug.cgi?id=1245499
* https://bugzilla.suse.com/show_bug.cgi?id=1245504
* https://bugzilla.suse.com/show_bug.cgi?id=1245506
* https://bugzilla.suse.com/show_bug.cgi?id=1245508
* https://bugzilla.suse.com/show_bug.cgi?id=1245510
* https://bugzilla.suse.com/show_bug.cgi?id=1245540
* https://bugzilla.suse.com/show_bug.cgi?id=1245598
* https://bugzilla.suse.com/show_bug.cgi?id=1245599
* https://bugzilla.suse.com/show_bug.cgi?id=1245646
* https://bugzilla.suse.com/show_bug.cgi?id=1245647
* https://bugzilla.suse.com/show_bug.cgi?id=1245649
* https://bugzilla.suse.com/show_bug.cgi?id=1245650
* https://bugzilla.suse.com/show_bug.cgi?id=1245654
* https://bugzilla.suse.com/show_bug.cgi?id=1245658
* https://bugzilla.suse.com/show_bug.cgi?id=1245660
* https://bugzilla.suse.com/show_bug.cgi?id=1245665
* https://bugzilla.suse.com/show_bug.cgi?id=1245666
* https://bugzilla.suse.com/show_bug.cgi?id=1245668
* https://bugzilla.suse.com/show_bug.cgi?id=1245669
* https://bugzilla.suse.com/show_bug.cgi?id=1245670
* https://bugzilla.suse.com/show_bug.cgi?id=1245671
* https://bugzilla.suse.com/show_bug.cgi?id=1245675
* https://bugzilla.suse.com/show_bug.cgi?id=1245676
* https://bugzilla.suse.com/show_bug.cgi?id=1245677
* https://bugzilla.suse.com/show_bug.cgi?id=1245679
* https://bugzilla.suse.com/show_bug.cgi?id=1245682
* https://bugzilla.suse.com/show_bug.cgi?id=1245683
* https://bugzilla.suse.com/show_bug.cgi?id=1245684
* https://bugzilla.suse.com/show_bug.cgi?id=1245688
* https://bugzilla.suse.com/show_bug.cgi?id=1245689
* https://bugzilla.suse.com/show_bug.cgi?id=1245690
* https://bugzilla.suse.com/show_bug.cgi?id=1245691
* https://bugzilla.suse.com/show_bug.cgi?id=1245695
* https://bugzilla.suse.com/show_bug.cgi?id=1245705
* https://bugzilla.suse.com/show_bug.cgi?id=1245708
* https://bugzilla.suse.com/show_bug.cgi?id=1245711
* https://bugzilla.suse.com/show_bug.cgi?id=1245713
* https://bugzilla.suse.com/show_bug.cgi?id=1245714
* https://bugzilla.suse.com/show_bug.cgi?id=1245719
* https://bugzilla.suse.com/show_bug.cgi?id=1245723
* https://bugzilla.suse.com/show_bug.cgi?id=1245729
* https://bugzilla.suse.com/show_bug.cgi?id=1245730
* https://bugzilla.suse.com/show_bug.cgi?id=1245731
* https://bugzilla.suse.com/show_bug.cgi?id=1245735
* https://bugzilla.suse.com/show_bug.cgi?id=1245737
* https://bugzilla.suse.com/show_bug.cgi?id=1245744
* https://bugzilla.suse.com/show_bug.cgi?id=1245745
* https://bugzilla.suse.com/show_bug.cgi?id=1245746
* https://bugzilla.suse.com/show_bug.cgi?id=1245747
* https://bugzilla.suse.com/show_bug.cgi?id=1245748
* https://bugzilla.suse.com/show_bug.cgi?id=1245749
* https://bugzilla.suse.com/show_bug.cgi?id=1245750
* https://bugzilla.suse.com/show_bug.cgi?id=1245751
* https://bugzilla.suse.com/show_bug.cgi?id=1245752
* https://bugzilla.suse.com/show_bug.cgi?id=1245757
* https://bugzilla.suse.com/show_bug.cgi?id=1245758
* https://bugzilla.suse.com/show_bug.cgi?id=1245765
* https://bugzilla.suse.com/show_bug.cgi?id=1245768
* https://bugzilla.suse.com/show_bug.cgi?id=1245769
* https://bugzilla.suse.com/show_bug.cgi?id=1245777
* https://bugzilla.suse.com/show_bug.cgi?id=1245781
* https://bugzilla.suse.com/show_bug.cgi?id=1245789
* https://bugzilla.suse.com/show_bug.cgi?id=1245937
* https://bugzilla.suse.com/show_bug.cgi?id=1245945
* https://bugzilla.suse.com/show_bug.cgi?id=1245951
* https://bugzilla.suse.com/show_bug.cgi?id=1245952
* https://bugzilla.suse.com/show_bug.cgi?id=1245954
* https://bugzilla.suse.com/show_bug.cgi?id=1245957
* https://bugzilla.suse.com/show_bug.cgi?id=1245966
* https://bugzilla.suse.com/show_bug.cgi?id=1245970
* https://bugzilla.suse.com/show_bug.cgi?id=1245976
* https://bugzilla.suse.com/show_bug.cgi?id=1245980
* https://bugzilla.suse.com/show_bug.cgi?id=1245983
* https://bugzilla.suse.com/show_bug.cgi?id=1245986
* https://bugzilla.suse.com/show_bug.cgi?id=1246000
* https://bugzilla.suse.com/show_bug.cgi?id=1246002
* https://bugzilla.suse.com/show_bug.cgi?id=1246006
* https://bugzilla.suse.com/show_bug.cgi?id=1246008
* https://bugzilla.suse.com/show_bug.cgi?id=1246020
* https://bugzilla.suse.com/show_bug.cgi?id=1246023
* https://bugzilla.suse.com/show_bug.cgi?id=1246029
* https://bugzilla.suse.com/show_bug.cgi?id=1246031
* https://bugzilla.suse.com/show_bug.cgi?id=1246037
* https://bugzilla.suse.com/show_bug.cgi?id=1246041
* https://bugzilla.suse.com/show_bug.cgi?id=1246042
* https://bugzilla.suse.com/show_bug.cgi?id=1246044
* https://bugzilla.suse.com/show_bug.cgi?id=1246045
* https://bugzilla.suse.com/show_bug.cgi?id=1246047
* https://bugzilla.suse.com/show_bug.cgi?id=1246049
* https://bugzilla.suse.com/show_bug.cgi?id=1246050
* https://bugzilla.suse.com/show_bug.cgi?id=1246055
* https://bugzilla.suse.com/show_bug.cgi?id=1246073
* https://bugzilla.suse.com/show_bug.cgi?id=1246093
* https://bugzilla.suse.com/show_bug.cgi?id=1246098
* https://bugzilla.suse.com/show_bug.cgi?id=1246109
* https://bugzilla.suse.com/show_bug.cgi?id=1246122
* https://bugzilla.suse.com/show_bug.cgi?id=1246125
* https://bugzilla.suse.com/show_bug.cgi?id=1246171
* https://bugzilla.suse.com/show_bug.cgi?id=1246173
* https://bugzilla.suse.com/show_bug.cgi?id=1246178
* https://bugzilla.suse.com/show_bug.cgi?id=1246182
* https://bugzilla.suse.com/show_bug.cgi?id=1246183
* https://bugzilla.suse.com/show_bug.cgi?id=1246186
* https://bugzilla.suse.com/show_bug.cgi?id=1246195
* https://bugzilla.suse.com/show_bug.cgi?id=1246203
* https://bugzilla.suse.com/show_bug.cgi?id=1246212
* https://bugzilla.suse.com/show_bug.cgi?id=1246220
* https://bugzilla.suse.com/show_bug.cgi?id=1246236
* https://bugzilla.suse.com/show_bug.cgi?id=1246240
* https://bugzilla.suse.com/show_bug.cgi?id=1246243
* https://bugzilla.suse.com/show_bug.cgi?id=1246246
* https://bugzilla.suse.com/show_bug.cgi?id=1246249
* https://bugzilla.suse.com/show_bug.cgi?id=1246250
* https://bugzilla.suse.com/show_bug.cgi?id=1246253
* https://bugzilla.suse.com/show_bug.cgi?id=1246258
* https://bugzilla.suse.com/show_bug.cgi?id=1246262
* https://bugzilla.suse.com/show_bug.cgi?id=1246264
* https://bugzilla.suse.com/show_bug.cgi?id=1246266
* https://bugzilla.suse.com/show_bug.cgi?id=1246268
* https://bugzilla.suse.com/show_bug.cgi?id=1246273
* https://bugzilla.suse.com/show_bug.cgi?id=1246283
* https://bugzilla.suse.com/show_bug.cgi?id=1246287
* https://bugzilla.suse.com/show_bug.cgi?id=1246292
* https://bugzilla.suse.com/show_bug.cgi?id=1246293
* https://bugzilla.suse.com/show_bug.cgi?id=1246295
* https://bugzilla.suse.com/show_bug.cgi?id=1246334
* https://bugzilla.suse.com/show_bug.cgi?id=1246337
* https://bugzilla.suse.com/show_bug.cgi?id=1246342
* https://bugzilla.suse.com/show_bug.cgi?id=1246349
* https://bugzilla.suse.com/show_bug.cgi?id=1246354
* https://bugzilla.suse.com/show_bug.cgi?id=1246358
* https://bugzilla.suse.com/show_bug.cgi?id=1246361
* https://bugzilla.suse.com/show_bug.cgi?id=1246364
* https://bugzilla.suse.com/show_bug.cgi?id=1246370
* https://bugzilla.suse.com/show_bug.cgi?id=1246375
* https://bugzilla.suse.com/show_bug.cgi?id=1246384
* https://bugzilla.suse.com/show_bug.cgi?id=1246386
* https://bugzilla.suse.com/show_bug.cgi?id=1246387
* https://bugzilla.suse.com/show_bug.cgi?id=1246438
* https://bugzilla.suse.com/show_bug.cgi?id=1246453
* https://bugzilla.suse.com/show_bug.cgi?id=1246473
* https://bugzilla.suse.com/show_bug.cgi?id=1246490
* https://bugzilla.suse.com/show_bug.cgi?id=1246506
* https://bugzilla.suse.com/show_bug.cgi?id=1246547
* https://bugzilla.suse.com/show_bug.cgi?id=1246777
* https://bugzilla.suse.com/show_bug.cgi?id=1246781
* https://bugzilla.suse.com/show_bug.cgi?id=1246870
* https://bugzilla.suse.com/show_bug.cgi?id=1246879
* https://bugzilla.suse.com/show_bug.cgi?id=1246911
* https://bugzilla.suse.com/show_bug.cgi?id=1247018
* https://bugzilla.suse.com/show_bug.cgi?id=1247023
* https://bugzilla.suse.com/show_bug.cgi?id=1247028
* https://bugzilla.suse.com/show_bug.cgi?id=1247031
* https://bugzilla.suse.com/show_bug.cgi?id=1247033
* https://bugzilla.suse.com/show_bug.cgi?id=1247035
* https://bugzilla.suse.com/show_bug.cgi?id=1247061
* https://bugzilla.suse.com/show_bug.cgi?id=1247089
* https://bugzilla.suse.com/show_bug.cgi?id=1247091
* https://bugzilla.suse.com/show_bug.cgi?id=1247097
* https://bugzilla.suse.com/show_bug.cgi?id=1247098
* https://bugzilla.suse.com/show_bug.cgi?id=1247101
* https://bugzilla.suse.com/show_bug.cgi?id=1247103
* https://bugzilla.suse.com/show_bug.cgi?id=1247104
* https://bugzilla.suse.com/show_bug.cgi?id=1247113
* https://bugzilla.suse.com/show_bug.cgi?id=1247118
* https://bugzilla.suse.com/show_bug.cgi?id=1247123
* https://bugzilla.suse.com/show_bug.cgi?id=1247125
* https://bugzilla.suse.com/show_bug.cgi?id=1247128
* https://bugzilla.suse.com/show_bug.cgi?id=1247132
* https://bugzilla.suse.com/show_bug.cgi?id=1247138
* https://bugzilla.suse.com/show_bug.cgi?id=1247141
* https://bugzilla.suse.com/show_bug.cgi?id=1247143
* https://bugzilla.suse.com/show_bug.cgi?id=1247145
* https://bugzilla.suse.com/show_bug.cgi?id=1247146
* https://bugzilla.suse.com/show_bug.cgi?id=1247147
* https://bugzilla.suse.com/show_bug.cgi?id=1247149
* https://bugzilla.suse.com/show_bug.cgi?id=1247150
* https://bugzilla.suse.com/show_bug.cgi?id=1247151
* https://bugzilla.suse.com/show_bug.cgi?id=1247153
* https://bugzilla.suse.com/show_bug.cgi?id=1247154
* https://bugzilla.suse.com/show_bug.cgi?id=1247156
* https://bugzilla.suse.com/show_bug.cgi?id=1247160
* https://bugzilla.suse.com/show_bug.cgi?id=1247164
* https://bugzilla.suse.com/show_bug.cgi?id=1247169
* https://bugzilla.suse.com/show_bug.cgi?id=1247170
* https://bugzilla.suse.com/show_bug.cgi?id=1247171
* https://bugzilla.suse.com/show_bug.cgi?id=1247172
* https://bugzilla.suse.com/show_bug.cgi?id=1247174
* https://bugzilla.suse.com/show_bug.cgi?id=1247176
* https://bugzilla.suse.com/show_bug.cgi?id=1247177
* https://bugzilla.suse.com/show_bug.cgi?id=1247178
* https://bugzilla.suse.com/show_bug.cgi?id=1247181
* https://bugzilla.suse.com/show_bug.cgi?id=1247209
* https://bugzilla.suse.com/show_bug.cgi?id=1247210
* https://bugzilla.suse.com/show_bug.cgi?id=1247227
* https://bugzilla.suse.com/show_bug.cgi?id=1247233
* https://bugzilla.suse.com/show_bug.cgi?id=1247236
* https://bugzilla.suse.com/show_bug.cgi?id=1247238
* https://bugzilla.suse.com/show_bug.cgi?id=1247241
* https://bugzilla.suse.com/show_bug.cgi?id=1247251
* https://bugzilla.suse.com/show_bug.cgi?id=1247252
* https://bugzilla.suse.com/show_bug.cgi?id=1247253
* https://bugzilla.suse.com/show_bug.cgi?id=1247255
* https://bugzilla.suse.com/show_bug.cgi?id=1247271
* https://bugzilla.suse.com/show_bug.cgi?id=1247273
* https://bugzilla.suse.com/show_bug.cgi?id=1247274
* https://bugzilla.suse.com/show_bug.cgi?id=1247276
* https://bugzilla.suse.com/show_bug.cgi?id=1247277
* https://bugzilla.suse.com/show_bug.cgi?id=1247278
* https://bugzilla.suse.com/show_bug.cgi?id=1247279
* https://bugzilla.suse.com/show_bug.cgi?id=1247284
* https://bugzilla.suse.com/show_bug.cgi?id=1247285
* https://bugzilla.suse.com/show_bug.cgi?id=1247288
* https://bugzilla.suse.com/show_bug.cgi?id=1247289
* https://bugzilla.suse.com/show_bug.cgi?id=1247293
* https://bugzilla.suse.com/show_bug.cgi?id=1247311
* https://bugzilla.suse.com/show_bug.cgi?id=1247314
* https://bugzilla.suse.com/show_bug.cgi?id=1247317
* https://bugzilla.suse.com/show_bug.cgi?id=1247347
* https://bugzilla.suse.com/show_bug.cgi?id=1247348
* https://bugzilla.suse.com/show_bug.cgi?id=1247349
* https://bugzilla.suse.com/show_bug.cgi?id=1247374
* https://bugzilla.suse.com/show_bug.cgi?id=1247437
* https://bugzilla.suse.com/show_bug.cgi?id=1247450



openSUSE-SU-2025:0315-1: important: Security update for proftpd


openSUSE Security Update: Security update for proftpd
_______________________________

Announcement ID: openSUSE-SU-2025:0315-1
Rating: important
References: #1233997 #1236889
Cross-References: CVE-2024-48651 CVE-2024-57392
CVSS scores:
CVE-2024-48651 (SUSE): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVE-2024-57392 (SUSE): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP6
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for proftpd fixes the following issues:

- CVE-2024-57392: Null pointer dereference vulnerability by sending a
maliciously crafted message (boo#1236889).
- CVE-2024-48651: Supplemental group inheritance grants unintended access
to GID 0 (boo#1233997).

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2025-315=1

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-315=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 i586 ppc64le s390x x86_64):

proftpd-1.3.8d-bp157.2.3.1
proftpd-debuginfo-1.3.8d-bp157.2.3.1
proftpd-debugsource-1.3.8d-bp157.2.3.1
proftpd-devel-1.3.8d-bp157.2.3.1
proftpd-doc-1.3.8d-bp157.2.3.1
proftpd-ldap-1.3.8d-bp157.2.3.1
proftpd-ldap-debuginfo-1.3.8d-bp157.2.3.1
proftpd-mysql-1.3.8d-bp157.2.3.1
proftpd-mysql-debuginfo-1.3.8d-bp157.2.3.1
proftpd-pgsql-1.3.8d-bp157.2.3.1
proftpd-pgsql-debuginfo-1.3.8d-bp157.2.3.1
proftpd-radius-1.3.8d-bp157.2.3.1
proftpd-radius-debuginfo-1.3.8d-bp157.2.3.1
proftpd-sqlite-1.3.8d-bp157.2.3.1
proftpd-sqlite-debuginfo-1.3.8d-bp157.2.3.1

- openSUSE Backports SLE-15-SP7 (noarch):

proftpd-lang-1.3.8d-bp157.2.3.1

- openSUSE Backports SLE-15-SP6 (aarch64 i586 ppc64le s390x x86_64):

proftpd-1.3.8d-bp156.2.6.1
proftpd-devel-1.3.8d-bp156.2.6.1
proftpd-doc-1.3.8d-bp156.2.6.1
proftpd-ldap-1.3.8d-bp156.2.6.1
proftpd-mysql-1.3.8d-bp156.2.6.1
proftpd-pgsql-1.3.8d-bp156.2.6.1
proftpd-radius-1.3.8d-bp156.2.6.1
proftpd-sqlite-1.3.8d-bp156.2.6.1

- openSUSE Backports SLE-15-SP6 (noarch):

proftpd-lang-1.3.8d-bp156.2.6.1

References:

https://www.suse.com/security/cve/CVE-2024-48651.html
https://www.suse.com/security/cve/CVE-2024-57392.html
https://bugzilla.suse.com/1233997
https://bugzilla.suse.com/1236889



SUSE-SU-2025:02970-1: moderate: Security update for pam


# Security update for pam

Announcement ID: SUSE-SU-2025:02970-1
Release Date: 2025-08-25T08:28:24Z
Rating: moderate
References:

* bsc#1232234
* bsc#1246221

Cross-References:

* CVE-2024-10041

CVSS scores:

* CVE-2024-10041 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-10041 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-10041 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* Development Tools Module 15-SP6
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability and has one security fix can now be
installed.

## Description:

This update for pam fixes the following issues:

* Improve previous CVE-2024-10041 fix which led to CPU performance issues
(bsc#1232234)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2970=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2970=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2970=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2970=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2970=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2970=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2970=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2970=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2970=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2970=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2970=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2970=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2970=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* pam-devel-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-extra-1.3.0-150000.6.86.1
* pam-extra-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* openSUSE Leap 15.6 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.86.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1
* pam-32bit-1.3.0-150000.6.86.1
* pam-32bit-debuginfo-1.3.0-150000.6.86.1
* pam-extra-32bit-1.3.0-150000.6.86.1
* openSUSE Leap 15.6 (noarch)
* pam-doc-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* pam-devel-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-extra-1.3.0-150000.6.86.1
* pam-extra-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* Basesystem Module 15-SP6 (noarch)
* pam-doc-1.3.0-150000.6.86.1
* Basesystem Module 15-SP6 (x86_64)
* pam-32bit-1.3.0-150000.6.86.1
* pam-32bit-debuginfo-1.3.0-150000.6.86.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1
* pam-extra-32bit-1.3.0-150000.6.86.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* pam-devel-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-extra-1.3.0-150000.6.86.1
* pam-extra-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* Basesystem Module 15-SP7 (noarch)
* pam-doc-1.3.0-150000.6.86.1
* Basesystem Module 15-SP7 (x86_64)
* pam-32bit-1.3.0-150000.6.86.1
* pam-32bit-debuginfo-1.3.0-150000.6.86.1
* pam-extra-32bit-debuginfo-1.3.0-150000.6.86.1
* pam-extra-32bit-1.3.0-150000.6.86.1
* Development Tools Module 15-SP6 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.86.1
* pam-32bit-debuginfo-1.3.0-150000.6.86.1
* Development Tools Module 15-SP7 (x86_64)
* pam-devel-32bit-1.3.0-150000.6.86.1
* pam-32bit-debuginfo-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* pam-debuginfo-1.3.0-150000.6.86.1
* pam-debugsource-1.3.0-150000.6.86.1
* pam-1.3.0-150000.6.86.1

## References:

* https://www.suse.com/security/cve/CVE-2024-10041.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232234
* https://bugzilla.suse.com/show_bug.cgi?id=1246221



SUSE-SU-2025:02975-1: low: Security update for cmake3


# Security update for cmake3

Announcement ID: SUSE-SU-2025:02975-1
Release Date: 2025-08-25T10:42:20Z
Rating: low
References:

* bsc#1248461

Cross-References:

* CVE-2025-9301

CVSS scores:

* CVE-2025-9301 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-9301 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-9301 ( NVD ): 1.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-9301 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.6

An update that solves one vulnerability can now be installed.

## Description:

This update for cmake3 fixes the following issues:

* CVE-2025-9301: Fixed assertion failure due to improper validation
(bsc#1248461)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2975=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* cmake3-full-debugsource-3.20.0-150200.6.6.1
* cmake3-full-debuginfo-3.20.0-150200.6.6.1
* cmake3-full-3.20.0-150200.6.6.1
* cmake3-3.20.0-150200.6.6.1

## References:

* https://www.suse.com/security/cve/CVE-2025-9301.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248461



SUSE-SU-2025:02972-1: moderate: Security update for ffmpeg-4


# Security update for ffmpeg-4

Announcement ID: SUSE-SU-2025:02972-1
Release Date: 2025-08-25T08:46:44Z
Rating: moderate
References:

* bsc#1234018
* bsc#1234019
* bsc#1234020
* bsc#1245313
* bsc#1246790

Cross-References:

* CVE-2024-36618
* CVE-2025-7700

CVSS scores:

* CVE-2024-36618 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-36618 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
* CVE-2024-36618 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-7700 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-7700 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves two vulnerabilities and has three security fixes can now
be installed.

## Description:

This update for ffmpeg-4 fixes the following issues:

* CVE-2024-36618: Fixed integer overflow iff ULONG_MAX < INT64_MAX
(bsc#1234020).
* CVE-2025-7700: Fixed potential NULL pointer dereference (bsc#1246790).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2972=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2972=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2972=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2972=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2972=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* ffmpeg-4-4.4.6-150400.3.52.1
* ffmpeg-4-private-devel-4.4.6-150400.3.52.1
* libswscale5_9-4.4.6-150400.3.52.1
* libavformat58_76-4.4.6-150400.3.52.1
* ffmpeg-4-libavdevice-devel-4.4.6-150400.3.52.1
* libavformat58_76-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-debuginfo-4.4.6-150400.3.52.1
* libavcodec58_134-4.4.6-150400.3.52.1
* ffmpeg-4-libswresample-devel-4.4.6-150400.3.52.1
* ffmpeg-4-libavutil-devel-4.4.6-150400.3.52.1
* libavdevice58_13-debuginfo-4.4.6-150400.3.52.1
* ffmpeg-4-debugsource-4.4.6-150400.3.52.1
* libavutil56_70-4.4.6-150400.3.52.1
* ffmpeg-4-libavresample-devel-4.4.6-150400.3.52.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.52.1
* libswresample3_9-debuginfo-4.4.6-150400.3.52.1
* ffmpeg-4-libpostproc-devel-4.4.6-150400.3.52.1
* libavdevice58_13-4.4.6-150400.3.52.1
* libpostproc55_9-4.4.6-150400.3.52.1
* libavresample4_0-debuginfo-4.4.6-150400.3.52.1
* libavfilter7_110-debuginfo-4.4.6-150400.3.52.1
* ffmpeg-4-libavfilter-devel-4.4.6-150400.3.52.1
* libpostproc55_9-debuginfo-4.4.6-150400.3.52.1
* libswresample3_9-4.4.6-150400.3.52.1
* ffmpeg-4-libswscale-devel-4.4.6-150400.3.52.1
* ffmpeg-4-libavcodec-devel-4.4.6-150400.3.52.1
* libavfilter7_110-4.4.6-150400.3.52.1
* ffmpeg-4-libavformat-devel-4.4.6-150400.3.52.1
* libswscale5_9-debuginfo-4.4.6-150400.3.52.1
* libavresample4_0-4.4.6-150400.3.52.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.52.1
* openSUSE Leap 15.4 (x86_64)
* libpostproc55_9-32bit-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-32bit-4.4.6-150400.3.52.1
* libswresample3_9-32bit-4.4.6-150400.3.52.1
* libavformat58_76-32bit-4.4.6-150400.3.52.1
* libswresample3_9-32bit-debuginfo-4.4.6-150400.3.52.1
* libavdevice58_13-32bit-4.4.6-150400.3.52.1
* libavformat58_76-32bit-debuginfo-4.4.6-150400.3.52.1
* libavfilter7_110-32bit-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-32bit-4.4.6-150400.3.52.1
* libavresample4_0-32bit-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-32bit-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-32bit-debuginfo-4.4.6-150400.3.52.1
* libavdevice58_13-32bit-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-32bit-4.4.6-150400.3.52.1
* libavcodec58_134-32bit-debuginfo-4.4.6-150400.3.52.1
* libavfilter7_110-32bit-4.4.6-150400.3.52.1
* libavcodec58_134-32bit-4.4.6-150400.3.52.1
* libavresample4_0-32bit-4.4.6-150400.3.52.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libavutil56_70-64bit-debuginfo-4.4.6-150400.3.52.1
* libavfilter7_110-64bit-4.4.6-150400.3.52.1
* libswresample3_9-64bit-4.4.6-150400.3.52.1
* libavformat58_76-64bit-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-64bit-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-64bit-4.4.6-150400.3.52.1
* libswscale5_9-64bit-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-64bit-4.4.6-150400.3.52.1
* libswresample3_9-64bit-debuginfo-4.4.6-150400.3.52.1
* libavcodec58_134-64bit-debuginfo-4.4.6-150400.3.52.1
* libavformat58_76-64bit-4.4.6-150400.3.52.1
* libavfilter7_110-64bit-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-64bit-4.4.6-150400.3.52.1
* libavdevice58_13-64bit-debuginfo-4.4.6-150400.3.52.1
* libavcodec58_134-64bit-4.4.6-150400.3.52.1
* libavdevice58_13-64bit-4.4.6-150400.3.52.1
* libavresample4_0-64bit-debuginfo-4.4.6-150400.3.52.1
* libavresample4_0-64bit-4.4.6-150400.3.52.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libpostproc55_9-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-4.4.6-150400.3.52.1
* ffmpeg-4-debugsource-4.4.6-150400.3.52.1
* libavutil56_70-4.4.6-150400.3.52.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-4.4.6-150400.3.52.1
* libavformat58_76-4.4.6-150400.3.52.1
* libswresample3_9-debuginfo-4.4.6-150400.3.52.1
* libavformat58_76-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-debuginfo-4.4.6-150400.3.52.1
* libswresample3_9-4.4.6-150400.3.52.1
* libavcodec58_134-4.4.6-150400.3.52.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.52.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libpostproc55_9-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-4.4.6-150400.3.52.1
* ffmpeg-4-debugsource-4.4.6-150400.3.52.1
* libavutil56_70-4.4.6-150400.3.52.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-4.4.6-150400.3.52.1
* libavformat58_76-4.4.6-150400.3.52.1
* libswresample3_9-debuginfo-4.4.6-150400.3.52.1
* libavformat58_76-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-debuginfo-4.4.6-150400.3.52.1
* libswresample3_9-4.4.6-150400.3.52.1
* libavcodec58_134-4.4.6-150400.3.52.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.52.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libpostproc55_9-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-4.4.6-150400.3.52.1
* ffmpeg-4-debugsource-4.4.6-150400.3.52.1
* libavutil56_70-4.4.6-150400.3.52.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-4.4.6-150400.3.52.1
* libavformat58_76-4.4.6-150400.3.52.1
* libswresample3_9-debuginfo-4.4.6-150400.3.52.1
* libavformat58_76-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-debuginfo-4.4.6-150400.3.52.1
* libswresample3_9-4.4.6-150400.3.52.1
* libavcodec58_134-4.4.6-150400.3.52.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.52.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libpostproc55_9-debuginfo-4.4.6-150400.3.52.1
* libpostproc55_9-4.4.6-150400.3.52.1
* ffmpeg-4-debugsource-4.4.6-150400.3.52.1
* libavutil56_70-4.4.6-150400.3.52.1
* libavcodec58_134-debuginfo-4.4.6-150400.3.52.1
* libswscale5_9-4.4.6-150400.3.52.1
* libavformat58_76-4.4.6-150400.3.52.1
* libswresample3_9-debuginfo-4.4.6-150400.3.52.1
* libavformat58_76-debuginfo-4.4.6-150400.3.52.1
* libavutil56_70-debuginfo-4.4.6-150400.3.52.1
* libswresample3_9-4.4.6-150400.3.52.1
* libavcodec58_134-4.4.6-150400.3.52.1
* ffmpeg-4-debuginfo-4.4.6-150400.3.52.1

## References:

* https://www.suse.com/security/cve/CVE-2024-36618.html
* https://www.suse.com/security/cve/CVE-2025-7700.html
* https://bugzilla.suse.com/show_bug.cgi?id=1234018
* https://bugzilla.suse.com/show_bug.cgi?id=1234019
* https://bugzilla.suse.com/show_bug.cgi?id=1234020
* https://bugzilla.suse.com/show_bug.cgi?id=1245313
* https://bugzilla.suse.com/show_bug.cgi?id=1246790