SUSE-SU-2025:1164-1: important: Security update for giflib
SUSE-SU-2025:1177-1: important: Security update for the Linux Kernel
SUSE-SU-2025:1172-1: moderate: Security update for poppler
SUSE-SU-2025:1173-1: moderate: Security update for poppler
SUSE-SU-2025:1176-1: important: Security update for the Linux Kernel
SUSE-SU-2025:1178-1: important: Security update for the Linux Kernel
SUSE-SU-2025:1164-1: important: Security update for giflib
# Security update for giflib
Announcement ID: SUSE-SU-2025:1164-1
Release Date: 2025-04-08T07:03:34Z
Rating: important
References:
* bsc#1240416
Cross-References:
* CVE-2025-31344
CVSS scores:
Affected Products:
* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for giflib fixes the following issues:
* CVE-2025-31344: Fixed a buffer overflow in function DumpScreen2RGB
(bsc#1240416)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1164=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1164=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1164=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1164=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1164=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1164=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1164=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1164=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1164=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-1164=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1164=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-1164=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-1164=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1164=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1164=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1164=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1164=1
## Package List:
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Manager Proxy 4.3 (x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* giflib-debugsource-5.2.2-150000.4.16.1
* giflib-progs-debuginfo-5.2.2-150000.4.16.1
* giflib-devel-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* giflib-progs-5.2.2-150000.4.16.1
* openSUSE Leap 15.6 (x86_64)
* libgif7-32bit-debuginfo-5.2.2-150000.4.16.1
* libgif7-32bit-5.2.2-150000.4.16.1
* giflib-devel-32bit-5.2.2-150000.4.16.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* giflib-devel-5.2.2-150000.4.16.1
* giflib-debugsource-5.2.2-150000.4.16.1
* libgif7-5.2.2-150000.4.16.1
* libgif7-debuginfo-5.2.2-150000.4.16.1
## References:
* https://www.suse.com/security/cve/CVE-2025-31344.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240416
SUSE-SU-2025:1177-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:1177-1
Release Date: 2025-04-08T15:36:35Z
Rating: important
References:
* bsc#1207948
* bsc#1215199
* bsc#1215211
* bsc#1218470
* bsc#1221651
* bsc#1222649
* bsc#1223047
* bsc#1224489
* bsc#1224610
* bsc#1225533
* bsc#1225742
* bsc#1225770
* bsc#1226871
* bsc#1227858
* bsc#1228653
* bsc#1229311
* bsc#1229361
* bsc#1230497
* bsc#1230728
* bsc#1230769
* bsc#1230832
* bsc#1231293
* bsc#1231432
* bsc#1232364
* bsc#1232389
* bsc#1232421
* bsc#1232743
* bsc#1232812
* bsc#1232848
* bsc#1232895
* bsc#1233033
* bsc#1233060
* bsc#1233259
* bsc#1233260
* bsc#1233479
* bsc#1233551
* bsc#1233557
* bsc#1233749
* bsc#1234222
* bsc#1234480
* bsc#1234828
* bsc#1234936
* bsc#1235436
* bsc#1235455
* bsc#1235501
* bsc#1235524
* bsc#1235589
* bsc#1235591
* bsc#1235621
* bsc#1235637
* bsc#1235698
* bsc#1235711
* bsc#1235712
* bsc#1235715
* bsc#1235729
* bsc#1235733
* bsc#1235761
* bsc#1235870
* bsc#1235973
* bsc#1236099
* bsc#1236111
* bsc#1236206
* bsc#1236333
* bsc#1236692
* bsc#1237029
* bsc#1237164
* bsc#1237313
* bsc#1237530
* bsc#1237558
* bsc#1237562
* bsc#1237565
* bsc#1237571
* bsc#1237853
* bsc#1237856
* bsc#1237873
* bsc#1237875
* bsc#1237876
* bsc#1237877
* bsc#1237881
* bsc#1237885
* bsc#1237890
* bsc#1237894
* bsc#1237897
* bsc#1237900
* bsc#1237906
* bsc#1237907
* bsc#1237911
* bsc#1237912
* bsc#1237950
* bsc#1238212
* bsc#1238474
* bsc#1238475
* bsc#1238479
* bsc#1238497
* bsc#1238500
* bsc#1238501
* bsc#1238502
* bsc#1238503
* bsc#1238506
* bsc#1238507
* bsc#1238510
* bsc#1238511
* bsc#1238512
* bsc#1238523
* bsc#1238526
* bsc#1238528
* bsc#1238529
* bsc#1238531
* bsc#1238532
* bsc#1238715
* bsc#1238716
* bsc#1238734
* bsc#1238735
* bsc#1238736
* bsc#1238738
* bsc#1238747
* bsc#1238754
* bsc#1238757
* bsc#1238760
* bsc#1238762
* bsc#1238763
* bsc#1238767
* bsc#1238768
* bsc#1238771
* bsc#1238772
* bsc#1238773
* bsc#1238775
* bsc#1238780
* bsc#1238781
* bsc#1238785
* bsc#1238864
* bsc#1238865
* bsc#1238876
* bsc#1238903
* bsc#1238904
* bsc#1238905
* bsc#1238909
* bsc#1238911
* bsc#1238917
* bsc#1238958
* bsc#1238959
* bsc#1238963
* bsc#1238964
* bsc#1238969
* bsc#1238971
* bsc#1238973
* bsc#1238975
* bsc#1238978
* bsc#1238979
* bsc#1238981
* bsc#1238984
* bsc#1238986
* bsc#1238993
* bsc#1238994
* bsc#1238997
* bsc#1239015
* bsc#1239016
* bsc#1239027
* bsc#1239029
* bsc#1239030
* bsc#1239033
* bsc#1239034
* bsc#1239036
* bsc#1239037
* bsc#1239038
* bsc#1239039
* bsc#1239045
* bsc#1239065
* bsc#1239068
* bsc#1239073
* bsc#1239076
* bsc#1239080
* bsc#1239085
* bsc#1239087
* bsc#1239095
* bsc#1239104
* bsc#1239105
* bsc#1239109
* bsc#1239112
* bsc#1239114
* bsc#1239115
* bsc#1239117
* bsc#1239167
* bsc#1239174
* bsc#1239346
* bsc#1239349
* bsc#1239435
* bsc#1239467
* bsc#1239468
* bsc#1239471
* bsc#1239473
* bsc#1239474
* bsc#1239477
* bsc#1239478
* bsc#1239479
* bsc#1239481
* bsc#1239482
* bsc#1239483
* bsc#1239484
* bsc#1239486
* bsc#1239508
* bsc#1239512
* bsc#1239518
* bsc#1239573
* bsc#1239594
* bsc#1239595
* bsc#1239600
* bsc#1239605
* bsc#1239615
* bsc#1239644
* bsc#1239707
* bsc#1239986
* bsc#1239994
* bsc#1240169
* bsc#1240172
* bsc#1240173
* bsc#1240175
* bsc#1240177
* bsc#1240179
* bsc#1240182
* bsc#1240183
* bsc#1240186
* bsc#1240188
* bsc#1240189
* bsc#1240191
* bsc#1240192
* bsc#1240333
* bsc#1240334
* jsc#PED-10701
* jsc#PED-12251
* jsc#PED-12416
Cross-References:
* CVE-2023-52831
* CVE-2023-52926
* CVE-2023-52927
* CVE-2024-26634
* CVE-2024-26873
* CVE-2024-35826
* CVE-2024-35910
* CVE-2024-38606
* CVE-2024-41005
* CVE-2024-41077
* CVE-2024-41149
* CVE-2024-42307
* CVE-2024-43820
* CVE-2024-46736
* CVE-2024-46782
* CVE-2024-46796
* CVE-2024-47408
* CVE-2024-47794
* CVE-2024-49571
* CVE-2024-49924
* CVE-2024-49940
* CVE-2024-49994
* CVE-2024-50056
* CVE-2024-50126
* CVE-2024-50140
* CVE-2024-50152
* CVE-2024-50290
* CVE-2024-52559
* CVE-2024-53057
* CVE-2024-53063
* CVE-2024-53140
* CVE-2024-53163
* CVE-2024-53680
* CVE-2024-54683
* CVE-2024-56638
* CVE-2024-56640
* CVE-2024-56702
* CVE-2024-56703
* CVE-2024-56718
* CVE-2024-56719
* CVE-2024-56751
* CVE-2024-56758
* CVE-2024-56770
* CVE-2024-57807
* CVE-2024-57834
* CVE-2024-57900
* CVE-2024-57947
* CVE-2024-57973
* CVE-2024-57974
* CVE-2024-57978
* CVE-2024-57980
* CVE-2024-57981
* CVE-2024-57986
* CVE-2024-57990
* CVE-2024-57993
* CVE-2024-57996
* CVE-2024-57997
* CVE-2024-57999
* CVE-2024-58002
* CVE-2024-58005
* CVE-2024-58006
* CVE-2024-58007
* CVE-2024-58009
* CVE-2024-58011
* CVE-2024-58012
* CVE-2024-58013
* CVE-2024-58014
* CVE-2024-58017
* CVE-2024-58019
* CVE-2024-58020
* CVE-2024-58034
* CVE-2024-58051
* CVE-2024-58052
* CVE-2024-58054
* CVE-2024-58055
* CVE-2024-58056
* CVE-2024-58057
* CVE-2024-58058
* CVE-2024-58061
* CVE-2024-58063
* CVE-2024-58069
* CVE-2024-58072
* CVE-2024-58076
* CVE-2024-58078
* CVE-2024-58079
* CVE-2024-58080
* CVE-2024-58083
* CVE-2024-58085
* CVE-2024-58086
* CVE-2025-21631
* CVE-2025-21635
* CVE-2025-21659
* CVE-2025-21671
* CVE-2025-21693
* CVE-2025-21701
* CVE-2025-21703
* CVE-2025-21704
* CVE-2025-21706
* CVE-2025-21708
* CVE-2025-21711
* CVE-2025-21714
* CVE-2025-21718
* CVE-2025-21723
* CVE-2025-21726
* CVE-2025-21727
* CVE-2025-21731
* CVE-2025-21732
* CVE-2025-21734
* CVE-2025-21735
* CVE-2025-21736
* CVE-2025-21738
* CVE-2025-21739
* CVE-2025-21741
* CVE-2025-21742
* CVE-2025-21743
* CVE-2025-21744
* CVE-2025-21745
* CVE-2025-21749
* CVE-2025-21750
* CVE-2025-21753
* CVE-2025-21756
* CVE-2025-21759
* CVE-2025-21760
* CVE-2025-21761
* CVE-2025-21762
* CVE-2025-21763
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-21772
* CVE-2025-21773
* CVE-2025-21775
* CVE-2025-21776
* CVE-2025-21779
* CVE-2025-21780
* CVE-2025-21781
* CVE-2025-21782
* CVE-2025-21784
* CVE-2025-21785
* CVE-2025-21791
* CVE-2025-21793
* CVE-2025-21794
* CVE-2025-21796
* CVE-2025-21804
* CVE-2025-21810
* CVE-2025-21815
* CVE-2025-21819
* CVE-2025-21820
* CVE-2025-21821
* CVE-2025-21823
* CVE-2025-21825
* CVE-2025-21828
* CVE-2025-21829
* CVE-2025-21830
* CVE-2025-21831
* CVE-2025-21832
* CVE-2025-21835
* CVE-2025-21838
* CVE-2025-21844
* CVE-2025-21846
* CVE-2025-21847
* CVE-2025-21848
* CVE-2025-21850
* CVE-2025-21855
* CVE-2025-21856
* CVE-2025-21857
* CVE-2025-21858
* CVE-2025-21859
* CVE-2025-21861
* CVE-2025-21862
* CVE-2025-21864
* CVE-2025-21865
* CVE-2025-21866
* CVE-2025-21869
* CVE-2025-21870
* CVE-2025-21871
* CVE-2025-21876
* CVE-2025-21877
* CVE-2025-21878
* CVE-2025-21883
* CVE-2025-21885
* CVE-2025-21886
* CVE-2025-21888
* CVE-2025-21890
* CVE-2025-21891
* CVE-2025-21892
CVSS scores:
* CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52926 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52927 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41149 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46736 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46796 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47408 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47794 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49571 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49940 ( SUSE ): 6.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50140 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53163 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53680 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-54683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56638 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56703 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56718 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56719 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56758 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56770 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57807 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57947 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57996 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58012 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58013 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58014 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58017 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58085 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21631 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21635 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21659 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-21671 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21704 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21708 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21711 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21726 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21738 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21750 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21780 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21782 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21785 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21832 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21844 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21855 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 186 vulnerabilities, contains three features and has 42
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52927: netfilter: allow exp not to be removed in
nf_ct_find_expectation (bsc#1239644).
* CVE-2024-35910: tcp: properly terminate timers for kernel sockets
(bsc#1224489).
* CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active
(bsc#1227858).
* CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769).
* CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal
msg (bsc#1235711).
* CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace
kABI workaround (bsc#1235712).
* CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when
receiving proposal msg (bsc#1235733).
* CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount
underflow (bsc#1232812).
* CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c
(bsc#1232389).
* CVE-2024-50140: net: sched: use RCU read-side critical section in
taprio_dump() (bsc#1233060).
* CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
(bsc#1233551).
* CVE-2024-53140: netlink: terminate outstanding dump on socket close
(bsc#1234222).
* CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in
ip_vs_protocol_init() (bsc#1235715).
* CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).
* CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area
handling under softirq" (bsc#1235524).
* CVE-2024-56640: net/smc: fix LGR and link use-after-free issue
(bsc#1235436).
* CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501).
* CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next
hop churn (bsc#1235455).
* CVE-2024-56718: net/smc: protect link down work from execute after lgr freed
(bsc#1235589).
* CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops
(bsc#1235591).
* CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936).
* CVE-2024-56758: btrfs: check folio mapping after unlock in
relocate_one_folio() (bsc#1235621).
* CVE-2024-56770: net/sched: netem: account for backlog updates from child
qdisc (bsc#1235637).
* CVE-2024-57900: ila: serialize calls to nf_register_net_hooks()
(bsc#1235973).
* CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill
(bsc#1236333).
* CVE-2024-57974: udp: Deal with race between UDP socket address change and
rehash (bsc#1238532).
* CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
(bsc#1239076).
* CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during
params (bsc#1239104).
* CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message
queue (bsc#1238997).
* CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).
* CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current->nsproxy (bsc#1236111).
* CVE-2025-21659: netdev: prevent accessing NAPI instances from another
namespace (bsc#1236206).
* CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU
hotunplug (bsc#1237029).
* CVE-2025-21701: net: avoid race between device unregistration and ethnl ops
(bsc#1237164).
* CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
(bsc#1237313).
* CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528).
* CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506).
* CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted
transaction (bsc#1237875).
* CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send()
(bsc#1238738).
* CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb()
(bsc#1238763).
* CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
(bsc#1238775).
* CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
* CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
(bsc#1237897).
* CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss()
(bsc#1237906).
* CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu()
(bsc#1238754).
* CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
* CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer
(bsc#1238971).
* CVE-2025-21844: smb: client: Add check for next_buffer in
receive_encrypted_standard() (bsc#1239512).
* CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
(bsc#1239479).
* CVE-2025-21856: s390/ism: add release function for struct device
(bsc#1239486).
* CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL
dereference (bsc#1239478).
* CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in
migrate_device_finalize() (bsc#1239483).
* CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).
* CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we
currently drop (bsc#1239482).
* CVE-2025-21865: gtp: Suppress list corruption splat in
gtp_net_exit_batch_rtnl() (bsc#1239481).
* CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH
copiers (bsc#1240191).
* CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
* CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189).
* CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173).
* CVE-2025-21891: ipvlan: ensure network headers are in skb linear part
(bsc#1240186).
The following non-security bugs were fixed:
* Move upstreamed PCI and initramfs patches into sorted section
* Move upstreamed nfsd and sunrpc patches into sorted section
* Move upstreamed powerpc and SCSI patches into sorted section
* Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948).
* Revert "dm: requeue IO if mapping table not yet available" (git-fixes).
* Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection"
(git-fixes).
* Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()"
(stable-fixes).
* Revert "wifi: ath11k: restore country code during resume" (bsc#1207948).
* Revert "wifi: ath11k: support hibernation" (bsc#1207948).
* accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes).
* accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes).
* acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are
invalid (bsc#1237530).
* acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes).
* af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb()
(bsc#1239435).
* af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash
(bsc#1239435).
* af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334).
* alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable-
fixes).
* alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx
(stable-fixes).
* alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41
HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41
HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA
(stable-fixes).
* alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA
(stable-fixes).
* alsa: hda/realtek: Always honor no_shutup_pins (git-fixes).
* alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes).
* alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git-
fixes).
* alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes).
* alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes).
* alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes).
* alsa: hda/realtek: update ALC222 depop optimize (stable-fixes).
* alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes).
* alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes).
* alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes).
* alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git-
fixes).
* alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes).
* alsa: usb-audio: Add quirk for Plantronics headsets to fix control names
(stable-fixes).
* alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes).
* alsa: usx2y: validate nrpacks module parameter on probe (git-fixes).
* arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes)
* arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git-
fixes)
* arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes)
* arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git-
fixes)
* arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git-
fixes)
* arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes)
* arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes)
* arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes)
* arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes)
* arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git-
fixes)
* arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git-
fixes)
* arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git-
fixes)
* arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git-
fixes)
* arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git-
fixes)
* arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git-
fixes)
* arm64: mm: Populate vmemmap at the page level if not section aligned (git-
fixes)
* arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes)
* asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable-
fixes).
* asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes).
* asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model
(stable-fixes).
* asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable-
fixes).
* asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git-
fixes).
* asoc: cs35l41: check the return value from spi_setup() (git-fixes).
* asoc: ops: Consistently treat platform_max as control value (git-fixes).
* asoc: rt722-sdca: add missing readable registers (git-fixes).
* asoc: tas2764: Fix power control mask (stable-fixes).
* asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes).
* asoc: tas2770: Fix volume scale (stable-fixes).
* asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio
compatible (git-fixes).
* ata: ahci: Add mask_port_map module parameter (git-fixes).
* ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git-
fixes).
* ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes).
* ata: libata: Fix NCQ Non-Data log not supported print (git-fixes).
* ata: pata_parport: add custom version of wait_after_reset (git-fixes).
* ata: pata_parport: fit3: implement IDE command set registers (git-fixes).
* ata: pata_serverworks: Do not use the term blacklist (git-fixes).
* ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
(git-fixes).
* ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes).
* auxdisplay: panel: Fix an API misuse in panel.c (git-fixes).
* backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
(git-fixes).
* batman-adv: Ignore own maximum aggregation size during RX (git-fixes).
* bitmap: introduce generic optimized bitmap_size() (git-fixes).
* block: cleanup and fix batch completion adding conditions (git-fixes).
* block: do not revert iter for -EIOCBQUEUED (git-fixes).
* bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes).
* bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes).
* bluetooth: Improve setsockopt() handling of malformed user input (git-
fixes).
* bluetooth: hci_event: Fix connection regression between LE and non-LE
adapters (git-fixes).
* bluetooth: hci_event: Fix enabling passive scanning (git-fixes).
* bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes).
* bpf: Fix a verifier verbose message (git-fixes).
* bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git-
fixes).
* bpf: Use -Wno-error in certain tests when building with GCC (git-fixes).
* bpf: prevent r10 register from being marked as precise (git-fixes).
* broadcom: fix supported flag check in periodic output function (git-fixes).
* btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605).
* btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045).
* btrfs: drop the backref cache during relocation if we commit (bsc#1239605).
* btrfs: remove the mirror_num argument to btrfs_submit_compressed_read
(bsc#1239045).
* btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage
(bsc#1239045).
* btrfs: use a separate end_io handler for extent_buffer writing
(bsc#1239045).
* bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes).
* bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
(git-fixes).
* bus: qcom-ssc-block-bus: Fix the error handling path of
qcom_ssc_block_bus_probe() (git-fixes).
* bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes).
* bus: simple-pm-bus: fix forced runtime PM use (git-fixes).
* can: flexcan: disable transceiver during system PM (git-fixes).
* can: flexcan: only change CAN state when link up in system PM (git-fixes).
* can: rcar_canfd: Fix page entries in the AFL list (git-fixes).
* can: ucan: fix out of bound read in strscpy() source (git-fixes).
* cdx: Fix possible UAF error in driver_override_show() (git-fixes).
* char: misc: deallocate static minor in error path (git-fixes).
* clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes).
* coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
* cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged
(bsc#1237856)
* cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707).
* cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856)
* cpufreq/cppc: Move and rename (bsc#1237856)
* cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create
(bsc#1237856)
* cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error
(bsc#1237856)
* cpumask: add cpumask_weight_andnot() (bsc#1239015).
* cpumask: define cleanup function for cpumasks (bsc#1239015).
* crypto: ccp - Fix check for the primary ASP device (git-fixes).
* crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes).
* crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes).
* crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes).
* crypto: hisilicon/sec2 - fix for sec spec check (git-fixes).
* crypto: iaa - Add global_stats file and remove individual stat files
(jsc#PED-12416).
* crypto: iaa - Change desc->priv to 0 (jsc#PED-12416).
* crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416).
* crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416).
* crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416).
* crypto: iaa - Remove header table code (jsc#PED-12416).
* crypto: iaa - Remove potential infinite loop in check_completion()
(jsc#PED-12416).
* crypto: iaa - Remove unnecessary debugfs_create_dir() error check in
iaa_crypto_debugfs_init() (jsc#PED-12416).
* crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
(jsc#PED-12416).
* crypto: iaa - Test the correct request flag (git-fixes).
* crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416).
* crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
(jsc#PED-12416).
* crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416).
* crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416).
* crypto: iaa - remove unneeded semicolon (jsc#PED-12416).
* crypto: nx - Fix uninitialised hv_nxc on error (git-fixes).
* crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416).
* crypto: qat - Constify struct pm_status_row (jsc#PED-12416).
* crypto: qat - Fix missing destroy_workqueue in adf_init_aer()
(jsc#PED-12416).
* crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416).
* crypto: qat - Fix typo "accelaration" (jsc#PED-12416).
* crypto: qat - Fix typo (jsc#PED-12416).
* crypto: qat - Remove trailing space after \n newline (jsc#PED-12416).
* crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416).
* crypto: qat - add admin msgs for telemetry (jsc#PED-12416).
* crypto: qat - add auto reset on error (jsc#PED-12416).
* crypto: qat - add bank save and restore flows (jsc#PED-12416).
* crypto: qat - add fatal error notification (jsc#PED-12416).
* crypto: qat - add fatal error notify method (jsc#PED-12416).
* crypto: qat - add heartbeat error simulator (jsc#PED-12416).
* crypto: qat - add interface for live migration (jsc#PED-12416).
* crypto: qat - add support for 420xx devices (jsc#PED-12416).
* crypto: qat - add support for device telemetry (jsc#PED-12416).
* crypto: qat - add support for device telemetry (jsc#PED-12416).
* crypto: qat - add support for ring pair level telemetry (jsc#PED-12416).
* crypto: qat - adf_get_etr_base() helper (jsc#PED-12416).
* crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416).
* crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416).
* crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416).
* crypto: qat - disable arbitration before reset (jsc#PED-12416).
* crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416).
* crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416).
* crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416).
* crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
(jsc#PED-12416).
* crypto: qat - fix comment structure (jsc#PED-12416).
* crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416).
* crypto: qat - fix recovery flow for VFs (jsc#PED-12416).
* crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416).
* crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416).
* crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416).
* crypto: qat - implement interface for live migration (jsc#PED-12416).
* crypto: qat - improve aer error reset handling (jsc#PED-12416).
* crypto: qat - improve error message in adf_get_arbiter_mapping()
(jsc#PED-12416).
* crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416).
* crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416).
* crypto: qat - limit heartbeat notifications (jsc#PED-12416).
* crypto: qat - make adf_ctl_class constant (jsc#PED-12416).
* crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416).
* crypto: qat - move PFVF compat checker to a function (jsc#PED-12416).
* crypto: qat - move fw config related structures (jsc#PED-12416).
* crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416).
* crypto: qat - re-enable sriov after pf reset (jsc#PED-12416).
* crypto: qat - relocate CSR access code (jsc#PED-12416).
* crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416).
* crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416).
* crypto: qat - remove access to parity register for QAT GEN4 (git-fixes).
* crypto: qat - remove unnecessary description from comment (jsc#PED-12416).
* crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416).
* crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416).
* crypto: qat - set parity error mask for qat_420xx (git-fixes).
* crypto: qat - uninitialized variable in adf_hb_error_inject_write()
(jsc#PED-12416).
* crypto: qat - update PFVF protocol for recovery (jsc#PED-12416).
* crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416).
* crypto: qat - validate slices count returned by FW (jsc#PED-12416).
* crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416).
* disable CRYPTO_DEV_QAT_420XX
* dlm: prevent NPD when writing a positive value to event_done (git-fixes).
* dm array: fix cursor index when skipping across block boundaries (git-
fixes).
* dm array: fix unreleased btree blocks on closing a faulty array cursor (git-
fixes).
* dm init: Handle minors larger than 255 (git-fixes).
* dm integrity: fix out-of-range warning (git-fixes).
* dm persistent data: fix memory allocation failure (git-fixes).
* dm resume: do not return EINVAL when signalled (git-fixes).
* dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes).
* dm thin: Add missing destroy_work_on_stack() (git-fixes).
* dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit()
(git-fixes).
* dm-crypt: track tag_offset in convert_context (git-fixes).
* dm-delay: fix hung task introduced by kthread mode (git-fixes).
* dm-delay: fix max_delay calculations (git-fixes).
* dm-delay: fix workqueue delay_timer race (git-fixes).
* dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes).
* dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git-
fixes).
* dm-integrity: align the outgoing bio in integrity_recheck (git-fixes).
* dm-integrity: fix a race condition when accessing recalc_sector (git-fixes).
* dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes).
* dm-unstriped: cast an operand to sector_t to prevent potential uint32_t
overflow (git-fixes).
* dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2)
(git-fixes). mwilck: some hand editing because d95e2c34a3ca ("dm verity: Fix
IO priority lost when reading FEC and hash") is missing
* dm: Fix typo in error message (git-fixes).
* dma: kmsan: export kmsan_handle_dma() for modules (git-fixes).
* documentation: qat: fix auto_reset attribute details (git-fixes).
* documentation: qat: fix auto_reset section (git-fixes).
* driver core: Remove needless return in void API device_remove_group() (git-
fixes).
* drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes).
* drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio()
(git-fixes).
* drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
(git-fixes).
* drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable-
fixes).
* drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes).
* drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable-
fixes).
* drm/amd/display: Fix HPD after gpu reset (stable-fixes).
* drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes).
* drm/amd/display: Restore correct backlight brightness after a GPU reset
(stable-fixes).
* drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes).
* drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes).
* drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters()
(git-fixes).
* drm/amdgpu/umsch: declare umsch firmware (git-fixes).
* drm/amdgpu: Check extended configuration space register when system uses
large bar (stable-fixes).
* drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable-
fixes).
* drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes).
* drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid
Priority Inversion in SRIOV (git-fixes).
* drm/amdkfd: Fix Circular Locking Dependency in
'svm_range_cpu_invalidate_pagetables' (git-fixes).
* drm/atomic: Filter out redundant DPMS calls (stable-fixes).
* drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes).
* drm/bridge: it6505: fix HDCP V match check is not performed correctly (git-
fixes).
* drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes).
* drm/dp_mst: Fix drm RAD print (git-fixes).
* drm/dp_mst: Fix locking when skipping CSN before topology probing (git-
fixes).
* drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git-
fixes).
* drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git-
fixes).
* drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes).
* drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes).
* drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes).
* drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes).
* drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git-
fixes).
* drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes).
* drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes).
* drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git-
fixes).
* drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes).
* drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes).
* drm/msm/dpu: do not use active in atomic_check() (git-fixes).
* drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git-
fixes).
* drm/msm/dsi: Use existing per-interface slice count in DSC timing (git-
fixes).
* drm/nouveau: Do not override forced connector status (stable-fixes).
* drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes).
* drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes).
* drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable-
fixes).
* drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git-
fixes).
* drm/repaper: fix integer overflows in repeat functions (git-fixes).
* drm/sched: Fix fence reference count leak (git-fixes).
* drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes).
* drm/ssd130x: ensure ssd132x pitch is correct (git-fixes).
* drm/ssd130x: fix ssd132x encoding (git-fixes).
* drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes).
* drm/vkms: Fix use after free and double free on init error (git-fixes).
* drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes).
* drm: xlnx: zynqmp: Fix max dma segment size (git-fixes).
* dummycon: fix default rows/cols (git-fixes).
* eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes).
* efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349).
* fbdev: au1100fb: Move a variable assignment behind a null pointer check
(git-fixes).
* fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
* fbdev: sm501fb: Add some geometry checks (git-fixes).
* firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before
comparison (git-fixes).
* firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes).
* firmware: cs_dsp: Remove async regmap writes (git-fixes).
* firmware: imx-scu: fix OF node leak in .probe() (git-fixes).
* flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994).
* gpio: aggregator: protect driver attr handlers against module unload (git-
fixes).
* gpio: rcar: Fix missing of_node_put() call (git-fixes).
* gpio: rcar: Use raw_spinlock to protect register access (stable-fixes).
* gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git-
fixes).
* hid: Enable playstation driver independently of sony driver (git-fixes).
* hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes).
* hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes).
* hid: appleir: Fix potential NULL dereference at raw event handle (git-
fixes).
* hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes).
* hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes).
* hid: hid-steam: Fix use-after-free when detaching device (git-fixes).
* hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend
(stable-fixes).
* hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes).
* hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git-
fixes).
* hid: intel-ish-hid: Send clock sync message immediately after reset (stable-
fixes).
* hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable-
fixes).
* hid: remove superfluous (and wrong) Makefile entry for
CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes).
* hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes).
* hwmon: (ad7314) Validate leading zero bits and return error (git-fixes).
* hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes).
* hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes).
* hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git-
fixes).
* i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes).
* i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes).
* i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git-
fixes).
* i2c: omap: fix IRQ storms (git-fixes).
* i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes).
* i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes).
* i3c: master: svc: Fix missing the IBI rules (git-fixes).
* i3c: master: svc: Use readsb helper for reading MDB (git-fixes).
* ib/mad: Check available slots before posting receive WRs (git-fixes)
* ice: Remove and readd netdev during devlink reload (bsc#1230497
bsc#1239518).
* iio: accel: mma8452: Ensure error return on failure to matching oversampling
ratio (git-fixes).
* iio: accel: msa311: Fix failure to release runtime pm if direct mode claim
fails (git-fixes).
* iio: adc: ad4130: Fix comparison of channel setups (git-fixes).
* iio: adc: ad7124: Fix comparison of channel configs (git-fixes).
* iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes).
* iio: dac: ad3552r: clear reset status flag (git-fixes).
* iio: filter: admv8818: Force initialization of SDO (git-fixes).
* include/linux/mmzone.h: clean up watermark accessors (bsc#1239600).
* include: net: add static inline dst_dev_overhead() to dst.h (git-fixes).
* init: add initramfs_internal.h (bsc#1232848).
* initramfs: allocate heap buffers together (bsc#1232848).
* initramfs: fix hardlink hash leak without TRAILER (bsc#1232848).
* input: ads7846 - fix gpiod allocation (git-fixes).
* input: i8042 - add required quirks for missing old boardnames (stable-
fixes).
* input: i8042 - swap old quirk combination with new quirk for NHxxRZQ
(stable-fixes).
* input: i8042 - swap old quirk combination with new quirk for more devices
(stable-fixes).
* input: i8042 - swap old quirk combination with new quirk for several devices
(stable-fixes).
* input: iqs7222 - add support for Azoteq IQS7222D (git-fixes).
* input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes).
* input: iqs7222 - preserve system status register (git-fixes).
* input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE
controllers (stable-fixes).
* input: xpad - add multiple supported devices (stable-fixes).
* input: xpad - add support for TECNO Pocket Go (stable-fixes).
* input: xpad - add support for ZOTAC Gaming Zone (stable-fixes).
* input: xpad - rename QH controller to Legion Go S (stable-fixes).
* intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes).
* intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes).
* intel_th: pci: Add Arrow Lake support (stable-fixes).
* intel_th: pci: Add Panther Lake-H support (stable-fixes).
* intel_th: pci: Add Panther Lake-P/U support (stable-fixes).
* ioam6: improve checks on user data (git-fixes).
* iommu/vt-d: Fix suspicious RCU usage (git-fixes).
* ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).
* ipv4: use RCU protection in inet_select_addr() (bsc#1239994).
* ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).
* ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994).
* ipv4: use RCU protection in rt_is_expired() (bsc#1239994).
* ipv6: Ensure natural alignment of const ipv6 loopback and router addresses
(git-fixes).
* ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git-
fixes).
* ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git-
fixes).
* ipv6: Use RCU in ip6_input() (bsc#1239994).
* ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes).
* ipv6: avoid atomic fragment on GSO packets (git-fixes).
* ipv6: fib6_rules: flush route cache when rule is changed (git-fixes).
* ipv6: fib: hide unused 'pn' variable (git-fixes).
* ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes).
* ipv6: fix potential NULL deref in fib6_add() (git-fixes).
* ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).
* ipv6: introduce dst_rt6_info() helper (git-fixes).
* ipv6: ioam: block BH from ioam6_output() (git-fixes).
* ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes).
* ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
* ipv6: sr: add missing seg6_local_exit (git-fixes).
* ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes).
* ipv6: take care of scope when choosing the src addr (git-fixes).
* jfs: add check read-only before truncation in jfs_truncate_nolock() (git-
fixes).
* jfs: add check read-only before txBeginAnon() call (git-fixes).
* jfs: add index corruption check to DT_GETPAGE() (git-fixes).
* jfs: fix slab-out-of-bounds read in ea_get() (git-fixes).
* jfs: reject on-disk inodes of an unsupported type (git-fixes).
* kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes)
* kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
* kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in
RTM_NEWPREFIX (git-fixes).
* kABI fix for netlink: terminate outstanding dump on socket close (git-
fixes).
* kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes).
* kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes).
* kABI workaround for intel-ish-hid (git-fixes).
* kABI workaround for soc_mixer_control changes (git-fixes).
* kbuild: hdrcheck: fix cross build with clang (git-fixes).
* kunit: qemu_configs: sparc: use Zilog console (git-fixes).
* l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes).
* l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt()
function (git-fixes).
* l2tp: fix lockdep splat (git-fixes).
* leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git-
fixes).
* leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git-
fixes).
* lib: 842: Improve error handling in sw842_compress() (git-fixes).
* lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*()
(git-fixes).
* mdacon: rework dependency list (git-fixes).
* media: i2c: adv748x: Fix test pattern selection mask (git-fixes).
* media: i2c: ccs: Set the device's runtime PM status correctly in remove
(git-fixes).
* media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO
(git-fixes).
* media: i2c: ov7251: Set enable GPIO low in probe (git-fixes).
* media: platform: allgro-dvt: unregister v4l2_device on the error path (git-
fixes).
* media: platform: stm32: Add check for clk_enable() (git-fixes).
* media: siano: Fix error handling in smsdvb_module_init() (git-fixes).
* media: streamzap: fix race between device disconnection and urb callback
(git-fixes).
* media: streamzap: prevent processing IR data on URB failure (git-fixes).
* media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git-
fixes).
* media: venus: hfi: add a check to handle OOB in sfr region (git-fixes).
* media: venus: hfi: add check to handle incorrect queue size (git-fixes).
* media: venus: hfi_parser: add check to avoid out of bound access (git-
fixes).
* media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes).
* media: verisilicon: HEVC: Initialize start_bit field (git-fixes).
* media: vim2m: print device name after registering device (git-fixes).
* media: visl: Fix ERANGE error when setting enum controls (git-fixes).
* mei: me: add panther lake P DID (stable-fixes).
* memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes).
* memory: mtk-smi: Add ostd setting for mt8192 (git-fixes).
* memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
(git-fixes).
* mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes).
* mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes).
* mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes).
* mfd: syscon: Fix race in device_node_get_regmap() (git-fixes).
* mfd: syscon: Remove extern from function prototypes (stable-fixes).
* mfd: syscon: Use scoped variables with memory allocators to simplify error
paths (stable-fixes).
* mm/page_alloc: fix memory accept before watermarks gets initialized
(bsc#1239600).
* mm: accept to promo watermark (bsc#1239600).
* mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600).
* mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600).
* mm: zswap: move allocations during CPU init outside the lock (git-fixes).
* mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes).
* mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes).
* mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes).
* mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes).
* mtd: Add check for devm_kcalloc() (git-fixes).
* mtd: Replace kcalloc() with devm_kcalloc() (git-fixes).
* mtd: nand: Fix a kdoc comment (git-fixes).
* mtd: rawnand: brcmnand: fix PM resume warning (git-fixes).
* ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).
* ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).
* net l2tp: drop flow hash on forward (git-fixes).
* net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions
created by classifiers (git-fixes).
* net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes).
* net/sched: adjust device watchdog timer to detect stopped queue at right
time (git-fixes).
* net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes).
* net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes).
* net/sched: flower: Add lock protection when remove filter handle (git-
fixes).
* net/sched: taprio: make q->picos_per_byte available to fill_sched_entry()
(git-fixes).
* net/sched: tbf: correct backlog statistic for GSO packets (git-fixes).
* net: add dev_net_rcu() helper (bsc#1239994).
* net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes).
* net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes).
* net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes).
* net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes).
* net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes).
* net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes).
* net: ipv6: fix wrong start position when receive hop-by-hop fragment (git-
fixes).
* net: ipv6: ioam6: code alignment (git-fixes).
* net: ipv6: ioam6: new feature tunsrc (git-fixes).
* net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes).
* net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git-
fixes).
* net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes).
* net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX
(git-fixes).
* net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
* net: mana: Allow variable size indirection table (bsc#1239016).
* net: mana: Assigning IRQ affinity on HT cores (bsc#1239015).
* net: mana: Avoid open coded arithmetic (bsc#1239016).
* net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015).
* net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015).
* net: mana: Support holes in device list reply msg (git-fixes).
* net: mana: add a function to spread IRQs per CPUs (bsc#1239015).
* net: mana: cleanup mana struct after debugfs_remove() (git-fixes).
* net: usb: usbnet: restore usb%d name exception for local mac addresses
(bsc#1234480).
* net: use unrcu_pointer() helper (git-fixes).
* net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable-
fixes).
* net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes).
* net_sched: sch_sfq: annotate data-races around q->perturb_period (git-
fixes).
* net_sched: sch_sfq: handle bigger packets (git-fixes).
* nfsd: clear acl_access/acl_default after releasing them (git-fixes).
* nvme-fc: do not ignore connectivity loss during connecting (git-fixes
bsc#1222649).
* nvme-fc: go straight to connecting state when initializing (git-fixes
bsc#1222649).
* nvme-fc: rely on state transitions to handle connectivity loss (git-fixes
bsc#1222649).
* nvme-ioctl: fix leaked requests on mapping error (git-fixes).
* nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes).
* nvme-pci: remove stale comment (git-fixes).
* nvme-tcp: Fix a C2HTermReq error message (git-fixes).
* nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes).
* nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git-
fixes).
* nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes).
* nvme: introduce nvme_disk_is_ns_head helper (git-fixes).
* nvme: move error logging from nvme_end_req() to __nvme_end_req() (git-
fixes).
* nvme: move passthrough logging attribute to head (git-fixes).
* nvme: only allow entering LIVE from CONNECTING state (git-fixes
bsc#1222649).
* nvmet-fc: Remove unused functions (git-fixes).
* nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git-
fixes).
* nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch
(git-fixes).
* nvmet: remove old function prototype (git-fixes).
* ocfs2: check dir i_size in ocfs2_find_entry (git-fixes).
* ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes).
* ocfs2: handle a symlink read error correctly (git-fixes).
* ocfs2: mark dquot as inactive if failed to start trans while releasing dquot
(git-fixes).
* ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes).
* orangefs: fix a oob in orangefs_debug_write (git-fixes).
* packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
* packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
* padata: fix sysfs store callback check (git-fixes).
* partitions: mac: fix handling of bogus partition table (git-fixes).
* pci/acs: Fix 'pci=config_acs=' parameter (git-fixes).
* pci/aspm: Fix link state exit during switch upstream function removal (git-
fixes).
* pci/doe: Poll DOE Busy bit for up to 1 second in pci_doe_send_req()
(bsc#1237853)
* pci/doe: Support discovery version 2 (bsc#1237853)
* pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes).
* pci: Avoid reset when disabled via sysfs (git-fixes).
* pci: Fix reference leak in pci_alloc_child_bus() (git-fixes).
* pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes).
* pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git-
fixes).
* pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes).
* pci: brcmstb: Fix potential premature regulator disabling (git-fixes).
* pci: brcmstb: Set generation limit before PCIe link up (git-fixes).
* pci: brcmstb: Use internal register to change link capability (git-fixes).
* pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data
payload (git-fixes).
* pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes).
* pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes).
* pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes).
* pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes).
* pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm()
(git-fixes).
* pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git-
fixes).
* pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes).
* pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes).
* pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes).
* platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable-
fixes).
* platform/x86: dell-ddv: Fix temperature calculation (git-fixes).
* platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable-
fixes).
* platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e
(stable-fixes).
* platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable-
fixes).
* pm: sleep: Adjust check before setting power.must_resume (git-fixes).
* pm: sleep: Fix handling devices with direct_complete set on errors (git-
fixes).
* pnfs/flexfiles: retry getting layout segment for reads (git-fixes).
* power: supply: max77693: Fix wrong conversion of charge input threshold
value (git-fixes).
* powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573).
* powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS
block (bsc#1239573).
* powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory
(bsc#1239167 ltc#211055).
* powerpc: Stop using no_llseek (bsc#1239573).
* rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes).
* rapidio: fix an API misues when rio_add_net() fails (git-fixes).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
* rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes)
* rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes)
* rdma/core: Do not expose hw_counters outside of init net namespace (git-
fixes)
* rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes)
* rdma/hns: Fix a missing rollback in error path of
hns_roce_create_qp_common() (git-fixes)
* rdma/hns: Fix missing xa_destroy() (git-fixes)
* rdma/hns: Fix soft lockup during bt pages loop (git-fixes)
* rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git-
fixes)
* rdma/hns: Fix wrong value of max_sge_rd (git-fixes)
* rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
* rdma/mlx5: Fix MR cache initialization error flow (git-fixes)
* rdma/mlx5: Fix cache entry update on dereg error (git-fixes)
* rdma/mlx5: Fix calculation of total invalidated pages (git-fixes)
* rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes)
* rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes)
* rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex()
tests (git-fixes)
* regulator: check that dummy regulator has been probed before using it
(stable-fixes).
* regulator: core: Fix deadlock in create_regulator() (git-fixes).
* regulator: dummy: force synchronous probing (git-fixes).
* rndis_host: Flag RNDIS modems as WWAN devices (git-fixes).
* rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf
(bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined
with suse_version check.
* rpm/release-projects: Update the ALP projects again (bsc#1231293).
* s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes
bsc#1239594).
* s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595).
* sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
* selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes).
* selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes).
* selftests/bpf: Prevent client connect before server bind in
test_tc_tunnel.sh (git-fixes).
* selftests/bpf: add fp-leaking precise subprog result tests (git-fixes).
* selftests/mm/cow: fix the incorrect error handling (git-fixes).
* selftests/x86/syscall: Fix coccinelle WARNING recommending the use of
ARRAY_SIZE() (git-fixes).
* selftests: mptcp: close fd_in before returning in main_loop (git-fixes).
* selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes).
* seq_file: add helper macro to define attribute for rw file (jsc#PED-12416).
* slimbus: messaging: Free transaction ID in delayed interrupt scenario (git-
fixes).
* smb: client: destroy cfid_put_wq on module exit (git-fixes).
* soc: imx8m: Remove global soc_uid (stable-fixes).
* soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes).
* soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes).
* soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes).
* soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes).
* soc: qcom: pdr: Fix the potential deadlock (git-fixes).
* soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()
(git-fixes).
* soundwire: slave: fix an OF node reference leak in soundwire slave device
(git-fixes).
* spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes).
* spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes).
* spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes).
* splice: do not checksum AF_UNIX sockets (bsc#1240333).
* sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes).
* sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes).
* sunrpc: convert RPC_TASK_* constants to enum (git-fixes).
* sunrpc: suppress warnings for unused procfs functions (git-fixes).
* supported.conf: add now-included qat_420xx (external, intel)
* tcp: Add memory barrier to tcp_push() (git-fixes).
* tcp: Adjust clamping window for applications specifying SO_RCVBUF (git-
fixes).
* tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes).
* tcp: Defer ts_recent changes until req is owned (git-fixes).
* tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes).
* tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes).
* tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-
wildcard addresses (git-fixes).
* tcp: Update window clamping condition (git-fixes).
* tcp: add tcp_done_with_error() helper (git-fixes).
* tcp: adjust rcvq_space after updating scaling ratio (git-fixes).
* tcp: annotate data-races around tp->window_clamp (git-fixes).
* tcp: avoid premature drops in tcp_add_backlog() (git-fixes).
* tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process
(git-fixes).
* tcp: check mptcp-level constraints for backlog coalescing (git-fixes).
* tcp: check space before adding MPTCP SYN options (git-fixes).
* tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes).
* tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes).
* tcp: define initial scaling factor value as a macro (git-fixes).
* tcp: derive delack_max from rto_min (git-fixes).
* tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git-
fixes).
* tcp: fix cookie_init_timestamp() overflows (git-fixes).
* tcp: fix forever orphan socket caused by tcp_abort (git-fixes).
* tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function
(git-fixes).
* tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes).
* tcp: fix mid stream window clamp (git-fixes).
* tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes).
* tcp: fix race in tcp_write_err() (git-fixes).
* tcp: fix races in tcp_abort() (git-fixes).
* tcp: fix races in tcp_v_err() (git-fixes).
* tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git-
fixes).
* tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git-
fixes).
* tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes).
* tcp: increase the default TCP scaling ratio (git-fixes).
* tcp: introduce tcp_clock_ms() (git-fixes).
* tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes).
* tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes).
* tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes).
* tcp: replace tcp_time_stamp_raw() (git-fixes).
* thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes).
* thermal: int340x: Add NULL check for adev (git-fixes).
* tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind
(git-fixes).
* tools: move alignment-related macros to new <linux/align.h> (git-fixes).
* tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes).
* tpm: do not start chip while suspended (git-fixes).
* tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
* ubi: Add a check for ubi_num (git-fixes).
* ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes).
* ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes).
* ubi: correct the calculation of fastmap size (stable-fixes).
* ubi: eba: properly rollback inside self_check_eba (git-fixes).
* ubi: fastmap: Fix missed ec updating after erasing old fastmap data block
(git-fixes).
* ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists
(git-fixes).
* ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git-
fixes).
* ubi: wl: Put source PEB into correct list if trying locking LEB failed (git-
fixes).
* upstream: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open()
(git-fixes).
* usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes).
* usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes).
* usb: gadget: Check bmAttributes only if configuration is valid (git-fixes).
* usb: gadget: Fix setting self-powered state on suspend (git-fixes).
* usb: gadget: Set self-powered based on MaxPower and bmAttributes (git-
fixes).
* usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git-
fixes).
* usb: hub: lack of clearing xHC resources (git-fixes).
* usb: phy: generic: Use proper helper for property detection (stable-fixes).
* usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader
(stable-fixes).
* usb: renesas_usbhs: Call clk_put() (git-fixes).
* usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes).
* usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes).
* usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes).
* usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes).
* usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes).
* usb: serial: option: match on interface class for Telit FN990B (stable-
fixes).
* usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality
(git-fixes).
* usb: typec: ucsi: Fix NULL pointer access (git-fixes).
* usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes).
* usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes).
* usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes).
* usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes).
* vboxsf: fix building with GCC 15 (stable-fixes).
* wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in
error path (git-fixes).
* wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git-
fixes).
* wifi: ath11k: choose default PM policy for hibernation (bsc#1207948).
* wifi: ath11k: determine PM policy based on machine model (bsc#1207948).
* wifi: ath11k: fix RCU stall while reaping monitor destination ring (git-
fixes).
* wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git-
fixes).
* wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948).
* wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948).
* wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948).
* wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in
error path (git-fixes).
* wifi: ath12k: encode max Tx power in scan channel list command (git-fixes).
* wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes).
* wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes).
* wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes).
* wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes).
* wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes).
* wifi: mt76: Add check for devm_kstrdup() (git-fixes).
* wifi: mt76: mt7915: fix possible integer overflows in
mt7915_muru_stats_show() (git-fixes).
* wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes).
* wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes).
* wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes).
* wifi: mwifiex: Fix premature release of RF calibration data (git-fixes).
* wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git-
fixes).
* wifi: rtw89: fw: correct debug message format in
rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes).
* wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes).
* x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes).
* x86/boot/32: De-uglify the 2/3 level paging difference in
mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32()
(git-fixes).
* x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: Temporarily map initrd for microcode loading (git-fixes).
* x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes).
* x86/coco: Replace 'static const cc_mask' with the newly introduced
cc_get_mask() function (git-fixes).
* x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers
(git-fixes).
* x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git-
fixes).
* x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes).
* x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
* x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes).
* x86/hyperv: Fix output argument to hypercall that changes page visibility
(git-fixes).
* x86/idle: Disable IBRS when CPU is offline to improve single-threaded
performance (git-fixes).
* x86/microcode/32: Move early loading after paging enable (git-fixes).
* x86/microcode/amd: Cache builtin microcode too (git-fixes).
* x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes).
* x86/microcode/amd: Use cached microcode for AP load (git-fixes).
* x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes).
* x86/microcode/intel: Add a minimum required revision for late loading (git-
fixes).
* x86/microcode/intel: Cleanup code further (git-fixes).
* x86/microcode/intel: Move microcode functions out of cpu/intel.c (git-
fixes).
* x86/microcode/intel: Remove debug code (git-fixes).
* x86/microcode/intel: Remove pointless mutex (git-fixes).
* x86/microcode/intel: Rename get_datasize() since its used externally (git-
fixes).
* x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes).
* x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes).
* x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes).
* x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git-
fixes).
* x86/microcode/intel: Save the microcode only after a successful late-load
(git-fixes).
* x86/microcode/intel: Simplify and rename generic_load_microcode() (git-
fixes).
* x86/microcode/intel: Simplify early loading (git-fixes).
* x86/microcode/intel: Simplify scan_microcode() (git-fixes).
* x86/microcode/intel: Switch to kvmalloc() (git-fixes).
* x86/microcode/intel: Unify microcode apply() functions (git-fixes).
* x86/microcode: Add per CPU control field (git-fixes).
* x86/microcode: Add per CPU result state (git-fixes).
* x86/microcode: Clarify the late load logic (git-fixes).
* x86/microcode: Clean up mc_cpu_down_prep() (git-fixes).
* x86/microcode: Get rid of the schedule work indirection (git-fixes).
* x86/microcode: Handle "nosmt" correctly (git-fixes).
* x86/microcode: Handle "offline" CPUs correctly (git-fixes).
* x86/microcode: Hide the config knob (git-fixes).
* x86/microcode: Include vendor headers into microcode.h (git-fixes).
* x86/microcode: Make reload_early_microcode() static (git-fixes).
* x86/microcode: Mop up early loading leftovers (git-fixes).
* x86/microcode: Move core specific defines to local header (git-fixes).
* x86/microcode: Prepare for minimal revision check (git-fixes).
* x86/microcode: Protect against instrumentation (git-fixes).
* x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes).
* x86/microcode: Provide new control functions (git-fixes).
* x86/microcode: Remove microcode_mutex (git-fixes).
* x86/microcode: Remove pointless apply() invocation (git-fixes).
* x86/microcode: Rendezvous and load in NMI (git-fixes).
* x86/microcode: Replace the all-in-one rendevous handler (git-fixes).
* x86/microcode: Sanitize __wait_for_cpus() (git-fixes).
* x86/mm: Remove unused microcode.h include (git-fixes).
* x86/platform/olpc: Remove unused variable 'len' in
olpc_dt_compatible_match() (git-fixes).
* x86/speculation: Add __update_spec_ctrl() helper (git-fixes).
* x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s
description (git-fixes).
* xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes).
* xhci: Cleanup Candence controller PCI device and vendor ID usage (git-
fixes).
* xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
* xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
* xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
* xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
* xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes).
* xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes).
* xhci: dbc: Convert to use sysfs_streq() (git-fixes).
* xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes).
* xhci: dbc: Fix STALL transfer event handling (git-fixes).
* xhci: dbc: Replace custom return value with proper Linux error code (git-
fixes).
* xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes).
* xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes).
* xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes).
* xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes).
* xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes).
* xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes).
* xhci: pci: Use standard pattern for device IDs (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-1177=1 openSUSE-SLE-15.6-2025-1177=1
* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1177=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64)
* kernel-azure-devel-6.4.0-150600.8.34.2
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.34.2
* gfs2-kmp-azure-6.4.0-150600.8.34.2
* kernel-azure-extra-debuginfo-6.4.0-150600.8.34.2
* cluster-md-kmp-azure-6.4.0-150600.8.34.2
* ocfs2-kmp-azure-6.4.0-150600.8.34.2
* reiserfs-kmp-azure-6.4.0-150600.8.34.2
* kernel-azure-debuginfo-6.4.0-150600.8.34.2
* kselftests-kmp-azure-6.4.0-150600.8.34.2
* kernel-syms-azure-6.4.0-150600.8.34.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.34.2
* kernel-azure-optional-debuginfo-6.4.0-150600.8.34.2
* kernel-azure-extra-6.4.0-150600.8.34.2
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.34.2
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.34.2
* kernel-azure-devel-debuginfo-6.4.0-150600.8.34.2
* kernel-azure-optional-6.4.0-150600.8.34.2
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.34.2
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.34.2
* kernel-azure-debugsource-6.4.0-150600.8.34.2
* dlm-kmp-azure-6.4.0-150600.8.34.2
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.34.2
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.34.2
* kernel-azure-vdso-6.4.0-150600.8.34.2
* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.34.2
* kernel-source-azure-6.4.0-150600.8.34.2
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.34.2
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-azure-devel-6.4.0-150600.8.34.2
* kernel-azure-devel-debuginfo-6.4.0-150600.8.34.2
* kernel-syms-azure-6.4.0-150600.8.34.1
* kernel-azure-debugsource-6.4.0-150600.8.34.2
* kernel-azure-debuginfo-6.4.0-150600.8.34.2
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.34.2
* kernel-source-azure-6.4.0-150600.8.34.2
## References:
* https://www.suse.com/security/cve/CVE-2023-52831.html
* https://www.suse.com/security/cve/CVE-2023-52926.html
* https://www.suse.com/security/cve/CVE-2023-52927.html
* https://www.suse.com/security/cve/CVE-2024-26634.html
* https://www.suse.com/security/cve/CVE-2024-26873.html
* https://www.suse.com/security/cve/CVE-2024-35826.html
* https://www.suse.com/security/cve/CVE-2024-35910.html
* https://www.suse.com/security/cve/CVE-2024-38606.html
* https://www.suse.com/security/cve/CVE-2024-41005.html
* https://www.suse.com/security/cve/CVE-2024-41077.html
* https://www.suse.com/security/cve/CVE-2024-41149.html
* https://www.suse.com/security/cve/CVE-2024-42307.html
* https://www.suse.com/security/cve/CVE-2024-43820.html
* https://www.suse.com/security/cve/CVE-2024-46736.html
* https://www.suse.com/security/cve/CVE-2024-46782.html
* https://www.suse.com/security/cve/CVE-2024-46796.html
* https://www.suse.com/security/cve/CVE-2024-47408.html
* https://www.suse.com/security/cve/CVE-2024-47794.html
* https://www.suse.com/security/cve/CVE-2024-49571.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49940.html
* https://www.suse.com/security/cve/CVE-2024-49994.html
* https://www.suse.com/security/cve/CVE-2024-50056.html
* https://www.suse.com/security/cve/CVE-2024-50126.html
* https://www.suse.com/security/cve/CVE-2024-50140.html
* https://www.suse.com/security/cve/CVE-2024-50152.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-52559.html
* https://www.suse.com/security/cve/CVE-2024-53057.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53140.html
* https://www.suse.com/security/cve/CVE-2024-53163.html
* https://www.suse.com/security/cve/CVE-2024-53680.html
* https://www.suse.com/security/cve/CVE-2024-54683.html
* https://www.suse.com/security/cve/CVE-2024-56638.html
* https://www.suse.com/security/cve/CVE-2024-56640.html
* https://www.suse.com/security/cve/CVE-2024-56702.html
* https://www.suse.com/security/cve/CVE-2024-56703.html
* https://www.suse.com/security/cve/CVE-2024-56718.html
* https://www.suse.com/security/cve/CVE-2024-56719.html
* https://www.suse.com/security/cve/CVE-2024-56751.html
* https://www.suse.com/security/cve/CVE-2024-56758.html
* https://www.suse.com/security/cve/CVE-2024-56770.html
* https://www.suse.com/security/cve/CVE-2024-57807.html
* https://www.suse.com/security/cve/CVE-2024-57834.html
* https://www.suse.com/security/cve/CVE-2024-57900.html
* https://www.suse.com/security/cve/CVE-2024-57947.html
* https://www.suse.com/security/cve/CVE-2024-57973.html
* https://www.suse.com/security/cve/CVE-2024-57974.html
* https://www.suse.com/security/cve/CVE-2024-57978.html
* https://www.suse.com/security/cve/CVE-2024-57980.html
* https://www.suse.com/security/cve/CVE-2024-57981.html
* https://www.suse.com/security/cve/CVE-2024-57986.html
* https://www.suse.com/security/cve/CVE-2024-57990.html
* https://www.suse.com/security/cve/CVE-2024-57993.html
* https://www.suse.com/security/cve/CVE-2024-57996.html
* https://www.suse.com/security/cve/CVE-2024-57997.html
* https://www.suse.com/security/cve/CVE-2024-57999.html
* https://www.suse.com/security/cve/CVE-2024-58002.html
* https://www.suse.com/security/cve/CVE-2024-58005.html
* https://www.suse.com/security/cve/CVE-2024-58006.html
* https://www.suse.com/security/cve/CVE-2024-58007.html
* https://www.suse.com/security/cve/CVE-2024-58009.html
* https://www.suse.com/security/cve/CVE-2024-58011.html
* https://www.suse.com/security/cve/CVE-2024-58012.html
* https://www.suse.com/security/cve/CVE-2024-58013.html
* https://www.suse.com/security/cve/CVE-2024-58014.html
* https://www.suse.com/security/cve/CVE-2024-58017.html
* https://www.suse.com/security/cve/CVE-2024-58019.html
* https://www.suse.com/security/cve/CVE-2024-58020.html
* https://www.suse.com/security/cve/CVE-2024-58034.html
* https://www.suse.com/security/cve/CVE-2024-58051.html
* https://www.suse.com/security/cve/CVE-2024-58052.html
* https://www.suse.com/security/cve/CVE-2024-58054.html
* https://www.suse.com/security/cve/CVE-2024-58055.html
* https://www.suse.com/security/cve/CVE-2024-58056.html
* https://www.suse.com/security/cve/CVE-2024-58057.html
* https://www.suse.com/security/cve/CVE-2024-58058.html
* https://www.suse.com/security/cve/CVE-2024-58061.html
* https://www.suse.com/security/cve/CVE-2024-58063.html
* https://www.suse.com/security/cve/CVE-2024-58069.html
* https://www.suse.com/security/cve/CVE-2024-58072.html
* https://www.suse.com/security/cve/CVE-2024-58076.html
* https://www.suse.com/security/cve/CVE-2024-58078.html
* https://www.suse.com/security/cve/CVE-2024-58079.html
* https://www.suse.com/security/cve/CVE-2024-58080.html
* https://www.suse.com/security/cve/CVE-2024-58083.html
* https://www.suse.com/security/cve/CVE-2024-58085.html
* https://www.suse.com/security/cve/CVE-2024-58086.html
* https://www.suse.com/security/cve/CVE-2025-21631.html
* https://www.suse.com/security/cve/CVE-2025-21635.html
* https://www.suse.com/security/cve/CVE-2025-21659.html
* https://www.suse.com/security/cve/CVE-2025-21671.html
* https://www.suse.com/security/cve/CVE-2025-21693.html
* https://www.suse.com/security/cve/CVE-2025-21701.html
* https://www.suse.com/security/cve/CVE-2025-21703.html
* https://www.suse.com/security/cve/CVE-2025-21704.html
* https://www.suse.com/security/cve/CVE-2025-21706.html
* https://www.suse.com/security/cve/CVE-2025-21708.html
* https://www.suse.com/security/cve/CVE-2025-21711.html
* https://www.suse.com/security/cve/CVE-2025-21714.html
* https://www.suse.com/security/cve/CVE-2025-21718.html
* https://www.suse.com/security/cve/CVE-2025-21723.html
* https://www.suse.com/security/cve/CVE-2025-21726.html
* https://www.suse.com/security/cve/CVE-2025-21727.html
* https://www.suse.com/security/cve/CVE-2025-21731.html
* https://www.suse.com/security/cve/CVE-2025-21732.html
* https://www.suse.com/security/cve/CVE-2025-21734.html
* https://www.suse.com/security/cve/CVE-2025-21735.html
* https://www.suse.com/security/cve/CVE-2025-21736.html
* https://www.suse.com/security/cve/CVE-2025-21738.html
* https://www.suse.com/security/cve/CVE-2025-21739.html
* https://www.suse.com/security/cve/CVE-2025-21741.html
* https://www.suse.com/security/cve/CVE-2025-21742.html
* https://www.suse.com/security/cve/CVE-2025-21743.html
* https://www.suse.com/security/cve/CVE-2025-21744.html
* https://www.suse.com/security/cve/CVE-2025-21745.html
* https://www.suse.com/security/cve/CVE-2025-21749.html
* https://www.suse.com/security/cve/CVE-2025-21750.html
* https://www.suse.com/security/cve/CVE-2025-21753.html
* https://www.suse.com/security/cve/CVE-2025-21756.html
* https://www.suse.com/security/cve/CVE-2025-21759.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21761.html
* https://www.suse.com/security/cve/CVE-2025-21762.html
* https://www.suse.com/security/cve/CVE-2025-21763.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21773.html
* https://www.suse.com/security/cve/CVE-2025-21775.html
* https://www.suse.com/security/cve/CVE-2025-21776.html
* https://www.suse.com/security/cve/CVE-2025-21779.html
* https://www.suse.com/security/cve/CVE-2025-21780.html
* https://www.suse.com/security/cve/CVE-2025-21781.html
* https://www.suse.com/security/cve/CVE-2025-21782.html
* https://www.suse.com/security/cve/CVE-2025-21784.html
* https://www.suse.com/security/cve/CVE-2025-21785.html
* https://www.suse.com/security/cve/CVE-2025-21791.html
* https://www.suse.com/security/cve/CVE-2025-21793.html
* https://www.suse.com/security/cve/CVE-2025-21794.html
* https://www.suse.com/security/cve/CVE-2025-21796.html
* https://www.suse.com/security/cve/CVE-2025-21804.html
* https://www.suse.com/security/cve/CVE-2025-21810.html
* https://www.suse.com/security/cve/CVE-2025-21815.html
* https://www.suse.com/security/cve/CVE-2025-21819.html
* https://www.suse.com/security/cve/CVE-2025-21820.html
* https://www.suse.com/security/cve/CVE-2025-21821.html
* https://www.suse.com/security/cve/CVE-2025-21823.html
* https://www.suse.com/security/cve/CVE-2025-21825.html
* https://www.suse.com/security/cve/CVE-2025-21828.html
* https://www.suse.com/security/cve/CVE-2025-21829.html
* https://www.suse.com/security/cve/CVE-2025-21830.html
* https://www.suse.com/security/cve/CVE-2025-21831.html
* https://www.suse.com/security/cve/CVE-2025-21832.html
* https://www.suse.com/security/cve/CVE-2025-21835.html
* https://www.suse.com/security/cve/CVE-2025-21838.html
* https://www.suse.com/security/cve/CVE-2025-21844.html
* https://www.suse.com/security/cve/CVE-2025-21846.html
* https://www.suse.com/security/cve/CVE-2025-21847.html
* https://www.suse.com/security/cve/CVE-2025-21848.html
* https://www.suse.com/security/cve/CVE-2025-21850.html
* https://www.suse.com/security/cve/CVE-2025-21855.html
* https://www.suse.com/security/cve/CVE-2025-21856.html
* https://www.suse.com/security/cve/CVE-2025-21857.html
* https://www.suse.com/security/cve/CVE-2025-21858.html
* https://www.suse.com/security/cve/CVE-2025-21859.html
* https://www.suse.com/security/cve/CVE-2025-21861.html
* https://www.suse.com/security/cve/CVE-2025-21862.html
* https://www.suse.com/security/cve/CVE-2025-21864.html
* https://www.suse.com/security/cve/CVE-2025-21865.html
* https://www.suse.com/security/cve/CVE-2025-21866.html
* https://www.suse.com/security/cve/CVE-2025-21869.html
* https://www.suse.com/security/cve/CVE-2025-21870.html
* https://www.suse.com/security/cve/CVE-2025-21871.html
* https://www.suse.com/security/cve/CVE-2025-21876.html
* https://www.suse.com/security/cve/CVE-2025-21877.html
* https://www.suse.com/security/cve/CVE-2025-21878.html
* https://www.suse.com/security/cve/CVE-2025-21883.html
* https://www.suse.com/security/cve/CVE-2025-21885.html
* https://www.suse.com/security/cve/CVE-2025-21886.html
* https://www.suse.com/security/cve/CVE-2025-21888.html
* https://www.suse.com/security/cve/CVE-2025-21890.html
* https://www.suse.com/security/cve/CVE-2025-21891.html
* https://www.suse.com/security/cve/CVE-2025-21892.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1215211
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1221651
* https://bugzilla.suse.com/show_bug.cgi?id=1222649
* https://bugzilla.suse.com/show_bug.cgi?id=1223047
* https://bugzilla.suse.com/show_bug.cgi?id=1224489
* https://bugzilla.suse.com/show_bug.cgi?id=1224610
* https://bugzilla.suse.com/show_bug.cgi?id=1225533
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225770
* https://bugzilla.suse.com/show_bug.cgi?id=1226871
* https://bugzilla.suse.com/show_bug.cgi?id=1227858
* https://bugzilla.suse.com/show_bug.cgi?id=1228653
* https://bugzilla.suse.com/show_bug.cgi?id=1229311
* https://bugzilla.suse.com/show_bug.cgi?id=1229361
* https://bugzilla.suse.com/show_bug.cgi?id=1230497
* https://bugzilla.suse.com/show_bug.cgi?id=1230728
* https://bugzilla.suse.com/show_bug.cgi?id=1230769
* https://bugzilla.suse.com/show_bug.cgi?id=1230832
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231432
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232389
* https://bugzilla.suse.com/show_bug.cgi?id=1232421
* https://bugzilla.suse.com/show_bug.cgi?id=1232743
* https://bugzilla.suse.com/show_bug.cgi?id=1232812
* https://bugzilla.suse.com/show_bug.cgi?id=1232848
* https://bugzilla.suse.com/show_bug.cgi?id=1232895
* https://bugzilla.suse.com/show_bug.cgi?id=1233033
* https://bugzilla.suse.com/show_bug.cgi?id=1233060
* https://bugzilla.suse.com/show_bug.cgi?id=1233259
* https://bugzilla.suse.com/show_bug.cgi?id=1233260
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233551
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233749
* https://bugzilla.suse.com/show_bug.cgi?id=1234222
* https://bugzilla.suse.com/show_bug.cgi?id=1234480
* https://bugzilla.suse.com/show_bug.cgi?id=1234828
* https://bugzilla.suse.com/show_bug.cgi?id=1234936
* https://bugzilla.suse.com/show_bug.cgi?id=1235436
* https://bugzilla.suse.com/show_bug.cgi?id=1235455
* https://bugzilla.suse.com/show_bug.cgi?id=1235501
* https://bugzilla.suse.com/show_bug.cgi?id=1235524
* https://bugzilla.suse.com/show_bug.cgi?id=1235589
* https://bugzilla.suse.com/show_bug.cgi?id=1235591
* https://bugzilla.suse.com/show_bug.cgi?id=1235621
* https://bugzilla.suse.com/show_bug.cgi?id=1235637
* https://bugzilla.suse.com/show_bug.cgi?id=1235698
* https://bugzilla.suse.com/show_bug.cgi?id=1235711
* https://bugzilla.suse.com/show_bug.cgi?id=1235712
* https://bugzilla.suse.com/show_bug.cgi?id=1235715
* https://bugzilla.suse.com/show_bug.cgi?id=1235729
* https://bugzilla.suse.com/show_bug.cgi?id=1235733
* https://bugzilla.suse.com/show_bug.cgi?id=1235761
* https://bugzilla.suse.com/show_bug.cgi?id=1235870
* https://bugzilla.suse.com/show_bug.cgi?id=1235973
* https://bugzilla.suse.com/show_bug.cgi?id=1236099
* https://bugzilla.suse.com/show_bug.cgi?id=1236111
* https://bugzilla.suse.com/show_bug.cgi?id=1236206
* https://bugzilla.suse.com/show_bug.cgi?id=1236333
* https://bugzilla.suse.com/show_bug.cgi?id=1236692
* https://bugzilla.suse.com/show_bug.cgi?id=1237029
* https://bugzilla.suse.com/show_bug.cgi?id=1237164
* https://bugzilla.suse.com/show_bug.cgi?id=1237313
* https://bugzilla.suse.com/show_bug.cgi?id=1237530
* https://bugzilla.suse.com/show_bug.cgi?id=1237558
* https://bugzilla.suse.com/show_bug.cgi?id=1237562
* https://bugzilla.suse.com/show_bug.cgi?id=1237565
* https://bugzilla.suse.com/show_bug.cgi?id=1237571
* https://bugzilla.suse.com/show_bug.cgi?id=1237853
* https://bugzilla.suse.com/show_bug.cgi?id=1237856
* https://bugzilla.suse.com/show_bug.cgi?id=1237873
* https://bugzilla.suse.com/show_bug.cgi?id=1237875
* https://bugzilla.suse.com/show_bug.cgi?id=1237876
* https://bugzilla.suse.com/show_bug.cgi?id=1237877
* https://bugzilla.suse.com/show_bug.cgi?id=1237881
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237890
* https://bugzilla.suse.com/show_bug.cgi?id=1237894
* https://bugzilla.suse.com/show_bug.cgi?id=1237897
* https://bugzilla.suse.com/show_bug.cgi?id=1237900
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1237907
* https://bugzilla.suse.com/show_bug.cgi?id=1237911
* https://bugzilla.suse.com/show_bug.cgi?id=1237912
* https://bugzilla.suse.com/show_bug.cgi?id=1237950
* https://bugzilla.suse.com/show_bug.cgi?id=1238212
* https://bugzilla.suse.com/show_bug.cgi?id=1238474
* https://bugzilla.suse.com/show_bug.cgi?id=1238475
* https://bugzilla.suse.com/show_bug.cgi?id=1238479
* https://bugzilla.suse.com/show_bug.cgi?id=1238497
* https://bugzilla.suse.com/show_bug.cgi?id=1238500
* https://bugzilla.suse.com/show_bug.cgi?id=1238501
* https://bugzilla.suse.com/show_bug.cgi?id=1238502
* https://bugzilla.suse.com/show_bug.cgi?id=1238503
* https://bugzilla.suse.com/show_bug.cgi?id=1238506
* https://bugzilla.suse.com/show_bug.cgi?id=1238507
* https://bugzilla.suse.com/show_bug.cgi?id=1238510
* https://bugzilla.suse.com/show_bug.cgi?id=1238511
* https://bugzilla.suse.com/show_bug.cgi?id=1238512
* https://bugzilla.suse.com/show_bug.cgi?id=1238523
* https://bugzilla.suse.com/show_bug.cgi?id=1238526
* https://bugzilla.suse.com/show_bug.cgi?id=1238528
* https://bugzilla.suse.com/show_bug.cgi?id=1238529
* https://bugzilla.suse.com/show_bug.cgi?id=1238531
* https://bugzilla.suse.com/show_bug.cgi?id=1238532
* https://bugzilla.suse.com/show_bug.cgi?id=1238715
* https://bugzilla.suse.com/show_bug.cgi?id=1238716
* https://bugzilla.suse.com/show_bug.cgi?id=1238734
* https://bugzilla.suse.com/show_bug.cgi?id=1238735
* https://bugzilla.suse.com/show_bug.cgi?id=1238736
* https://bugzilla.suse.com/show_bug.cgi?id=1238738
* https://bugzilla.suse.com/show_bug.cgi?id=1238747
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238757
* https://bugzilla.suse.com/show_bug.cgi?id=1238760
* https://bugzilla.suse.com/show_bug.cgi?id=1238762
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1238767
* https://bugzilla.suse.com/show_bug.cgi?id=1238768
* https://bugzilla.suse.com/show_bug.cgi?id=1238771
* https://bugzilla.suse.com/show_bug.cgi?id=1238772
* https://bugzilla.suse.com/show_bug.cgi?id=1238773
* https://bugzilla.suse.com/show_bug.cgi?id=1238775
* https://bugzilla.suse.com/show_bug.cgi?id=1238780
* https://bugzilla.suse.com/show_bug.cgi?id=1238781
* https://bugzilla.suse.com/show_bug.cgi?id=1238785
* https://bugzilla.suse.com/show_bug.cgi?id=1238864
* https://bugzilla.suse.com/show_bug.cgi?id=1238865
* https://bugzilla.suse.com/show_bug.cgi?id=1238876
* https://bugzilla.suse.com/show_bug.cgi?id=1238903
* https://bugzilla.suse.com/show_bug.cgi?id=1238904
* https://bugzilla.suse.com/show_bug.cgi?id=1238905
* https://bugzilla.suse.com/show_bug.cgi?id=1238909
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238917
* https://bugzilla.suse.com/show_bug.cgi?id=1238958
* https://bugzilla.suse.com/show_bug.cgi?id=1238959
* https://bugzilla.suse.com/show_bug.cgi?id=1238963
* https://bugzilla.suse.com/show_bug.cgi?id=1238964
* https://bugzilla.suse.com/show_bug.cgi?id=1238969
* https://bugzilla.suse.com/show_bug.cgi?id=1238971
* https://bugzilla.suse.com/show_bug.cgi?id=1238973
* https://bugzilla.suse.com/show_bug.cgi?id=1238975
* https://bugzilla.suse.com/show_bug.cgi?id=1238978
* https://bugzilla.suse.com/show_bug.cgi?id=1238979
* https://bugzilla.suse.com/show_bug.cgi?id=1238981
* https://bugzilla.suse.com/show_bug.cgi?id=1238984
* https://bugzilla.suse.com/show_bug.cgi?id=1238986
* https://bugzilla.suse.com/show_bug.cgi?id=1238993
* https://bugzilla.suse.com/show_bug.cgi?id=1238994
* https://bugzilla.suse.com/show_bug.cgi?id=1238997
* https://bugzilla.suse.com/show_bug.cgi?id=1239015
* https://bugzilla.suse.com/show_bug.cgi?id=1239016
* https://bugzilla.suse.com/show_bug.cgi?id=1239027
* https://bugzilla.suse.com/show_bug.cgi?id=1239029
* https://bugzilla.suse.com/show_bug.cgi?id=1239030
* https://bugzilla.suse.com/show_bug.cgi?id=1239033
* https://bugzilla.suse.com/show_bug.cgi?id=1239034
* https://bugzilla.suse.com/show_bug.cgi?id=1239036
* https://bugzilla.suse.com/show_bug.cgi?id=1239037
* https://bugzilla.suse.com/show_bug.cgi?id=1239038
* https://bugzilla.suse.com/show_bug.cgi?id=1239039
* https://bugzilla.suse.com/show_bug.cgi?id=1239045
* https://bugzilla.suse.com/show_bug.cgi?id=1239065
* https://bugzilla.suse.com/show_bug.cgi?id=1239068
* https://bugzilla.suse.com/show_bug.cgi?id=1239073
* https://bugzilla.suse.com/show_bug.cgi?id=1239076
* https://bugzilla.suse.com/show_bug.cgi?id=1239080
* https://bugzilla.suse.com/show_bug.cgi?id=1239085
* https://bugzilla.suse.com/show_bug.cgi?id=1239087
* https://bugzilla.suse.com/show_bug.cgi?id=1239095
* https://bugzilla.suse.com/show_bug.cgi?id=1239104
* https://bugzilla.suse.com/show_bug.cgi?id=1239105
* https://bugzilla.suse.com/show_bug.cgi?id=1239109
* https://bugzilla.suse.com/show_bug.cgi?id=1239112
* https://bugzilla.suse.com/show_bug.cgi?id=1239114
* https://bugzilla.suse.com/show_bug.cgi?id=1239115
* https://bugzilla.suse.com/show_bug.cgi?id=1239117
* https://bugzilla.suse.com/show_bug.cgi?id=1239167
* https://bugzilla.suse.com/show_bug.cgi?id=1239174
* https://bugzilla.suse.com/show_bug.cgi?id=1239346
* https://bugzilla.suse.com/show_bug.cgi?id=1239349
* https://bugzilla.suse.com/show_bug.cgi?id=1239435
* https://bugzilla.suse.com/show_bug.cgi?id=1239467
* https://bugzilla.suse.com/show_bug.cgi?id=1239468
* https://bugzilla.suse.com/show_bug.cgi?id=1239471
* https://bugzilla.suse.com/show_bug.cgi?id=1239473
* https://bugzilla.suse.com/show_bug.cgi?id=1239474
* https://bugzilla.suse.com/show_bug.cgi?id=1239477
* https://bugzilla.suse.com/show_bug.cgi?id=1239478
* https://bugzilla.suse.com/show_bug.cgi?id=1239479
* https://bugzilla.suse.com/show_bug.cgi?id=1239481
* https://bugzilla.suse.com/show_bug.cgi?id=1239482
* https://bugzilla.suse.com/show_bug.cgi?id=1239483
* https://bugzilla.suse.com/show_bug.cgi?id=1239484
* https://bugzilla.suse.com/show_bug.cgi?id=1239486
* https://bugzilla.suse.com/show_bug.cgi?id=1239508
* https://bugzilla.suse.com/show_bug.cgi?id=1239512
* https://bugzilla.suse.com/show_bug.cgi?id=1239518
* https://bugzilla.suse.com/show_bug.cgi?id=1239573
* https://bugzilla.suse.com/show_bug.cgi?id=1239594
* https://bugzilla.suse.com/show_bug.cgi?id=1239595
* https://bugzilla.suse.com/show_bug.cgi?id=1239600
* https://bugzilla.suse.com/show_bug.cgi?id=1239605
* https://bugzilla.suse.com/show_bug.cgi?id=1239615
* https://bugzilla.suse.com/show_bug.cgi?id=1239644
* https://bugzilla.suse.com/show_bug.cgi?id=1239707
* https://bugzilla.suse.com/show_bug.cgi?id=1239986
* https://bugzilla.suse.com/show_bug.cgi?id=1239994
* https://bugzilla.suse.com/show_bug.cgi?id=1240169
* https://bugzilla.suse.com/show_bug.cgi?id=1240172
* https://bugzilla.suse.com/show_bug.cgi?id=1240173
* https://bugzilla.suse.com/show_bug.cgi?id=1240175
* https://bugzilla.suse.com/show_bug.cgi?id=1240177
* https://bugzilla.suse.com/show_bug.cgi?id=1240179
* https://bugzilla.suse.com/show_bug.cgi?id=1240182
* https://bugzilla.suse.com/show_bug.cgi?id=1240183
* https://bugzilla.suse.com/show_bug.cgi?id=1240186
* https://bugzilla.suse.com/show_bug.cgi?id=1240188
* https://bugzilla.suse.com/show_bug.cgi?id=1240189
* https://bugzilla.suse.com/show_bug.cgi?id=1240191
* https://bugzilla.suse.com/show_bug.cgi?id=1240192
* https://bugzilla.suse.com/show_bug.cgi?id=1240333
* https://bugzilla.suse.com/show_bug.cgi?id=1240334
* https://jira.suse.com/browse/PED-10701
* https://jira.suse.com/browse/PED-12251
* https://jira.suse.com/browse/PED-12416
SUSE-SU-2025:1172-1: moderate: Security update for poppler
# Security update for poppler
Announcement ID: SUSE-SU-2025:1172-1
Release Date: 2025-04-08T13:36:26Z
Rating: moderate
References:
* bsc#1240880
* bsc#1240881
Cross-References:
* CVE-2025-32364
* CVE-2025-32365
CVSS scores:
* CVE-2025-32364 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-32364 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-32364 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-32365 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-32365 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-32365 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for poppler fixes the following issues:
* CVE-2025-32364: Fixed a floating point exception. (bsc#1240880)
* CVE-2025-32365: Fixed the isOk check in JBIG2Bitmap::combine function in
JBIG2Stream.cc. (bsc#1240881)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-1172=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libpoppler-qt6-3-22.01.0-150400.3.28.1
* poppler-debugsource-22.01.0-150400.3.28.1
* libpoppler-cpp0-22.01.0-150400.3.28.1
* libpoppler-glib-devel-22.01.0-150400.3.28.1
* typelib-1_0-Poppler-0_18-22.01.0-150400.3.28.1
* libpoppler-qt6-3-debuginfo-22.01.0-150400.3.28.1
* libpoppler-cpp0-debuginfo-22.01.0-150400.3.28.1
* poppler-tools-22.01.0-150400.3.28.1
* poppler-tools-debuginfo-22.01.0-150400.3.28.1
* libpoppler-qt5-1-22.01.0-150400.3.28.1
* libpoppler-qt6-devel-22.01.0-150400.3.28.1
* libpoppler117-22.01.0-150400.3.28.1
* libpoppler117-debuginfo-22.01.0-150400.3.28.1
* libpoppler-glib8-22.01.0-150400.3.28.1
* libpoppler-glib8-debuginfo-22.01.0-150400.3.28.1
* poppler-qt5-debugsource-22.01.0-150400.3.28.1
* poppler-qt6-debugsource-22.01.0-150400.3.28.1
* libpoppler-qt5-devel-22.01.0-150400.3.28.1
* libpoppler-qt5-1-debuginfo-22.01.0-150400.3.28.1
* libpoppler-devel-22.01.0-150400.3.28.1
* openSUSE Leap 15.4 (x86_64)
* libpoppler117-32bit-22.01.0-150400.3.28.1
* libpoppler-glib8-32bit-22.01.0-150400.3.28.1
* libpoppler117-32bit-debuginfo-22.01.0-150400.3.28.1
* libpoppler-qt5-1-32bit-22.01.0-150400.3.28.1
* libpoppler-glib8-32bit-debuginfo-22.01.0-150400.3.28.1
* libpoppler-cpp0-32bit-debuginfo-22.01.0-150400.3.28.1
* libpoppler-cpp0-32bit-22.01.0-150400.3.28.1
* libpoppler-qt5-1-32bit-debuginfo-22.01.0-150400.3.28.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libpoppler117-64bit-22.01.0-150400.3.28.1
* libpoppler-qt5-1-64bit-22.01.0-150400.3.28.1
* libpoppler-cpp0-64bit-22.01.0-150400.3.28.1
* libpoppler-cpp0-64bit-debuginfo-22.01.0-150400.3.28.1
* libpoppler-qt5-1-64bit-debuginfo-22.01.0-150400.3.28.1
* libpoppler117-64bit-debuginfo-22.01.0-150400.3.28.1
* libpoppler-glib8-64bit-22.01.0-150400.3.28.1
* libpoppler-glib8-64bit-debuginfo-22.01.0-150400.3.28.1
## References:
* https://www.suse.com/security/cve/CVE-2025-32364.html
* https://www.suse.com/security/cve/CVE-2025-32365.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240880
* https://bugzilla.suse.com/show_bug.cgi?id=1240881
SUSE-SU-2025:1173-1: moderate: Security update for poppler
# Security update for poppler
Announcement ID: SUSE-SU-2025:1173-1
Release Date: 2025-04-08T13:36:38Z
Rating: moderate
References:
* bsc#1240880
* bsc#1240881
Cross-References:
* CVE-2025-32364
* CVE-2025-32365
CVSS scores:
* CVE-2025-32364 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-32364 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-32364 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-32365 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-32365 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-32365 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for poppler fixes the following issues:
* CVE-2025-32364: Fixed a floating point exception. (bsc#1240880)
* CVE-2025-32365: Fixed the isOk check in JBIG2Bitmap::combine function in
JBIG2Stream.cc. (bsc#1240881)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-1173=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libpoppler-qt5-1-23.01.0-150500.3.17.1
* libpoppler126-23.01.0-150500.3.17.1
* poppler-tools-debuginfo-23.01.0-150500.3.17.1
* libpoppler-glib8-debuginfo-23.01.0-150500.3.17.1
* poppler-debugsource-23.01.0-150500.3.17.1
* libpoppler-glib8-23.01.0-150500.3.17.1
* libpoppler-qt5-devel-23.01.0-150500.3.17.1
* poppler-qt5-debugsource-23.01.0-150500.3.17.1
* libpoppler-qt6-3-debuginfo-23.01.0-150500.3.17.1
* libpoppler-qt5-1-debuginfo-23.01.0-150500.3.17.1
* typelib-1_0-Poppler-0_18-23.01.0-150500.3.17.1
* libpoppler-qt6-devel-23.01.0-150500.3.17.1
* libpoppler126-debuginfo-23.01.0-150500.3.17.1
* poppler-qt6-debugsource-23.01.0-150500.3.17.1
* libpoppler-cpp0-23.01.0-150500.3.17.1
* poppler-tools-23.01.0-150500.3.17.1
* libpoppler-cpp0-debuginfo-23.01.0-150500.3.17.1
* libpoppler-qt6-3-23.01.0-150500.3.17.1
* libpoppler-glib-devel-23.01.0-150500.3.17.1
* libpoppler-devel-23.01.0-150500.3.17.1
* openSUSE Leap 15.5 (x86_64)
* libpoppler126-32bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler-qt5-1-32bit-23.01.0-150500.3.17.1
* libpoppler-cpp0-32bit-23.01.0-150500.3.17.1
* libpoppler126-32bit-23.01.0-150500.3.17.1
* libpoppler-qt5-1-32bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler-cpp0-32bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler-glib8-32bit-23.01.0-150500.3.17.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libpoppler-glib8-64bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler-cpp0-64bit-23.01.0-150500.3.17.1
* libpoppler-qt5-1-64bit-23.01.0-150500.3.17.1
* libpoppler-qt5-1-64bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler-glib8-64bit-23.01.0-150500.3.17.1
* libpoppler126-64bit-23.01.0-150500.3.17.1
* libpoppler-cpp0-64bit-debuginfo-23.01.0-150500.3.17.1
* libpoppler126-64bit-debuginfo-23.01.0-150500.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2025-32364.html
* https://www.suse.com/security/cve/CVE-2025-32365.html
* https://bugzilla.suse.com/show_bug.cgi?id=1240880
* https://bugzilla.suse.com/show_bug.cgi?id=1240881
SUSE-SU-2025:1176-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:1176-1
Release Date:
Rating: important
References:
* bsc#1065729
* bsc#1180814
* bsc#1183682
* bsc#1190336
* bsc#1190768
* bsc#1190786
* bsc#1193629
* bsc#1194869
* bsc#1194904
* bsc#1195823
* bsc#1196444
* bsc#1197158
* bsc#1197174
* bsc#1197227
* bsc#1197246
* bsc#1197302
* bsc#1197331
* bsc#1197472
* bsc#1197661
* bsc#1197926
* bsc#1198019
* bsc#1198021
* bsc#1198240
* bsc#1198577
* bsc#1198660
* bsc#1199657
* bsc#1200045
* bsc#1200571
* bsc#1200807
* bsc#1200809
* bsc#1200810
* bsc#1200824
* bsc#1200825
* bsc#1200871
* bsc#1200872
* bsc#1201193
* bsc#1201218
* bsc#1201323
* bsc#1201381
* bsc#1201610
* bsc#1202672
* bsc#1202711
* bsc#1202712
* bsc#1202771
* bsc#1202774
* bsc#1202778
* bsc#1202781
* bsc#1203699
* bsc#1203769
* bsc#1204171
* bsc#1205205
* bsc#1205701
* bsc#1206048
* bsc#1206049
* bsc#1206451
* bsc#1207034
* bsc#1207186
* bsc#1207361
* bsc#1207593
* bsc#1207640
* bsc#1207878
* bsc#1209262
* bsc#1209547
* bsc#1209788
* bsc#1209980
* bsc#1210050
* bsc#1210647
* bsc#1211263
* bsc#1213167
* bsc#1218450
* bsc#1221651
* bsc#1225428
* bsc#1225742
* bsc#1229312
* bsc#1231375
* bsc#1231432
* bsc#1231854
* bsc#1232299
* bsc#1232743
* bsc#1233479
* bsc#1233557
* bsc#1233749
* bsc#1234074
* bsc#1234894
* bsc#1234895
* bsc#1234896
* bsc#1235528
* bsc#1235599
* bsc#1235870
* bsc#1237029
* bsc#1237521
* bsc#1237530
* bsc#1237718
* bsc#1237721
* bsc#1237722
* bsc#1237723
* bsc#1237724
* bsc#1237725
* bsc#1237726
* bsc#1237727
* bsc#1237728
* bsc#1237729
* bsc#1237730
* bsc#1237733
* bsc#1237734
* bsc#1237735
* bsc#1237736
* bsc#1237737
* bsc#1237738
* bsc#1237739
* bsc#1237740
* bsc#1237742
* bsc#1237743
* bsc#1237744
* bsc#1237745
* bsc#1237746
* bsc#1237748
* bsc#1237749
* bsc#1237751
* bsc#1237752
* bsc#1237753
* bsc#1237755
* bsc#1237759
* bsc#1237761
* bsc#1237763
* bsc#1237766
* bsc#1237767
* bsc#1237768
* bsc#1237774
* bsc#1237775
* bsc#1237778
* bsc#1237779
* bsc#1237780
* bsc#1237782
* bsc#1237783
* bsc#1237784
* bsc#1237785
* bsc#1237786
* bsc#1237787
* bsc#1237788
* bsc#1237789
* bsc#1237790
* bsc#1237792
* bsc#1237794
* bsc#1237795
* bsc#1237797
* bsc#1237798
* bsc#1237799
* bsc#1237807
* bsc#1237808
* bsc#1237809
* bsc#1237810
* bsc#1237812
* bsc#1237813
* bsc#1237814
* bsc#1237815
* bsc#1237816
* bsc#1237817
* bsc#1237818
* bsc#1237820
* bsc#1237821
* bsc#1237823
* bsc#1237824
* bsc#1237826
* bsc#1237827
* bsc#1237829
* bsc#1237831
* bsc#1237835
* bsc#1237836
* bsc#1237837
* bsc#1237839
* bsc#1237840
* bsc#1237845
* bsc#1237846
* bsc#1237868
* bsc#1237872
* bsc#1237892
* bsc#1237903
* bsc#1237904
* bsc#1237916
* bsc#1237918
* bsc#1237922
* bsc#1237925
* bsc#1237926
* bsc#1237927
* bsc#1237928
* bsc#1237929
* bsc#1237931
* bsc#1237932
* bsc#1237933
* bsc#1237937
* bsc#1237939
* bsc#1237940
* bsc#1237941
* bsc#1237942
* bsc#1237946
* bsc#1237951
* bsc#1237952
* bsc#1237954
* bsc#1237955
* bsc#1237957
* bsc#1237958
* bsc#1237959
* bsc#1237960
* bsc#1237961
* bsc#1237962
* bsc#1237963
* bsc#1237965
* bsc#1237966
* bsc#1237967
* bsc#1237968
* bsc#1237969
* bsc#1237970
* bsc#1237971
* bsc#1237972
* bsc#1237973
* bsc#1237975
* bsc#1237976
* bsc#1237978
* bsc#1237979
* bsc#1237980
* bsc#1237982
* bsc#1237983
* bsc#1237984
* bsc#1237986
* bsc#1237987
* bsc#1237990
* bsc#1237992
* bsc#1237996
* bsc#1237997
* bsc#1237998
* bsc#1237999
* bsc#1238000
* bsc#1238003
* bsc#1238004
* bsc#1238005
* bsc#1238006
* bsc#1238007
* bsc#1238009
* bsc#1238010
* bsc#1238011
* bsc#1238012
* bsc#1238013
* bsc#1238014
* bsc#1238016
* bsc#1238017
* bsc#1238018
* bsc#1238019
* bsc#1238021
* bsc#1238022
* bsc#1238024
* bsc#1238025
* bsc#1238030
* bsc#1238032
* bsc#1238036
* bsc#1238037
* bsc#1238041
* bsc#1238046
* bsc#1238047
* bsc#1238048
* bsc#1238069
* bsc#1238071
* bsc#1238077
* bsc#1238079
* bsc#1238080
* bsc#1238083
* bsc#1238084
* bsc#1238085
* bsc#1238086
* bsc#1238089
* bsc#1238090
* bsc#1238091
* bsc#1238092
* bsc#1238096
* bsc#1238097
* bsc#1238099
* bsc#1238103
* bsc#1238105
* bsc#1238106
* bsc#1238107
* bsc#1238108
* bsc#1238110
* bsc#1238111
* bsc#1238112
* bsc#1238113
* bsc#1238114
* bsc#1238115
* bsc#1238116
* bsc#1238118
* bsc#1238120
* bsc#1238122
* bsc#1238123
* bsc#1238125
* bsc#1238126
* bsc#1238127
* bsc#1238128
* bsc#1238131
* bsc#1238134
* bsc#1238135
* bsc#1238138
* bsc#1238139
* bsc#1238140
* bsc#1238142
* bsc#1238144
* bsc#1238146
* bsc#1238147
* bsc#1238149
* bsc#1238150
* bsc#1238153
* bsc#1238155
* bsc#1238156
* bsc#1238157
* bsc#1238158
* bsc#1238160
* bsc#1238162
* bsc#1238166
* bsc#1238167
* bsc#1238168
* bsc#1238169
* bsc#1238170
* bsc#1238171
* bsc#1238172
* bsc#1238175
* bsc#1238176
* bsc#1238177
* bsc#1238178
* bsc#1238179
* bsc#1238180
* bsc#1238181
* bsc#1238183
* bsc#1238184
* bsc#1238187
* bsc#1238221
* bsc#1238222
* bsc#1238226
* bsc#1238228
* bsc#1238229
* bsc#1238231
* bsc#1238233
* bsc#1238234
* bsc#1238235
* bsc#1238236
* bsc#1238238
* bsc#1238239
* bsc#1238240
* bsc#1238241
* bsc#1238242
* bsc#1238243
* bsc#1238244
* bsc#1238246
* bsc#1238247
* bsc#1238248
* bsc#1238249
* bsc#1238252
* bsc#1238253
* bsc#1238255
* bsc#1238256
* bsc#1238257
* bsc#1238260
* bsc#1238261
* bsc#1238262
* bsc#1238263
* bsc#1238264
* bsc#1238266
* bsc#1238267
* bsc#1238268
* bsc#1238269
* bsc#1238270
* bsc#1238271
* bsc#1238272
* bsc#1238274
* bsc#1238275
* bsc#1238276
* bsc#1238277
* bsc#1238278
* bsc#1238279
* bsc#1238281
* bsc#1238282
* bsc#1238283
* bsc#1238284
* bsc#1238285
* bsc#1238286
* bsc#1238287
* bsc#1238288
* bsc#1238289
* bsc#1238291
* bsc#1238292
* bsc#1238293
* bsc#1238295
* bsc#1238298
* bsc#1238300
* bsc#1238301
* bsc#1238302
* bsc#1238306
* bsc#1238307
* bsc#1238308
* bsc#1238309
* bsc#1238311
* bsc#1238313
* bsc#1238326
* bsc#1238327
* bsc#1238328
* bsc#1238329
* bsc#1238331
* bsc#1238333
* bsc#1238334
* bsc#1238335
* bsc#1238336
* bsc#1238337
* bsc#1238338
* bsc#1238339
* bsc#1238341
* bsc#1238343
* bsc#1238344
* bsc#1238345
* bsc#1238372
* bsc#1238373
* bsc#1238374
* bsc#1238376
* bsc#1238377
* bsc#1238378
* bsc#1238381
* bsc#1238382
* bsc#1238383
* bsc#1238385
* bsc#1238386
* bsc#1238387
* bsc#1238388
* bsc#1238389
* bsc#1238390
* bsc#1238391
* bsc#1238392
* bsc#1238393
* bsc#1238394
* bsc#1238395
* bsc#1238396
* bsc#1238397
* bsc#1238398
* bsc#1238400
* bsc#1238401
* bsc#1238410
* bsc#1238411
* bsc#1238413
* bsc#1238415
* bsc#1238416
* bsc#1238417
* bsc#1238418
* bsc#1238419
* bsc#1238420
* bsc#1238422
* bsc#1238423
* bsc#1238424
* bsc#1238428
* bsc#1238429
* bsc#1238430
* bsc#1238431
* bsc#1238432
* bsc#1238433
* bsc#1238434
* bsc#1238435
* bsc#1238436
* bsc#1238437
* bsc#1238440
* bsc#1238441
* bsc#1238442
* bsc#1238443
* bsc#1238444
* bsc#1238445
* bsc#1238446
* bsc#1238447
* bsc#1238453
* bsc#1238454
* bsc#1238458
* bsc#1238459
* bsc#1238462
* bsc#1238463
* bsc#1238465
* bsc#1238467
* bsc#1238469
* bsc#1238533
* bsc#1238536
* bsc#1238538
* bsc#1238539
* bsc#1238540
* bsc#1238542
* bsc#1238543
* bsc#1238545
* bsc#1238546
* bsc#1238551
* bsc#1238552
* bsc#1238556
* bsc#1238557
* bsc#1238599
* bsc#1238600
* bsc#1238601
* bsc#1238602
* bsc#1238605
* bsc#1238612
* bsc#1238613
* bsc#1238615
* bsc#1238616
* bsc#1238617
* bsc#1238618
* bsc#1238619
* bsc#1238621
* bsc#1238623
* bsc#1238625
* bsc#1238626
* bsc#1238630
* bsc#1238631
* bsc#1238632
* bsc#1238633
* bsc#1238635
* bsc#1238636
* bsc#1238638
* bsc#1238639
* bsc#1238640
* bsc#1238641
* bsc#1238642
* bsc#1238643
* bsc#1238645
* bsc#1238646
* bsc#1238647
* bsc#1238648
* bsc#1238649
* bsc#1238650
* bsc#1238653
* bsc#1238654
* bsc#1238655
* bsc#1238658
* bsc#1238661
* bsc#1238662
* bsc#1238663
* bsc#1238664
* bsc#1238666
* bsc#1238668
* bsc#1238705
* bsc#1238707
* bsc#1238710
* bsc#1238712
* bsc#1238718
* bsc#1238719
* bsc#1238721
* bsc#1238722
* bsc#1238727
* bsc#1238729
* bsc#1238750
* bsc#1238787
* bsc#1238789
* bsc#1238792
* bsc#1238799
* bsc#1238803
* bsc#1238804
* bsc#1238805
* bsc#1238806
* bsc#1238808
* bsc#1238809
* bsc#1238810
* bsc#1238811
* bsc#1238814
* bsc#1238815
* bsc#1238816
* bsc#1238817
* bsc#1238818
* bsc#1238819
* bsc#1238820
* bsc#1238821
* bsc#1238822
* bsc#1238823
* bsc#1238825
* bsc#1238830
* bsc#1238834
* bsc#1238835
* bsc#1238836
* bsc#1238838
* bsc#1238843
* bsc#1238867
* bsc#1238868
* bsc#1238869
* bsc#1238870
* bsc#1238871
* bsc#1238878
* bsc#1238889
* bsc#1238892
* bsc#1238893
* bsc#1238897
* bsc#1238898
* bsc#1238899
* bsc#1238902
* bsc#1238911
* bsc#1238916
* bsc#1238919
* bsc#1238925
* bsc#1238930
* bsc#1238933
* bsc#1238936
* bsc#1238937
* bsc#1238938
* bsc#1238939
* bsc#1238941
* bsc#1238942
* bsc#1238943
* bsc#1238944
* bsc#1238945
* bsc#1238946
* bsc#1238948
* bsc#1238949
* bsc#1238950
* bsc#1238951
* bsc#1238952
* bsc#1238953
* bsc#1238954
* bsc#1238956
* bsc#1238957
* bsc#1239001
* bsc#1239004
* bsc#1239016
* bsc#1239035
* bsc#1239040
* bsc#1239041
* bsc#1239051
* bsc#1239060
* bsc#1239070
* bsc#1239071
* bsc#1239073
* bsc#1239076
* bsc#1239095
* bsc#1239109
* bsc#1239115
* bsc#1239126
* bsc#1239452
* bsc#1239454
* bsc#1239968
* bsc#1239969
* bsc#1240133
* bsc#1240205
* bsc#1240207
* bsc#1240208
* bsc#1240210
* bsc#1240212
* bsc#1240213
* bsc#1240218
* bsc#1240220
* bsc#1240227
* bsc#1240229
* bsc#1240231
* bsc#1240242
* bsc#1240245
* bsc#1240247
* bsc#1240250
* bsc#1240254
* bsc#1240256
* bsc#1240264
* bsc#1240266
* bsc#1240272
* bsc#1240275
* bsc#1240276
* bsc#1240278
* bsc#1240279
* bsc#1240280
* bsc#1240281
* bsc#1240282
* bsc#1240283
* bsc#1240284
* bsc#1240286
* bsc#1240288
* bsc#1240290
* bsc#1240292
* bsc#1240293
* bsc#1240297
* bsc#1240304
* bsc#1240308
* bsc#1240309
* bsc#1240317
* bsc#1240318
* bsc#1240322
Cross-References:
* CVE-2017-5753
* CVE-2021-4453
* CVE-2021-4454
* CVE-2021-47517
* CVE-2021-47631
* CVE-2021-47632
* CVE-2021-47633
* CVE-2021-47635
* CVE-2021-47636
* CVE-2021-47637
* CVE-2021-47638
* CVE-2021-47639
* CVE-2021-47641
* CVE-2021-47642
* CVE-2021-47643
* CVE-2021-47644
* CVE-2021-47645
* CVE-2021-47646
* CVE-2021-47647
* CVE-2021-47648
* CVE-2021-47649
* CVE-2021-47650
* CVE-2021-47651
* CVE-2021-47652
* CVE-2021-47653
* CVE-2021-47654
* CVE-2021-47656
* CVE-2021-47657
* CVE-2021-47659
* CVE-2022-0168
* CVE-2022-0995
* CVE-2022-1016
* CVE-2022-1048
* CVE-2022-1184
* CVE-2022-2977
* CVE-2022-29900
* CVE-2022-29901
* CVE-2022-3303
* CVE-2022-3435
* CVE-2022-49044
* CVE-2022-49050
* CVE-2022-49051
* CVE-2022-49053
* CVE-2022-49054
* CVE-2022-49055
* CVE-2022-49056
* CVE-2022-49057
* CVE-2022-49058
* CVE-2022-49059
* CVE-2022-49060
* CVE-2022-49061
* CVE-2022-49062
* CVE-2022-49063
* CVE-2022-49064
* CVE-2022-49065
* CVE-2022-49066
* CVE-2022-49070
* CVE-2022-49071
* CVE-2022-49073
* CVE-2022-49074
* CVE-2022-49075
* CVE-2022-49076
* CVE-2022-49078
* CVE-2022-49082
* CVE-2022-49083
* CVE-2022-49084
* CVE-2022-49085
* CVE-2022-49086
* CVE-2022-49088
* CVE-2022-49089
* CVE-2022-49090
* CVE-2022-49091
* CVE-2022-49092
* CVE-2022-49093
* CVE-2022-49095
* CVE-2022-49096
* CVE-2022-49097
* CVE-2022-49098
* CVE-2022-49099
* CVE-2022-49100
* CVE-2022-49102
* CVE-2022-49103
* CVE-2022-49104
* CVE-2022-49105
* CVE-2022-49106
* CVE-2022-49107
* CVE-2022-49109
* CVE-2022-49111
* CVE-2022-49112
* CVE-2022-49113
* CVE-2022-49114
* CVE-2022-49115
* CVE-2022-49116
* CVE-2022-49118
* CVE-2022-49119
* CVE-2022-49120
* CVE-2022-49121
* CVE-2022-49122
* CVE-2022-49123
* CVE-2022-49125
* CVE-2022-49126
* CVE-2022-49128
* CVE-2022-49129
* CVE-2022-49130
* CVE-2022-49131
* CVE-2022-49132
* CVE-2022-49133
* CVE-2022-49134
* CVE-2022-49135
* CVE-2022-49136
* CVE-2022-49137
* CVE-2022-49138
* CVE-2022-49139
* CVE-2022-49144
* CVE-2022-49145
* CVE-2022-49147
* CVE-2022-49148
* CVE-2022-49151
* CVE-2022-49153
* CVE-2022-49154
* CVE-2022-49155
* CVE-2022-49156
* CVE-2022-49157
* CVE-2022-49158
* CVE-2022-49159
* CVE-2022-49160
* CVE-2022-49162
* CVE-2022-49163
* CVE-2022-49164
* CVE-2022-49165
* CVE-2022-49174
* CVE-2022-49175
* CVE-2022-49176
* CVE-2022-49177
* CVE-2022-49178
* CVE-2022-49179
* CVE-2022-49180
* CVE-2022-49182
* CVE-2022-49183
* CVE-2022-49185
* CVE-2022-49187
* CVE-2022-49188
* CVE-2022-49189
* CVE-2022-49192
* CVE-2022-49193
* CVE-2022-49194
* CVE-2022-49196
* CVE-2022-49199
* CVE-2022-49200
* CVE-2022-49201
* CVE-2022-49202
* CVE-2022-49203
* CVE-2022-49204
* CVE-2022-49205
* CVE-2022-49206
* CVE-2022-49207
* CVE-2022-49208
* CVE-2022-49209
* CVE-2022-49212
* CVE-2022-49213
* CVE-2022-49214
* CVE-2022-49215
* CVE-2022-49216
* CVE-2022-49217
* CVE-2022-49218
* CVE-2022-49219
* CVE-2022-49221
* CVE-2022-49222
* CVE-2022-49224
* CVE-2022-49225
* CVE-2022-49226
* CVE-2022-49227
* CVE-2022-49228
* CVE-2022-49230
* CVE-2022-49232
* CVE-2022-49233
* CVE-2022-49235
* CVE-2022-49236
* CVE-2022-49237
* CVE-2022-49238
* CVE-2022-49239
* CVE-2022-49241
* CVE-2022-49242
* CVE-2022-49243
* CVE-2022-49244
* CVE-2022-49246
* CVE-2022-49247
* CVE-2022-49248
* CVE-2022-49249
* CVE-2022-49250
* CVE-2022-49251
* CVE-2022-49252
* CVE-2022-49253
* CVE-2022-49254
* CVE-2022-49256
* CVE-2022-49257
* CVE-2022-49258
* CVE-2022-49259
* CVE-2022-49260
* CVE-2022-49261
* CVE-2022-49262
* CVE-2022-49263
* CVE-2022-49264
* CVE-2022-49265
* CVE-2022-49266
* CVE-2022-49268
* CVE-2022-49269
* CVE-2022-49270
* CVE-2022-49271
* CVE-2022-49272
* CVE-2022-49273
* CVE-2022-49274
* CVE-2022-49275
* CVE-2022-49276
* CVE-2022-49277
* CVE-2022-49278
* CVE-2022-49279
* CVE-2022-49280
* CVE-2022-49281
* CVE-2022-49283
* CVE-2022-49285
* CVE-2022-49286
* CVE-2022-49287
* CVE-2022-49288
* CVE-2022-49290
* CVE-2022-49291
* CVE-2022-49292
* CVE-2022-49293
* CVE-2022-49294
* CVE-2022-49295
* CVE-2022-49296
* CVE-2022-49297
* CVE-2022-49298
* CVE-2022-49299
* CVE-2022-49300
* CVE-2022-49301
* CVE-2022-49302
* CVE-2022-49304
* CVE-2022-49305
* CVE-2022-49306
* CVE-2022-49307
* CVE-2022-49308
* CVE-2022-49309
* CVE-2022-49310
* CVE-2022-49311
* CVE-2022-49312
* CVE-2022-49313
* CVE-2022-49314
* CVE-2022-49315
* CVE-2022-49316
* CVE-2022-49319
* CVE-2022-49320
* CVE-2022-49321
* CVE-2022-49322
* CVE-2022-49323
* CVE-2022-49325
* CVE-2022-49326
* CVE-2022-49327
* CVE-2022-49328
* CVE-2022-49329
* CVE-2022-49330
* CVE-2022-49331
* CVE-2022-49332
* CVE-2022-49333
* CVE-2022-49335
* CVE-2022-49336
* CVE-2022-49337
* CVE-2022-49338
* CVE-2022-49339
* CVE-2022-49341
* CVE-2022-49342
* CVE-2022-49343
* CVE-2022-49345
* CVE-2022-49346
* CVE-2022-49347
* CVE-2022-49348
* CVE-2022-49349
* CVE-2022-49350
* CVE-2022-49351
* CVE-2022-49352
* CVE-2022-49353
* CVE-2022-49354
* CVE-2022-49356
* CVE-2022-49357
* CVE-2022-49359
* CVE-2022-49362
* CVE-2022-49365
* CVE-2022-49367
* CVE-2022-49368
* CVE-2022-49370
* CVE-2022-49371
* CVE-2022-49373
* CVE-2022-49375
* CVE-2022-49376
* CVE-2022-49377
* CVE-2022-49378
* CVE-2022-49379
* CVE-2022-49381
* CVE-2022-49382
* CVE-2022-49384
* CVE-2022-49385
* CVE-2022-49386
* CVE-2022-49389
* CVE-2022-49390
* CVE-2022-49392
* CVE-2022-49394
* CVE-2022-49396
* CVE-2022-49397
* CVE-2022-49398
* CVE-2022-49399
* CVE-2022-49400
* CVE-2022-49402
* CVE-2022-49404
* CVE-2022-49406
* CVE-2022-49407
* CVE-2022-49409
* CVE-2022-49410
* CVE-2022-49411
* CVE-2022-49412
* CVE-2022-49413
* CVE-2022-49414
* CVE-2022-49416
* CVE-2022-49418
* CVE-2022-49419
* CVE-2022-49421
* CVE-2022-49422
* CVE-2022-49424
* CVE-2022-49426
* CVE-2022-49427
* CVE-2022-49429
* CVE-2022-49430
* CVE-2022-49431
* CVE-2022-49432
* CVE-2022-49433
* CVE-2022-49434
* CVE-2022-49435
* CVE-2022-49436
* CVE-2022-49437
* CVE-2022-49438
* CVE-2022-49440
* CVE-2022-49441
* CVE-2022-49442
* CVE-2022-49443
* CVE-2022-49444
* CVE-2022-49445
* CVE-2022-49446
* CVE-2022-49447
* CVE-2022-49448
* CVE-2022-49449
* CVE-2022-49451
* CVE-2022-49453
* CVE-2022-49455
* CVE-2022-49458
* CVE-2022-49459
* CVE-2022-49460
* CVE-2022-49462
* CVE-2022-49463
* CVE-2022-49465
* CVE-2022-49466
* CVE-2022-49467
* CVE-2022-49468
* CVE-2022-49470
* CVE-2022-49472
* CVE-2022-49473
* CVE-2022-49474
* CVE-2022-49475
* CVE-2022-49476
* CVE-2022-49477
* CVE-2022-49478
* CVE-2022-49479
* CVE-2022-49480
* CVE-2022-49481
* CVE-2022-49482
* CVE-2022-49483
* CVE-2022-49484
* CVE-2022-49485
* CVE-2022-49486
* CVE-2022-49487
* CVE-2022-49488
* CVE-2022-49489
* CVE-2022-49490
* CVE-2022-49491
* CVE-2022-49492
* CVE-2022-49493
* CVE-2022-49494
* CVE-2022-49495
* CVE-2022-49497
* CVE-2022-49498
* CVE-2022-49499
* CVE-2022-49501
* CVE-2022-49502
* CVE-2022-49503
* CVE-2022-49504
* CVE-2022-49505
* CVE-2022-49506
* CVE-2022-49507
* CVE-2022-49508
* CVE-2022-49509
* CVE-2022-49510
* CVE-2022-49511
* CVE-2022-49512
* CVE-2022-49514
* CVE-2022-49515
* CVE-2022-49516
* CVE-2022-49517
* CVE-2022-49518
* CVE-2022-49519
* CVE-2022-49520
* CVE-2022-49521
* CVE-2022-49522
* CVE-2022-49523
* CVE-2022-49524
* CVE-2022-49525
* CVE-2022-49526
* CVE-2022-49527
* CVE-2022-49529
* CVE-2022-49530
* CVE-2022-49532
* CVE-2022-49533
* CVE-2022-49534
* CVE-2022-49535
* CVE-2022-49536
* CVE-2022-49537
* CVE-2022-49538
* CVE-2022-49541
* CVE-2022-49542
* CVE-2022-49543
* CVE-2022-49544
* CVE-2022-49545
* CVE-2022-49546
* CVE-2022-49548
* CVE-2022-49549
* CVE-2022-49551
* CVE-2022-49552
* CVE-2022-49555
* CVE-2022-49556
* CVE-2022-49559
* CVE-2022-49560
* CVE-2022-49562
* CVE-2022-49563
* CVE-2022-49564
* CVE-2022-49565
* CVE-2022-49566
* CVE-2022-49568
* CVE-2022-49569
* CVE-2022-49570
* CVE-2022-49579
* CVE-2022-49581
* CVE-2022-49583
* CVE-2022-49584
* CVE-2022-49591
* CVE-2022-49592
* CVE-2022-49603
* CVE-2022-49605
* CVE-2022-49606
* CVE-2022-49607
* CVE-2022-49609
* CVE-2022-49610
* CVE-2022-49611
* CVE-2022-49613
* CVE-2022-49615
* CVE-2022-49616
* CVE-2022-49617
* CVE-2022-49618
* CVE-2022-49621
* CVE-2022-49623
* CVE-2022-49624
* CVE-2022-49625
* CVE-2022-49626
* CVE-2022-49627
* CVE-2022-49628
* CVE-2022-49631
* CVE-2022-49634
* CVE-2022-49635
* CVE-2022-49638
* CVE-2022-49640
* CVE-2022-49641
* CVE-2022-49642
* CVE-2022-49643
* CVE-2022-49644
* CVE-2022-49645
* CVE-2022-49646
* CVE-2022-49647
* CVE-2022-49648
* CVE-2022-49649
* CVE-2022-49650
* CVE-2022-49652
* CVE-2022-49653
* CVE-2022-49655
* CVE-2022-49656
* CVE-2022-49657
* CVE-2022-49658
* CVE-2022-49661
* CVE-2022-49663
* CVE-2022-49665
* CVE-2022-49667
* CVE-2022-49668
* CVE-2022-49670
* CVE-2022-49671
* CVE-2022-49672
* CVE-2022-49673
* CVE-2022-49674
* CVE-2022-49675
* CVE-2022-49676
* CVE-2022-49677
* CVE-2022-49678
* CVE-2022-49679
* CVE-2022-49680
* CVE-2022-49683
* CVE-2022-49685
* CVE-2022-49686
* CVE-2022-49687
* CVE-2022-49688
* CVE-2022-49693
* CVE-2022-49694
* CVE-2022-49695
* CVE-2022-49697
* CVE-2022-49699
* CVE-2022-49700
* CVE-2022-49701
* CVE-2022-49703
* CVE-2022-49704
* CVE-2022-49705
* CVE-2022-49707
* CVE-2022-49708
* CVE-2022-49710
* CVE-2022-49711
* CVE-2022-49712
* CVE-2022-49713
* CVE-2022-49714
* CVE-2022-49715
* CVE-2022-49716
* CVE-2022-49719
* CVE-2022-49720
* CVE-2022-49721
* CVE-2022-49722
* CVE-2022-49723
* CVE-2022-49724
* CVE-2022-49725
* CVE-2022-49726
* CVE-2022-49729
* CVE-2022-49730
* CVE-2022-49731
* CVE-2022-49732
* CVE-2022-49733
* CVE-2022-49739
* CVE-2022-49746
* CVE-2022-49748
* CVE-2022-49751
* CVE-2022-49753
* CVE-2022-49755
* CVE-2022-49759
* CVE-2023-0179
* CVE-2023-1652
* CVE-2023-2162
* CVE-2023-28410
* CVE-2023-3567
* CVE-2023-52930
* CVE-2023-52933
* CVE-2023-52935
* CVE-2023-52939
* CVE-2023-52941
* CVE-2023-52973
* CVE-2023-52974
* CVE-2023-52975
* CVE-2023-52976
* CVE-2023-52979
* CVE-2023-52983
* CVE-2023-52984
* CVE-2023-52988
* CVE-2023-52989
* CVE-2023-52992
* CVE-2023-52993
* CVE-2023-53000
* CVE-2023-53005
* CVE-2023-53006
* CVE-2023-53007
* CVE-2023-53008
* CVE-2023-53010
* CVE-2023-53015
* CVE-2023-53016
* CVE-2023-53019
* CVE-2023-53023
* CVE-2023-53024
* CVE-2023-53025
* CVE-2023-53026
* CVE-2023-53028
* CVE-2023-53029
* CVE-2023-53030
* CVE-2023-53033
* CVE-2024-26634
* CVE-2024-47678
* CVE-2024-50290
* CVE-2024-53063
* CVE-2024-53124
* CVE-2024-53176
* CVE-2024-53178
* CVE-2024-56651
* CVE-2024-57996
* CVE-2024-58013
* CVE-2024-58014
* CVE-2025-21693
* CVE-2025-21718
* CVE-2025-21772
* CVE-2025-21780
CVSS scores:
* CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2021-4453 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-4453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-4454 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2021-47517 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47631 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47632 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47633 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47633 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47635 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47636 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47636 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2021-47637 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47638 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47638 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47639 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47639 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47639 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47641 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47642 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47642 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2021-47643 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47644 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47646 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47646 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47646 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47647 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47648 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47649 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47650 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47651 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47651 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47652 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47653 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47654 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47656 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47656 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47657 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47659 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-0168 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-0168 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-0995 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-0995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-29900 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-29900 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2022-29901 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-29901 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-49044 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49050 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49050 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49051 ( SUSE ): 4.3
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2022-49053 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49054 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49054 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-49055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49056 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49056 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49057 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49057 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49059 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49061 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49061 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49062 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49062 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49063 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49063 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49064 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49065 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49066 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49070 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49071 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49073 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49074 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49075 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49076 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49078 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49078 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49082 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49082 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49084 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49085 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49086 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49086 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49088 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49089 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49089 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49091 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49093 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49096 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49096 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-49096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49097 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49098 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49099 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49100 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49103 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49105 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49106 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49107 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49107 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49111 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49112 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49113 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49114 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49115 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49118 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49119 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49120 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49121 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49122 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49123 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49125 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49126 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49126 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49128 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49129 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49131 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49133 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49134 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49135 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49135 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49136 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49136 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49137 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49138 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49138 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49139 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49144 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49145 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-49147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49153 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49154 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49154 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49156 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49157 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49158 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-49159 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49162 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49163 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49165 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49174 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49175 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49176 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49177 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49178 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49179 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49180 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49183 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49187 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49189 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49189 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2022-49192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49194 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49203 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49206 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49208 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49212 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49213 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49213 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49215 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49215 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49216 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49218 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49219 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49221 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49221 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49222 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49225 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49226 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49228 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49230 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49232 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49233 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49235 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49236 ( SUSE ): 7.5
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49236 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49236 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49238 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49238 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49238 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49239 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49241 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49241 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49242 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49243 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49249 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49250 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49254 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49258 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49260 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49260 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49261 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49261 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49262 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49266 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49266 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49268 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49268 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49269 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49269 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-49270 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49271 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49273 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49274 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49275 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49279 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49280 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49281 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49285 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49286 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49290 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49291 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49292 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49294 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49295 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49296 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49297 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49298 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49298 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49300 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49301 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49302 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49306 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49307 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49308 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49309 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49310 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49311 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49312 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49314 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49316 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49319 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49320 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49321 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49322 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49323 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49323 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49325 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49326 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49327 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49328 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49328 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49329 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49330 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49333 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49335 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49336 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49337 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49338 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49339 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49341 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49342 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49342 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49343 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49346 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49347 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49348 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49349 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49350 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49352 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49353 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49354 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49357 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49359 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49362 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49370 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49376 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49377 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49381 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49390 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49392 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49394 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49412 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49413 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49419 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49426 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49429 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49431 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49432 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49434 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49440 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49447 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49449 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49453 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49459 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49460 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49465 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49468 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49468 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49470 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49472 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49476 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49483 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49485 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49485 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49487 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49492 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49493 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49493 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49497 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49498 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49498 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-49499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49501 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49501 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49502 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49502 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49504 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49516 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49518 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49519 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49520 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49520 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-49521 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49522 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49523 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49524 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49525 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49526 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49527 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49527 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49529 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49530 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49530 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49532 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49534 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49535 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49536 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49537 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49538 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49538 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49541 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49541 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49542 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49544 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49546 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49551 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49560 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49563 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49564 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49565 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49568 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49568 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49570 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49579 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49583 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49603 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49607 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49610 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
* CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49616 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49617 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49618 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49618 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49621 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49621 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49626 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49627 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49631 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49634 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49638 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49646 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49673 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49720 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49729 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49730 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49731 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49746 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49748 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49755 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49759 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-28410 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-28410 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52975 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52992 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53008 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53176 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53178 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56651 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57996 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58013 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58014 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21780 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5
An update that solves 605 vulnerabilities and has 71 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
* CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled
(bsc#1238919).
* CVE-2022-49739: gfs2: Always check inode size of inline inodes
(bsc#1240207).
* CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
* CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc
(bsc#1234074).
* CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop
their dentry (bsc#1234894).
* CVE-2024-53178: smb: Do not leak cfid when reconnect races with
open_cached_dir (bsc#1234895).
* CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free
(bsc#1235528).
* CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
(bsc#1239076).
* CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in
mgmt_remove_adv_monitor_sync (bsc#1239095).
* CVE-2024-58014: wifi: brcmsmac: add gain range check to
wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
* CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU
hotunplug (bsc#1237029).
* CVE-2025-21718: net: rose: fix timer races against user threads
(bsc#1239073).
* CVE-2025-21772: partitions: mac: fix handling of bogus partition table
(bsc#1238911).
* CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in
smu_sys_set_pp_table() (bsc#1239115).
The following non-security bugs were fixed:
* ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are
invalid (bsc#1237530).
* RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
* RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing
(bsc#1239016).
* Revert "gfs2: Fix inode height consistency check (git-fixes).
* btrfs: defrag: do not use merged extent map for their generation check
(bsc#1239968).
* btrfs: fix defrag not merging contiguous extents due to merged extent maps
(bsc#1239968).
* btrfs: fix extent map merging not happening for adjacent extents
(bsc#1239968).
* btrfs: send: allow cloning non-aligned extent if it ends at i_size
(bsc#1239969).
* btrfs: send: fix invalid clone operation for file that got its size
decreased (bsc#1239969).
* cifs: Add a laundromat thread for cached directories (git-fixes).
* cifs: fix potential null pointer use in destroy_workqueue in init_cifs error
path (git-fixes).
* gfs2: Fix inode height consistency check (git-fixes).
* mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126).
* mm: zswap: move allocations during CPU init outside the lock (git-fixes).
* net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
* net: mana: Allow variable size indirection table (bsc#1239016).
* net: mana: Avoid open coded arithmetic (bsc#1239016).
* net: mana: Support holes in device list reply msg (bsc#1240133).
* sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
* smb3: allow controlling length of time directory entries are cached with dir
leases (git-fixes).
* smb3: do not start laundromat thread when dir leases disabled (git-fixes).
* smb3: retrying on failed server close (git-fixes).
* smb: client: destroy cfid_put_wq on module exit (git-fixes).
* smb: client: disable directory caching when dir_cache_timeout is zero (git-
fixes).
* smb: client: do not start laundromat thread on nohandlecache (git-fixes).
* smb: client: make laundromat a delayed worker (git-fixes).
* smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299,
bsc#1235599, bsc#1234896).
* tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-1176=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-1176=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.91.1
* kernel-source-rt-5.14.21-150500.13.91.1
* openSUSE Leap 15.5 (x86_64)
* kernel-rt-optional-debuginfo-5.14.21-150500.13.91.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.91.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.91.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.91.1
* kernel-rt-debuginfo-5.14.21-150500.13.91.1
* kernel-rt_debug-vdso-5.14.21-150500.13.91.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.91.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.91.1
* kernel-rt-optional-5.14.21-150500.13.91.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.91.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.91.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.91.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.91.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.91.1
* ocfs2-kmp-rt-5.14.21-150500.13.91.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.91.1
* cluster-md-kmp-rt-5.14.21-150500.13.91.1
* kselftests-kmp-rt-5.14.21-150500.13.91.1
* kernel-rt-debugsource-5.14.21-150500.13.91.1
* kernel-syms-rt-5.14.21-150500.13.91.1
* reiserfs-kmp-rt-5.14.21-150500.13.91.1
* kernel-rt-devel-5.14.21-150500.13.91.1
* kernel-rt_debug-devel-5.14.21-150500.13.91.1
* dlm-kmp-rt-5.14.21-150500.13.91.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.91.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.91.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.91.1
* kernel-rt-extra-5.14.21-150500.13.91.1
* gfs2-kmp-rt-5.14.21-150500.13.91.1
* kernel-rt-livepatch-5.14.21-150500.13.91.1
* kernel-rt-vdso-5.14.21-150500.13.91.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.91.1
* kernel-rt-5.14.21-150500.13.91.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.91.1
* kernel-source-rt-5.14.21-150500.13.91.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.91.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.91.1
* kernel-rt-debuginfo-5.14.21-150500.13.91.1
## References:
* https://www.suse.com/security/cve/CVE-2017-5753.html
* https://www.suse.com/security/cve/CVE-2021-4453.html
* https://www.suse.com/security/cve/CVE-2021-4454.html
* https://www.suse.com/security/cve/CVE-2021-47517.html
* https://www.suse.com/security/cve/CVE-2021-47631.html
* https://www.suse.com/security/cve/CVE-2021-47632.html
* https://www.suse.com/security/cve/CVE-2021-47633.html
* https://www.suse.com/security/cve/CVE-2021-47635.html
* https://www.suse.com/security/cve/CVE-2021-47636.html
* https://www.suse.com/security/cve/CVE-2021-47637.html
* https://www.suse.com/security/cve/CVE-2021-47638.html
* https://www.suse.com/security/cve/CVE-2021-47639.html
* https://www.suse.com/security/cve/CVE-2021-47641.html
* https://www.suse.com/security/cve/CVE-2021-47642.html
* https://www.suse.com/security/cve/CVE-2021-47643.html
* https://www.suse.com/security/cve/CVE-2021-47644.html
* https://www.suse.com/security/cve/CVE-2021-47645.html
* https://www.suse.com/security/cve/CVE-2021-47646.html
* https://www.suse.com/security/cve/CVE-2021-47647.html
* https://www.suse.com/security/cve/CVE-2021-47648.html
* https://www.suse.com/security/cve/CVE-2021-47649.html
* https://www.suse.com/security/cve/CVE-2021-47650.html
* https://www.suse.com/security/cve/CVE-2021-47651.html
* https://www.suse.com/security/cve/CVE-2021-47652.html
* https://www.suse.com/security/cve/CVE-2021-47653.html
* https://www.suse.com/security/cve/CVE-2021-47654.html
* https://www.suse.com/security/cve/CVE-2021-47656.html
* https://www.suse.com/security/cve/CVE-2021-47657.html
* https://www.suse.com/security/cve/CVE-2021-47659.html
* https://www.suse.com/security/cve/CVE-2022-0168.html
* https://www.suse.com/security/cve/CVE-2022-0995.html
* https://www.suse.com/security/cve/CVE-2022-1016.html
* https://www.suse.com/security/cve/CVE-2022-1048.html
* https://www.suse.com/security/cve/CVE-2022-1184.html
* https://www.suse.com/security/cve/CVE-2022-2977.html
* https://www.suse.com/security/cve/CVE-2022-29900.html
* https://www.suse.com/security/cve/CVE-2022-29901.html
* https://www.suse.com/security/cve/CVE-2022-3303.html
* https://www.suse.com/security/cve/CVE-2022-3435.html
* https://www.suse.com/security/cve/CVE-2022-49044.html
* https://www.suse.com/security/cve/CVE-2022-49050.html
* https://www.suse.com/security/cve/CVE-2022-49051.html
* https://www.suse.com/security/cve/CVE-2022-49053.html
* https://www.suse.com/security/cve/CVE-2022-49054.html
* https://www.suse.com/security/cve/CVE-2022-49055.html
* https://www.suse.com/security/cve/CVE-2022-49056.html
* https://www.suse.com/security/cve/CVE-2022-49057.html
* https://www.suse.com/security/cve/CVE-2022-49058.html
* https://www.suse.com/security/cve/CVE-2022-49059.html
* https://www.suse.com/security/cve/CVE-2022-49060.html
* https://www.suse.com/security/cve/CVE-2022-49061.html
* https://www.suse.com/security/cve/CVE-2022-49062.html
* https://www.suse.com/security/cve/CVE-2022-49063.html
* https://www.suse.com/security/cve/CVE-2022-49064.html
* https://www.suse.com/security/cve/CVE-2022-49065.html
* https://www.suse.com/security/cve/CVE-2022-49066.html
* https://www.suse.com/security/cve/CVE-2022-49070.html
* https://www.suse.com/security/cve/CVE-2022-49071.html
* https://www.suse.com/security/cve/CVE-2022-49073.html
* https://www.suse.com/security/cve/CVE-2022-49074.html
* https://www.suse.com/security/cve/CVE-2022-49075.html
* https://www.suse.com/security/cve/CVE-2022-49076.html
* https://www.suse.com/security/cve/CVE-2022-49078.html
* https://www.suse.com/security/cve/CVE-2022-49082.html
* https://www.suse.com/security/cve/CVE-2022-49083.html
* https://www.suse.com/security/cve/CVE-2022-49084.html
* https://www.suse.com/security/cve/CVE-2022-49085.html
* https://www.suse.com/security/cve/CVE-2022-49086.html
* https://www.suse.com/security/cve/CVE-2022-49088.html
* https://www.suse.com/security/cve/CVE-2022-49089.html
* https://www.suse.com/security/cve/CVE-2022-49090.html
* https://www.suse.com/security/cve/CVE-2022-49091.html
* https://www.suse.com/security/cve/CVE-2022-49092.html
* https://www.suse.com/security/cve/CVE-2022-49093.html
* https://www.suse.com/security/cve/CVE-2022-49095.html
* https://www.suse.com/security/cve/CVE-2022-49096.html
* https://www.suse.com/security/cve/CVE-2022-49097.html
* https://www.suse.com/security/cve/CVE-2022-49098.html
* https://www.suse.com/security/cve/CVE-2022-49099.html
* https://www.suse.com/security/cve/CVE-2022-49100.html
* https://www.suse.com/security/cve/CVE-2022-49102.html
* https://www.suse.com/security/cve/CVE-2022-49103.html
* https://www.suse.com/security/cve/CVE-2022-49104.html
* https://www.suse.com/security/cve/CVE-2022-49105.html
* https://www.suse.com/security/cve/CVE-2022-49106.html
* https://www.suse.com/security/cve/CVE-2022-49107.html
* https://www.suse.com/security/cve/CVE-2022-49109.html
* https://www.suse.com/security/cve/CVE-2022-49111.html
* https://www.suse.com/security/cve/CVE-2022-49112.html
* https://www.suse.com/security/cve/CVE-2022-49113.html
* https://www.suse.com/security/cve/CVE-2022-49114.html
* https://www.suse.com/security/cve/CVE-2022-49115.html
* https://www.suse.com/security/cve/CVE-2022-49116.html
* https://www.suse.com/security/cve/CVE-2022-49118.html
* https://www.suse.com/security/cve/CVE-2022-49119.html
* https://www.suse.com/security/cve/CVE-2022-49120.html
* https://www.suse.com/security/cve/CVE-2022-49121.html
* https://www.suse.com/security/cve/CVE-2022-49122.html
* https://www.suse.com/security/cve/CVE-2022-49123.html
* https://www.suse.com/security/cve/CVE-2022-49125.html
* https://www.suse.com/security/cve/CVE-2022-49126.html
* https://www.suse.com/security/cve/CVE-2022-49128.html
* https://www.suse.com/security/cve/CVE-2022-49129.html
* https://www.suse.com/security/cve/CVE-2022-49130.html
* https://www.suse.com/security/cve/CVE-2022-49131.html
* https://www.suse.com/security/cve/CVE-2022-49132.html
* https://www.suse.com/security/cve/CVE-2022-49133.html
* https://www.suse.com/security/cve/CVE-2022-49134.html
* https://www.suse.com/security/cve/CVE-2022-49135.html
* https://www.suse.com/security/cve/CVE-2022-49136.html
* https://www.suse.com/security/cve/CVE-2022-49137.html
* https://www.suse.com/security/cve/CVE-2022-49138.html
* https://www.suse.com/security/cve/CVE-2022-49139.html
* https://www.suse.com/security/cve/CVE-2022-49144.html
* https://www.suse.com/security/cve/CVE-2022-49145.html
* https://www.suse.com/security/cve/CVE-2022-49147.html
* https://www.suse.com/security/cve/CVE-2022-49148.html
* https://www.suse.com/security/cve/CVE-2022-49151.html
* https://www.suse.com/security/cve/CVE-2022-49153.html
* https://www.suse.com/security/cve/CVE-2022-49154.html
* https://www.suse.com/security/cve/CVE-2022-49155.html
* https://www.suse.com/security/cve/CVE-2022-49156.html
* https://www.suse.com/security/cve/CVE-2022-49157.html
* https://www.suse.com/security/cve/CVE-2022-49158.html
* https://www.suse.com/security/cve/CVE-2022-49159.html
* https://www.suse.com/security/cve/CVE-2022-49160.html
* https://www.suse.com/security/cve/CVE-2022-49162.html
* https://www.suse.com/security/cve/CVE-2022-49163.html
* https://www.suse.com/security/cve/CVE-2022-49164.html
* https://www.suse.com/security/cve/CVE-2022-49165.html
* https://www.suse.com/security/cve/CVE-2022-49174.html
* https://www.suse.com/security/cve/CVE-2022-49175.html
* https://www.suse.com/security/cve/CVE-2022-49176.html
* https://www.suse.com/security/cve/CVE-2022-49177.html
* https://www.suse.com/security/cve/CVE-2022-49178.html
* https://www.suse.com/security/cve/CVE-2022-49179.html
* https://www.suse.com/security/cve/CVE-2022-49180.html
* https://www.suse.com/security/cve/CVE-2022-49182.html
* https://www.suse.com/security/cve/CVE-2022-49183.html
* https://www.suse.com/security/cve/CVE-2022-49185.html
* https://www.suse.com/security/cve/CVE-2022-49187.html
* https://www.suse.com/security/cve/CVE-2022-49188.html
* https://www.suse.com/security/cve/CVE-2022-49189.html
* https://www.suse.com/security/cve/CVE-2022-49192.html
* https://www.suse.com/security/cve/CVE-2022-49193.html
* https://www.suse.com/security/cve/CVE-2022-49194.html
* https://www.suse.com/security/cve/CVE-2022-49196.html
* https://www.suse.com/security/cve/CVE-2022-49199.html
* https://www.suse.com/security/cve/CVE-2022-49200.html
* https://www.suse.com/security/cve/CVE-2022-49201.html
* https://www.suse.com/security/cve/CVE-2022-49202.html
* https://www.suse.com/security/cve/CVE-2022-49203.html
* https://www.suse.com/security/cve/CVE-2022-49204.html
* https://www.suse.com/security/cve/CVE-2022-49205.html
* https://www.suse.com/security/cve/CVE-2022-49206.html
* https://www.suse.com/security/cve/CVE-2022-49207.html
* https://www.suse.com/security/cve/CVE-2022-49208.html
* https://www.suse.com/security/cve/CVE-2022-49209.html
* https://www.suse.com/security/cve/CVE-2022-49212.html
* https://www.suse.com/security/cve/CVE-2022-49213.html
* https://www.suse.com/security/cve/CVE-2022-49214.html
* https://www.suse.com/security/cve/CVE-2022-49215.html
* https://www.suse.com/security/cve/CVE-2022-49216.html
* https://www.suse.com/security/cve/CVE-2022-49217.html
* https://www.suse.com/security/cve/CVE-2022-49218.html
* https://www.suse.com/security/cve/CVE-2022-49219.html
* https://www.suse.com/security/cve/CVE-2022-49221.html
* https://www.suse.com/security/cve/CVE-2022-49222.html
* https://www.suse.com/security/cve/CVE-2022-49224.html
* https://www.suse.com/security/cve/CVE-2022-49225.html
* https://www.suse.com/security/cve/CVE-2022-49226.html
* https://www.suse.com/security/cve/CVE-2022-49227.html
* https://www.suse.com/security/cve/CVE-2022-49228.html
* https://www.suse.com/security/cve/CVE-2022-49230.html
* https://www.suse.com/security/cve/CVE-2022-49232.html
* https://www.suse.com/security/cve/CVE-2022-49233.html
* https://www.suse.com/security/cve/CVE-2022-49235.html
* https://www.suse.com/security/cve/CVE-2022-49236.html
* https://www.suse.com/security/cve/CVE-2022-49237.html
* https://www.suse.com/security/cve/CVE-2022-49238.html
* https://www.suse.com/security/cve/CVE-2022-49239.html
* https://www.suse.com/security/cve/CVE-2022-49241.html
* https://www.suse.com/security/cve/CVE-2022-49242.html
* https://www.suse.com/security/cve/CVE-2022-49243.html
* https://www.suse.com/security/cve/CVE-2022-49244.html
* https://www.suse.com/security/cve/CVE-2022-49246.html
* https://www.suse.com/security/cve/CVE-2022-49247.html
* https://www.suse.com/security/cve/CVE-2022-49248.html
* https://www.suse.com/security/cve/CVE-2022-49249.html
* https://www.suse.com/security/cve/CVE-2022-49250.html
* https://www.suse.com/security/cve/CVE-2022-49251.html
* https://www.suse.com/security/cve/CVE-2022-49252.html
* https://www.suse.com/security/cve/CVE-2022-49253.html
* https://www.suse.com/security/cve/CVE-2022-49254.html
* https://www.suse.com/security/cve/CVE-2022-49256.html
* https://www.suse.com/security/cve/CVE-2022-49257.html
* https://www.suse.com/security/cve/CVE-2022-49258.html
* https://www.suse.com/security/cve/CVE-2022-49259.html
* https://www.suse.com/security/cve/CVE-2022-49260.html
* https://www.suse.com/security/cve/CVE-2022-49261.html
* https://www.suse.com/security/cve/CVE-2022-49262.html
* https://www.suse.com/security/cve/CVE-2022-49263.html
* https://www.suse.com/security/cve/CVE-2022-49264.html
* https://www.suse.com/security/cve/CVE-2022-49265.html
* https://www.suse.com/security/cve/CVE-2022-49266.html
* https://www.suse.com/security/cve/CVE-2022-49268.html
* https://www.suse.com/security/cve/CVE-2022-49269.html
* https://www.suse.com/security/cve/CVE-2022-49270.html
* https://www.suse.com/security/cve/CVE-2022-49271.html
* https://www.suse.com/security/cve/CVE-2022-49272.html
* https://www.suse.com/security/cve/CVE-2022-49273.html
* https://www.suse.com/security/cve/CVE-2022-49274.html
* https://www.suse.com/security/cve/CVE-2022-49275.html
* https://www.suse.com/security/cve/CVE-2022-49276.html
* https://www.suse.com/security/cve/CVE-2022-49277.html
* https://www.suse.com/security/cve/CVE-2022-49278.html
* https://www.suse.com/security/cve/CVE-2022-49279.html
* https://www.suse.com/security/cve/CVE-2022-49280.html
* https://www.suse.com/security/cve/CVE-2022-49281.html
* https://www.suse.com/security/cve/CVE-2022-49283.html
* https://www.suse.com/security/cve/CVE-2022-49285.html
* https://www.suse.com/security/cve/CVE-2022-49286.html
* https://www.suse.com/security/cve/CVE-2022-49287.html
* https://www.suse.com/security/cve/CVE-2022-49288.html
* https://www.suse.com/security/cve/CVE-2022-49290.html
* https://www.suse.com/security/cve/CVE-2022-49291.html
* https://www.suse.com/security/cve/CVE-2022-49292.html
* https://www.suse.com/security/cve/CVE-2022-49293.html
* https://www.suse.com/security/cve/CVE-2022-49294.html
* https://www.suse.com/security/cve/CVE-2022-49295.html
* https://www.suse.com/security/cve/CVE-2022-49296.html
* https://www.suse.com/security/cve/CVE-2022-49297.html
* https://www.suse.com/security/cve/CVE-2022-49298.html
* https://www.suse.com/security/cve/CVE-2022-49299.html
* https://www.suse.com/security/cve/CVE-2022-49300.html
* https://www.suse.com/security/cve/CVE-2022-49301.html
* https://www.suse.com/security/cve/CVE-2022-49302.html
* https://www.suse.com/security/cve/CVE-2022-49304.html
* https://www.suse.com/security/cve/CVE-2022-49305.html
* https://www.suse.com/security/cve/CVE-2022-49306.html
* https://www.suse.com/security/cve/CVE-2022-49307.html
* https://www.suse.com/security/cve/CVE-2022-49308.html
* https://www.suse.com/security/cve/CVE-2022-49309.html
* https://www.suse.com/security/cve/CVE-2022-49310.html
* https://www.suse.com/security/cve/CVE-2022-49311.html
* https://www.suse.com/security/cve/CVE-2022-49312.html
* https://www.suse.com/security/cve/CVE-2022-49313.html
* https://www.suse.com/security/cve/CVE-2022-49314.html
* https://www.suse.com/security/cve/CVE-2022-49315.html
* https://www.suse.com/security/cve/CVE-2022-49316.html
* https://www.suse.com/security/cve/CVE-2022-49319.html
* https://www.suse.com/security/cve/CVE-2022-49320.html
* https://www.suse.com/security/cve/CVE-2022-49321.html
* https://www.suse.com/security/cve/CVE-2022-49322.html
* https://www.suse.com/security/cve/CVE-2022-49323.html
* https://www.suse.com/security/cve/CVE-2022-49325.html
* https://www.suse.com/security/cve/CVE-2022-49326.html
* https://www.suse.com/security/cve/CVE-2022-49327.html
* https://www.suse.com/security/cve/CVE-2022-49328.html
* https://www.suse.com/security/cve/CVE-2022-49329.html
* https://www.suse.com/security/cve/CVE-2022-49330.html
* https://www.suse.com/security/cve/CVE-2022-49331.html
* https://www.suse.com/security/cve/CVE-2022-49332.html
* https://www.suse.com/security/cve/CVE-2022-49333.html
* https://www.suse.com/security/cve/CVE-2022-49335.html
* https://www.suse.com/security/cve/CVE-2022-49336.html
* https://www.suse.com/security/cve/CVE-2022-49337.html
* https://www.suse.com/security/cve/CVE-2022-49338.html
* https://www.suse.com/security/cve/CVE-2022-49339.html
* https://www.suse.com/security/cve/CVE-2022-49341.html
* https://www.suse.com/security/cve/CVE-2022-49342.html
* https://www.suse.com/security/cve/CVE-2022-49343.html
* https://www.suse.com/security/cve/CVE-2022-49345.html
* https://www.suse.com/security/cve/CVE-2022-49346.html
* https://www.suse.com/security/cve/CVE-2022-49347.html
* https://www.suse.com/security/cve/CVE-2022-49348.html
* https://www.suse.com/security/cve/CVE-2022-49349.html
* https://www.suse.com/security/cve/CVE-2022-49350.html
* https://www.suse.com/security/cve/CVE-2022-49351.html
* https://www.suse.com/security/cve/CVE-2022-49352.html
* https://www.suse.com/security/cve/CVE-2022-49353.html
* https://www.suse.com/security/cve/CVE-2022-49354.html
* https://www.suse.com/security/cve/CVE-2022-49356.html
* https://www.suse.com/security/cve/CVE-2022-49357.html
* https://www.suse.com/security/cve/CVE-2022-49359.html
* https://www.suse.com/security/cve/CVE-2022-49362.html
* https://www.suse.com/security/cve/CVE-2022-49365.html
* https://www.suse.com/security/cve/CVE-2022-49367.html
* https://www.suse.com/security/cve/CVE-2022-49368.html
* https://www.suse.com/security/cve/CVE-2022-49370.html
* https://www.suse.com/security/cve/CVE-2022-49371.html
* https://www.suse.com/security/cve/CVE-2022-49373.html
* https://www.suse.com/security/cve/CVE-2022-49375.html
* https://www.suse.com/security/cve/CVE-2022-49376.html
* https://www.suse.com/security/cve/CVE-2022-49377.html
* https://www.suse.com/security/cve/CVE-2022-49378.html
* https://www.suse.com/security/cve/CVE-2022-49379.html
* https://www.suse.com/security/cve/CVE-2022-49381.html
* https://www.suse.com/security/cve/CVE-2022-49382.html
* https://www.suse.com/security/cve/CVE-2022-49384.html
* https://www.suse.com/security/cve/CVE-2022-49385.html
* https://www.suse.com/security/cve/CVE-2022-49386.html
* https://www.suse.com/security/cve/CVE-2022-49389.html
* https://www.suse.com/security/cve/CVE-2022-49390.html
* https://www.suse.com/security/cve/CVE-2022-49392.html
* https://www.suse.com/security/cve/CVE-2022-49394.html
* https://www.suse.com/security/cve/CVE-2022-49396.html
* https://www.suse.com/security/cve/CVE-2022-49397.html
* https://www.suse.com/security/cve/CVE-2022-49398.html
* https://www.suse.com/security/cve/CVE-2022-49399.html
* https://www.suse.com/security/cve/CVE-2022-49400.html
* https://www.suse.com/security/cve/CVE-2022-49402.html
* https://www.suse.com/security/cve/CVE-2022-49404.html
* https://www.suse.com/security/cve/CVE-2022-49406.html
* https://www.suse.com/security/cve/CVE-2022-49407.html
* https://www.suse.com/security/cve/CVE-2022-49409.html
* https://www.suse.com/security/cve/CVE-2022-49410.html
* https://www.suse.com/security/cve/CVE-2022-49411.html
* https://www.suse.com/security/cve/CVE-2022-49412.html
* https://www.suse.com/security/cve/CVE-2022-49413.html
* https://www.suse.com/security/cve/CVE-2022-49414.html
* https://www.suse.com/security/cve/CVE-2022-49416.html
* https://www.suse.com/security/cve/CVE-2022-49418.html
* https://www.suse.com/security/cve/CVE-2022-49419.html
* https://www.suse.com/security/cve/CVE-2022-49421.html
* https://www.suse.com/security/cve/CVE-2022-49422.html
* https://www.suse.com/security/cve/CVE-2022-49424.html
* https://www.suse.com/security/cve/CVE-2022-49426.html
* https://www.suse.com/security/cve/CVE-2022-49427.html
* https://www.suse.com/security/cve/CVE-2022-49429.html
* https://www.suse.com/security/cve/CVE-2022-49430.html
* https://www.suse.com/security/cve/CVE-2022-49431.html
* https://www.suse.com/security/cve/CVE-2022-49432.html
* https://www.suse.com/security/cve/CVE-2022-49433.html
* https://www.suse.com/security/cve/CVE-2022-49434.html
* https://www.suse.com/security/cve/CVE-2022-49435.html
* https://www.suse.com/security/cve/CVE-2022-49436.html
* https://www.suse.com/security/cve/CVE-2022-49437.html
* https://www.suse.com/security/cve/CVE-2022-49438.html
* https://www.suse.com/security/cve/CVE-2022-49440.html
* https://www.suse.com/security/cve/CVE-2022-49441.html
* https://www.suse.com/security/cve/CVE-2022-49442.html
* https://www.suse.com/security/cve/CVE-2022-49443.html
* https://www.suse.com/security/cve/CVE-2022-49444.html
* https://www.suse.com/security/cve/CVE-2022-49445.html
* https://www.suse.com/security/cve/CVE-2022-49446.html
* https://www.suse.com/security/cve/CVE-2022-49447.html
* https://www.suse.com/security/cve/CVE-2022-49448.html
* https://www.suse.com/security/cve/CVE-2022-49449.html
* https://www.suse.com/security/cve/CVE-2022-49451.html
* https://www.suse.com/security/cve/CVE-2022-49453.html
* https://www.suse.com/security/cve/CVE-2022-49455.html
* https://www.suse.com/security/cve/CVE-2022-49458.html
* https://www.suse.com/security/cve/CVE-2022-49459.html
* https://www.suse.com/security/cve/CVE-2022-49460.html
* https://www.suse.com/security/cve/CVE-2022-49462.html
* https://www.suse.com/security/cve/CVE-2022-49463.html
* https://www.suse.com/security/cve/CVE-2022-49465.html
* https://www.suse.com/security/cve/CVE-2022-49466.html
* https://www.suse.com/security/cve/CVE-2022-49467.html
* https://www.suse.com/security/cve/CVE-2022-49468.html
* https://www.suse.com/security/cve/CVE-2022-49470.html
* https://www.suse.com/security/cve/CVE-2022-49472.html
* https://www.suse.com/security/cve/CVE-2022-49473.html
* https://www.suse.com/security/cve/CVE-2022-49474.html
* https://www.suse.com/security/cve/CVE-2022-49475.html
* https://www.suse.com/security/cve/CVE-2022-49476.html
* https://www.suse.com/security/cve/CVE-2022-49477.html
* https://www.suse.com/security/cve/CVE-2022-49478.html
* https://www.suse.com/security/cve/CVE-2022-49479.html
* https://www.suse.com/security/cve/CVE-2022-49480.html
* https://www.suse.com/security/cve/CVE-2022-49481.html
* https://www.suse.com/security/cve/CVE-2022-49482.html
* https://www.suse.com/security/cve/CVE-2022-49483.html
* https://www.suse.com/security/cve/CVE-2022-49484.html
* https://www.suse.com/security/cve/CVE-2022-49485.html
* https://www.suse.com/security/cve/CVE-2022-49486.html
* https://www.suse.com/security/cve/CVE-2022-49487.html
* https://www.suse.com/security/cve/CVE-2022-49488.html
* https://www.suse.com/security/cve/CVE-2022-49489.html
* https://www.suse.com/security/cve/CVE-2022-49490.html
* https://www.suse.com/security/cve/CVE-2022-49491.html
* https://www.suse.com/security/cve/CVE-2022-49492.html
* https://www.suse.com/security/cve/CVE-2022-49493.html
* https://www.suse.com/security/cve/CVE-2022-49494.html
* https://www.suse.com/security/cve/CVE-2022-49495.html
* https://www.suse.com/security/cve/CVE-2022-49497.html
* https://www.suse.com/security/cve/CVE-2022-49498.html
* https://www.suse.com/security/cve/CVE-2022-49499.html
* https://www.suse.com/security/cve/CVE-2022-49501.html
* https://www.suse.com/security/cve/CVE-2022-49502.html
* https://www.suse.com/security/cve/CVE-2022-49503.html
* https://www.suse.com/security/cve/CVE-2022-49504.html
* https://www.suse.com/security/cve/CVE-2022-49505.html
* https://www.suse.com/security/cve/CVE-2022-49506.html
* https://www.suse.com/security/cve/CVE-2022-49507.html
* https://www.suse.com/security/cve/CVE-2022-49508.html
* https://www.suse.com/security/cve/CVE-2022-49509.html
* https://www.suse.com/security/cve/CVE-2022-49510.html
* https://www.suse.com/security/cve/CVE-2022-49511.html
* https://www.suse.com/security/cve/CVE-2022-49512.html
* https://www.suse.com/security/cve/CVE-2022-49514.html
* https://www.suse.com/security/cve/CVE-2022-49515.html
* https://www.suse.com/security/cve/CVE-2022-49516.html
* https://www.suse.com/security/cve/CVE-2022-49517.html
* https://www.suse.com/security/cve/CVE-2022-49518.html
* https://www.suse.com/security/cve/CVE-2022-49519.html
* https://www.suse.com/security/cve/CVE-2022-49520.html
* https://www.suse.com/security/cve/CVE-2022-49521.html
* https://www.suse.com/security/cve/CVE-2022-49522.html
* https://www.suse.com/security/cve/CVE-2022-49523.html
* https://www.suse.com/security/cve/CVE-2022-49524.html
* https://www.suse.com/security/cve/CVE-2022-49525.html
* https://www.suse.com/security/cve/CVE-2022-49526.html
* https://www.suse.com/security/cve/CVE-2022-49527.html
* https://www.suse.com/security/cve/CVE-2022-49529.html
* https://www.suse.com/security/cve/CVE-2022-49530.html
* https://www.suse.com/security/cve/CVE-2022-49532.html
* https://www.suse.com/security/cve/CVE-2022-49533.html
* https://www.suse.com/security/cve/CVE-2022-49534.html
* https://www.suse.com/security/cve/CVE-2022-49535.html
* https://www.suse.com/security/cve/CVE-2022-49536.html
* https://www.suse.com/security/cve/CVE-2022-49537.html
* https://www.suse.com/security/cve/CVE-2022-49538.html
* https://www.suse.com/security/cve/CVE-2022-49541.html
* https://www.suse.com/security/cve/CVE-2022-49542.html
* https://www.suse.com/security/cve/CVE-2022-49543.html
* https://www.suse.com/security/cve/CVE-2022-49544.html
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2022-49546.html
* https://www.suse.com/security/cve/CVE-2022-49548.html
* https://www.suse.com/security/cve/CVE-2022-49549.html
* https://www.suse.com/security/cve/CVE-2022-49551.html
* https://www.suse.com/security/cve/CVE-2022-49552.html
* https://www.suse.com/security/cve/CVE-2022-49555.html
* https://www.suse.com/security/cve/CVE-2022-49556.html
* https://www.suse.com/security/cve/CVE-2022-49559.html
* https://www.suse.com/security/cve/CVE-2022-49560.html
* https://www.suse.com/security/cve/CVE-2022-49562.html
* https://www.suse.com/security/cve/CVE-2022-49563.html
* https://www.suse.com/security/cve/CVE-2022-49564.html
* https://www.suse.com/security/cve/CVE-2022-49565.html
* https://www.suse.com/security/cve/CVE-2022-49566.html
* https://www.suse.com/security/cve/CVE-2022-49568.html
* https://www.suse.com/security/cve/CVE-2022-49569.html
* https://www.suse.com/security/cve/CVE-2022-49570.html
* https://www.suse.com/security/cve/CVE-2022-49579.html
* https://www.suse.com/security/cve/CVE-2022-49581.html
* https://www.suse.com/security/cve/CVE-2022-49583.html
* https://www.suse.com/security/cve/CVE-2022-49584.html
* https://www.suse.com/security/cve/CVE-2022-49591.html
* https://www.suse.com/security/cve/CVE-2022-49592.html
* https://www.suse.com/security/cve/CVE-2022-49603.html
* https://www.suse.com/security/cve/CVE-2022-49605.html
* https://www.suse.com/security/cve/CVE-2022-49606.html
* https://www.suse.com/security/cve/CVE-2022-49607.html
* https://www.suse.com/security/cve/CVE-2022-49609.html
* https://www.suse.com/security/cve/CVE-2022-49610.html
* https://www.suse.com/security/cve/CVE-2022-49611.html
* https://www.suse.com/security/cve/CVE-2022-49613.html
* https://www.suse.com/security/cve/CVE-2022-49615.html
* https://www.suse.com/security/cve/CVE-2022-49616.html
* https://www.suse.com/security/cve/CVE-2022-49617.html
* https://www.suse.com/security/cve/CVE-2022-49618.html
* https://www.suse.com/security/cve/CVE-2022-49621.html
* https://www.suse.com/security/cve/CVE-2022-49623.html
* https://www.suse.com/security/cve/CVE-2022-49624.html
* https://www.suse.com/security/cve/CVE-2022-49625.html
* https://www.suse.com/security/cve/CVE-2022-49626.html
* https://www.suse.com/security/cve/CVE-2022-49627.html
* https://www.suse.com/security/cve/CVE-2022-49628.html
* https://www.suse.com/security/cve/CVE-2022-49631.html
* https://www.suse.com/security/cve/CVE-2022-49634.html
* https://www.suse.com/security/cve/CVE-2022-49635.html
* https://www.suse.com/security/cve/CVE-2022-49638.html
* https://www.suse.com/security/cve/CVE-2022-49640.html
* https://www.suse.com/security/cve/CVE-2022-49641.html
* https://www.suse.com/security/cve/CVE-2022-49642.html
* https://www.suse.com/security/cve/CVE-2022-49643.html
* https://www.suse.com/security/cve/CVE-2022-49644.html
* https://www.suse.com/security/cve/CVE-2022-49645.html
* https://www.suse.com/security/cve/CVE-2022-49646.html
* https://www.suse.com/security/cve/CVE-2022-49647.html
* https://www.suse.com/security/cve/CVE-2022-49648.html
* https://www.suse.com/security/cve/CVE-2022-49649.html
* https://www.suse.com/security/cve/CVE-2022-49650.html
* https://www.suse.com/security/cve/CVE-2022-49652.html
* https://www.suse.com/security/cve/CVE-2022-49653.html
* https://www.suse.com/security/cve/CVE-2022-49655.html
* https://www.suse.com/security/cve/CVE-2022-49656.html
* https://www.suse.com/security/cve/CVE-2022-49657.html
* https://www.suse.com/security/cve/CVE-2022-49658.html
* https://www.suse.com/security/cve/CVE-2022-49661.html
* https://www.suse.com/security/cve/CVE-2022-49663.html
* https://www.suse.com/security/cve/CVE-2022-49665.html
* https://www.suse.com/security/cve/CVE-2022-49667.html
* https://www.suse.com/security/cve/CVE-2022-49668.html
* https://www.suse.com/security/cve/CVE-2022-49670.html
* https://www.suse.com/security/cve/CVE-2022-49671.html
* https://www.suse.com/security/cve/CVE-2022-49672.html
* https://www.suse.com/security/cve/CVE-2022-49673.html
* https://www.suse.com/security/cve/CVE-2022-49674.html
* https://www.suse.com/security/cve/CVE-2022-49675.html
* https://www.suse.com/security/cve/CVE-2022-49676.html
* https://www.suse.com/security/cve/CVE-2022-49677.html
* https://www.suse.com/security/cve/CVE-2022-49678.html
* https://www.suse.com/security/cve/CVE-2022-49679.html
* https://www.suse.com/security/cve/CVE-2022-49680.html
* https://www.suse.com/security/cve/CVE-2022-49683.html
* https://www.suse.com/security/cve/CVE-2022-49685.html
* https://www.suse.com/security/cve/CVE-2022-49686.html
* https://www.suse.com/security/cve/CVE-2022-49687.html
* https://www.suse.com/security/cve/CVE-2022-49688.html
* https://www.suse.com/security/cve/CVE-2022-49693.html
* https://www.suse.com/security/cve/CVE-2022-49694.html
* https://www.suse.com/security/cve/CVE-2022-49695.html
* https://www.suse.com/security/cve/CVE-2022-49697.html
* https://www.suse.com/security/cve/CVE-2022-49699.html
* https://www.suse.com/security/cve/CVE-2022-49700.html
* https://www.suse.com/security/cve/CVE-2022-49701.html
* https://www.suse.com/security/cve/CVE-2022-49703.html
* https://www.suse.com/security/cve/CVE-2022-49704.html
* https://www.suse.com/security/cve/CVE-2022-49705.html
* https://www.suse.com/security/cve/CVE-2022-49707.html
* https://www.suse.com/security/cve/CVE-2022-49708.html
* https://www.suse.com/security/cve/CVE-2022-49710.html
* https://www.suse.com/security/cve/CVE-2022-49711.html
* https://www.suse.com/security/cve/CVE-2022-49712.html
* https://www.suse.com/security/cve/CVE-2022-49713.html
* https://www.suse.com/security/cve/CVE-2022-49714.html
* https://www.suse.com/security/cve/CVE-2022-49715.html
* https://www.suse.com/security/cve/CVE-2022-49716.html
* https://www.suse.com/security/cve/CVE-2022-49719.html
* https://www.suse.com/security/cve/CVE-2022-49720.html
* https://www.suse.com/security/cve/CVE-2022-49721.html
* https://www.suse.com/security/cve/CVE-2022-49722.html
* https://www.suse.com/security/cve/CVE-2022-49723.html
* https://www.suse.com/security/cve/CVE-2022-49724.html
* https://www.suse.com/security/cve/CVE-2022-49725.html
* https://www.suse.com/security/cve/CVE-2022-49726.html
* https://www.suse.com/security/cve/CVE-2022-49729.html
* https://www.suse.com/security/cve/CVE-2022-49730.html
* https://www.suse.com/security/cve/CVE-2022-49731.html
* https://www.suse.com/security/cve/CVE-2022-49732.html
* https://www.suse.com/security/cve/CVE-2022-49733.html
* https://www.suse.com/security/cve/CVE-2022-49739.html
* https://www.suse.com/security/cve/CVE-2022-49746.html
* https://www.suse.com/security/cve/CVE-2022-49748.html
* https://www.suse.com/security/cve/CVE-2022-49751.html
* https://www.suse.com/security/cve/CVE-2022-49753.html
* https://www.suse.com/security/cve/CVE-2022-49755.html
* https://www.suse.com/security/cve/CVE-2022-49759.html
* https://www.suse.com/security/cve/CVE-2023-0179.html
* https://www.suse.com/security/cve/CVE-2023-1652.html
* https://www.suse.com/security/cve/CVE-2023-2162.html
* https://www.suse.com/security/cve/CVE-2023-28410.html
* https://www.suse.com/security/cve/CVE-2023-3567.html
* https://www.suse.com/security/cve/CVE-2023-52930.html
* https://www.suse.com/security/cve/CVE-2023-52933.html
* https://www.suse.com/security/cve/CVE-2023-52935.html
* https://www.suse.com/security/cve/CVE-2023-52939.html
* https://www.suse.com/security/cve/CVE-2023-52941.html
* https://www.suse.com/security/cve/CVE-2023-52973.html
* https://www.suse.com/security/cve/CVE-2023-52974.html
* https://www.suse.com/security/cve/CVE-2023-52975.html
* https://www.suse.com/security/cve/CVE-2023-52976.html
* https://www.suse.com/security/cve/CVE-2023-52979.html
* https://www.suse.com/security/cve/CVE-2023-52983.html
* https://www.suse.com/security/cve/CVE-2023-52984.html
* https://www.suse.com/security/cve/CVE-2023-52988.html
* https://www.suse.com/security/cve/CVE-2023-52989.html
* https://www.suse.com/security/cve/CVE-2023-52992.html
* https://www.suse.com/security/cve/CVE-2023-52993.html
* https://www.suse.com/security/cve/CVE-2023-53000.html
* https://www.suse.com/security/cve/CVE-2023-53005.html
* https://www.suse.com/security/cve/CVE-2023-53006.html
* https://www.suse.com/security/cve/CVE-2023-53007.html
* https://www.suse.com/security/cve/CVE-2023-53008.html
* https://www.suse.com/security/cve/CVE-2023-53010.html
* https://www.suse.com/security/cve/CVE-2023-53015.html
* https://www.suse.com/security/cve/CVE-2023-53016.html
* https://www.suse.com/security/cve/CVE-2023-53019.html
* https://www.suse.com/security/cve/CVE-2023-53023.html
* https://www.suse.com/security/cve/CVE-2023-53024.html
* https://www.suse.com/security/cve/CVE-2023-53025.html
* https://www.suse.com/security/cve/CVE-2023-53026.html
* https://www.suse.com/security/cve/CVE-2023-53028.html
* https://www.suse.com/security/cve/CVE-2023-53029.html
* https://www.suse.com/security/cve/CVE-2023-53030.html
* https://www.suse.com/security/cve/CVE-2023-53033.html
* https://www.suse.com/security/cve/CVE-2024-26634.html
* https://www.suse.com/security/cve/CVE-2024-47678.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53124.html
* https://www.suse.com/security/cve/CVE-2024-53176.html
* https://www.suse.com/security/cve/CVE-2024-53178.html
* https://www.suse.com/security/cve/CVE-2024-56651.html
* https://www.suse.com/security/cve/CVE-2024-57996.html
* https://www.suse.com/security/cve/CVE-2024-58013.html
* https://www.suse.com/security/cve/CVE-2024-58014.html
* https://www.suse.com/security/cve/CVE-2025-21693.html
* https://www.suse.com/security/cve/CVE-2025-21718.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21780.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1180814
* https://bugzilla.suse.com/show_bug.cgi?id=1183682
* https://bugzilla.suse.com/show_bug.cgi?id=1190336
* https://bugzilla.suse.com/show_bug.cgi?id=1190768
* https://bugzilla.suse.com/show_bug.cgi?id=1190786
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1194904
* https://bugzilla.suse.com/show_bug.cgi?id=1195823
* https://bugzilla.suse.com/show_bug.cgi?id=1196444
* https://bugzilla.suse.com/show_bug.cgi?id=1197158
* https://bugzilla.suse.com/show_bug.cgi?id=1197174
* https://bugzilla.suse.com/show_bug.cgi?id=1197227
* https://bugzilla.suse.com/show_bug.cgi?id=1197246
* https://bugzilla.suse.com/show_bug.cgi?id=1197302
* https://bugzilla.suse.com/show_bug.cgi?id=1197331
* https://bugzilla.suse.com/show_bug.cgi?id=1197472
* https://bugzilla.suse.com/show_bug.cgi?id=1197661
* https://bugzilla.suse.com/show_bug.cgi?id=1197926
* https://bugzilla.suse.com/show_bug.cgi?id=1198019
* https://bugzilla.suse.com/show_bug.cgi?id=1198021
* https://bugzilla.suse.com/show_bug.cgi?id=1198240
* https://bugzilla.suse.com/show_bug.cgi?id=1198577
* https://bugzilla.suse.com/show_bug.cgi?id=1198660
* https://bugzilla.suse.com/show_bug.cgi?id=1199657
* https://bugzilla.suse.com/show_bug.cgi?id=1200045
* https://bugzilla.suse.com/show_bug.cgi?id=1200571
* https://bugzilla.suse.com/show_bug.cgi?id=1200807
* https://bugzilla.suse.com/show_bug.cgi?id=1200809
* https://bugzilla.suse.com/show_bug.cgi?id=1200810
* https://bugzilla.suse.com/show_bug.cgi?id=1200824
* https://bugzilla.suse.com/show_bug.cgi?id=1200825
* https://bugzilla.suse.com/show_bug.cgi?id=1200871
* https://bugzilla.suse.com/show_bug.cgi?id=1200872
* https://bugzilla.suse.com/show_bug.cgi?id=1201193
* https://bugzilla.suse.com/show_bug.cgi?id=1201218
* https://bugzilla.suse.com/show_bug.cgi?id=1201323
* https://bugzilla.suse.com/show_bug.cgi?id=1201381
* https://bugzilla.suse.com/show_bug.cgi?id=1201610
* https://bugzilla.suse.com/show_bug.cgi?id=1202672
* https://bugzilla.suse.com/show_bug.cgi?id=1202711
* https://bugzilla.suse.com/show_bug.cgi?id=1202712
* https://bugzilla.suse.com/show_bug.cgi?id=1202771
* https://bugzilla.suse.com/show_bug.cgi?id=1202774
* https://bugzilla.suse.com/show_bug.cgi?id=1202778
* https://bugzilla.suse.com/show_bug.cgi?id=1202781
* https://bugzilla.suse.com/show_bug.cgi?id=1203699
* https://bugzilla.suse.com/show_bug.cgi?id=1203769
* https://bugzilla.suse.com/show_bug.cgi?id=1204171
* https://bugzilla.suse.com/show_bug.cgi?id=1205205
* https://bugzilla.suse.com/show_bug.cgi?id=1205701
* https://bugzilla.suse.com/show_bug.cgi?id=1206048
* https://bugzilla.suse.com/show_bug.cgi?id=1206049
* https://bugzilla.suse.com/show_bug.cgi?id=1206451
* https://bugzilla.suse.com/show_bug.cgi?id=1207034
* https://bugzilla.suse.com/show_bug.cgi?id=1207186
* https://bugzilla.suse.com/show_bug.cgi?id=1207361
* https://bugzilla.suse.com/show_bug.cgi?id=1207593
* https://bugzilla.suse.com/show_bug.cgi?id=1207640
* https://bugzilla.suse.com/show_bug.cgi?id=1207878
* https://bugzilla.suse.com/show_bug.cgi?id=1209262
* https://bugzilla.suse.com/show_bug.cgi?id=1209547
* https://bugzilla.suse.com/show_bug.cgi?id=1209788
* https://bugzilla.suse.com/show_bug.cgi?id=1209980
* https://bugzilla.suse.com/show_bug.cgi?id=1210050
* https://bugzilla.suse.com/show_bug.cgi?id=1210647
* https://bugzilla.suse.com/show_bug.cgi?id=1211263
* https://bugzilla.suse.com/show_bug.cgi?id=1213167
* https://bugzilla.suse.com/show_bug.cgi?id=1218450
* https://bugzilla.suse.com/show_bug.cgi?id=1221651
* https://bugzilla.suse.com/show_bug.cgi?id=1225428
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1229312
* https://bugzilla.suse.com/show_bug.cgi?id=1231375
* https://bugzilla.suse.com/show_bug.cgi?id=1231432
* https://bugzilla.suse.com/show_bug.cgi?id=1231854
* https://bugzilla.suse.com/show_bug.cgi?id=1232299
* https://bugzilla.suse.com/show_bug.cgi?id=1232743
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233749
* https://bugzilla.suse.com/show_bug.cgi?id=1234074
* https://bugzilla.suse.com/show_bug.cgi?id=1234894
* https://bugzilla.suse.com/show_bug.cgi?id=1234895
* https://bugzilla.suse.com/show_bug.cgi?id=1234896
* https://bugzilla.suse.com/show_bug.cgi?id=1235528
* https://bugzilla.suse.com/show_bug.cgi?id=1235599
* https://bugzilla.suse.com/show_bug.cgi?id=1235870
* https://bugzilla.suse.com/show_bug.cgi?id=1237029
* https://bugzilla.suse.com/show_bug.cgi?id=1237521
* https://bugzilla.suse.com/show_bug.cgi?id=1237530
* https://bugzilla.suse.com/show_bug.cgi?id=1237718
* https://bugzilla.suse.com/show_bug.cgi?id=1237721
* https://bugzilla.suse.com/show_bug.cgi?id=1237722
* https://bugzilla.suse.com/show_bug.cgi?id=1237723
* https://bugzilla.suse.com/show_bug.cgi?id=1237724
* https://bugzilla.suse.com/show_bug.cgi?id=1237725
* https://bugzilla.suse.com/show_bug.cgi?id=1237726
* https://bugzilla.suse.com/show_bug.cgi?id=1237727
* https://bugzilla.suse.com/show_bug.cgi?id=1237728
* https://bugzilla.suse.com/show_bug.cgi?id=1237729
* https://bugzilla.suse.com/show_bug.cgi?id=1237730
* https://bugzilla.suse.com/show_bug.cgi?id=1237733
* https://bugzilla.suse.com/show_bug.cgi?id=1237734
* https://bugzilla.suse.com/show_bug.cgi?id=1237735
* https://bugzilla.suse.com/show_bug.cgi?id=1237736
* https://bugzilla.suse.com/show_bug.cgi?id=1237737
* https://bugzilla.suse.com/show_bug.cgi?id=1237738
* https://bugzilla.suse.com/show_bug.cgi?id=1237739
* https://bugzilla.suse.com/show_bug.cgi?id=1237740
* https://bugzilla.suse.com/show_bug.cgi?id=1237742
* https://bugzilla.suse.com/show_bug.cgi?id=1237743
* https://bugzilla.suse.com/show_bug.cgi?id=1237744
* https://bugzilla.suse.com/show_bug.cgi?id=1237745
* https://bugzilla.suse.com/show_bug.cgi?id=1237746
* https://bugzilla.suse.com/show_bug.cgi?id=1237748
* https://bugzilla.suse.com/show_bug.cgi?id=1237749
* https://bugzilla.suse.com/show_bug.cgi?id=1237751
* https://bugzilla.suse.com/show_bug.cgi?id=1237752
* https://bugzilla.suse.com/show_bug.cgi?id=1237753
* https://bugzilla.suse.com/show_bug.cgi?id=1237755
* https://bugzilla.suse.com/show_bug.cgi?id=1237759
* https://bugzilla.suse.com/show_bug.cgi?id=1237761
* https://bugzilla.suse.com/show_bug.cgi?id=1237763
* https://bugzilla.suse.com/show_bug.cgi?id=1237766
* https://bugzilla.suse.com/show_bug.cgi?id=1237767
* https://bugzilla.suse.com/show_bug.cgi?id=1237768
* https://bugzilla.suse.com/show_bug.cgi?id=1237774
* https://bugzilla.suse.com/show_bug.cgi?id=1237775
* https://bugzilla.suse.com/show_bug.cgi?id=1237778
* https://bugzilla.suse.com/show_bug.cgi?id=1237779
* https://bugzilla.suse.com/show_bug.cgi?id=1237780
* https://bugzilla.suse.com/show_bug.cgi?id=1237782
* https://bugzilla.suse.com/show_bug.cgi?id=1237783
* https://bugzilla.suse.com/show_bug.cgi?id=1237784
* https://bugzilla.suse.com/show_bug.cgi?id=1237785
* https://bugzilla.suse.com/show_bug.cgi?id=1237786
* https://bugzilla.suse.com/show_bug.cgi?id=1237787
* https://bugzilla.suse.com/show_bug.cgi?id=1237788
* https://bugzilla.suse.com/show_bug.cgi?id=1237789
* https://bugzilla.suse.com/show_bug.cgi?id=1237790
* https://bugzilla.suse.com/show_bug.cgi?id=1237792
* https://bugzilla.suse.com/show_bug.cgi?id=1237794
* https://bugzilla.suse.com/show_bug.cgi?id=1237795
* https://bugzilla.suse.com/show_bug.cgi?id=1237797
* https://bugzilla.suse.com/show_bug.cgi?id=1237798
* https://bugzilla.suse.com/show_bug.cgi?id=1237799
* https://bugzilla.suse.com/show_bug.cgi?id=1237807
* https://bugzilla.suse.com/show_bug.cgi?id=1237808
* https://bugzilla.suse.com/show_bug.cgi?id=1237809
* https://bugzilla.suse.com/show_bug.cgi?id=1237810
* https://bugzilla.suse.com/show_bug.cgi?id=1237812
* https://bugzilla.suse.com/show_bug.cgi?id=1237813
* https://bugzilla.suse.com/show_bug.cgi?id=1237814
* https://bugzilla.suse.com/show_bug.cgi?id=1237815
* https://bugzilla.suse.com/show_bug.cgi?id=1237816
* https://bugzilla.suse.com/show_bug.cgi?id=1237817
* https://bugzilla.suse.com/show_bug.cgi?id=1237818
* https://bugzilla.suse.com/show_bug.cgi?id=1237820
* https://bugzilla.suse.com/show_bug.cgi?id=1237821
* https://bugzilla.suse.com/show_bug.cgi?id=1237823
* https://bugzilla.suse.com/show_bug.cgi?id=1237824
* https://bugzilla.suse.com/show_bug.cgi?id=1237826
* https://bugzilla.suse.com/show_bug.cgi?id=1237827
* https://bugzilla.suse.com/show_bug.cgi?id=1237829
* https://bugzilla.suse.com/show_bug.cgi?id=1237831
* https://bugzilla.suse.com/show_bug.cgi?id=1237835
* https://bugzilla.suse.com/show_bug.cgi?id=1237836
* https://bugzilla.suse.com/show_bug.cgi?id=1237837
* https://bugzilla.suse.com/show_bug.cgi?id=1237839
* https://bugzilla.suse.com/show_bug.cgi?id=1237840
* https://bugzilla.suse.com/show_bug.cgi?id=1237845
* https://bugzilla.suse.com/show_bug.cgi?id=1237846
* https://bugzilla.suse.com/show_bug.cgi?id=1237868
* https://bugzilla.suse.com/show_bug.cgi?id=1237872
* https://bugzilla.suse.com/show_bug.cgi?id=1237892
* https://bugzilla.suse.com/show_bug.cgi?id=1237903
* https://bugzilla.suse.com/show_bug.cgi?id=1237904
* https://bugzilla.suse.com/show_bug.cgi?id=1237916
* https://bugzilla.suse.com/show_bug.cgi?id=1237918
* https://bugzilla.suse.com/show_bug.cgi?id=1237922
* https://bugzilla.suse.com/show_bug.cgi?id=1237925
* https://bugzilla.suse.com/show_bug.cgi?id=1237926
* https://bugzilla.suse.com/show_bug.cgi?id=1237927
* https://bugzilla.suse.com/show_bug.cgi?id=1237928
* https://bugzilla.suse.com/show_bug.cgi?id=1237929
* https://bugzilla.suse.com/show_bug.cgi?id=1237931
* https://bugzilla.suse.com/show_bug.cgi?id=1237932
* https://bugzilla.suse.com/show_bug.cgi?id=1237933
* https://bugzilla.suse.com/show_bug.cgi?id=1237937
* https://bugzilla.suse.com/show_bug.cgi?id=1237939
* https://bugzilla.suse.com/show_bug.cgi?id=1237940
* https://bugzilla.suse.com/show_bug.cgi?id=1237941
* https://bugzilla.suse.com/show_bug.cgi?id=1237942
* https://bugzilla.suse.com/show_bug.cgi?id=1237946
* https://bugzilla.suse.com/show_bug.cgi?id=1237951
* https://bugzilla.suse.com/show_bug.cgi?id=1237952
* https://bugzilla.suse.com/show_bug.cgi?id=1237954
* https://bugzilla.suse.com/show_bug.cgi?id=1237955
* https://bugzilla.suse.com/show_bug.cgi?id=1237957
* https://bugzilla.suse.com/show_bug.cgi?id=1237958
* https://bugzilla.suse.com/show_bug.cgi?id=1237959
* https://bugzilla.suse.com/show_bug.cgi?id=1237960
* https://bugzilla.suse.com/show_bug.cgi?id=1237961
* https://bugzilla.suse.com/show_bug.cgi?id=1237962
* https://bugzilla.suse.com/show_bug.cgi?id=1237963
* https://bugzilla.suse.com/show_bug.cgi?id=1237965
* https://bugzilla.suse.com/show_bug.cgi?id=1237966
* https://bugzilla.suse.com/show_bug.cgi?id=1237967
* https://bugzilla.suse.com/show_bug.cgi?id=1237968
* https://bugzilla.suse.com/show_bug.cgi?id=1237969
* https://bugzilla.suse.com/show_bug.cgi?id=1237970
* https://bugzilla.suse.com/show_bug.cgi?id=1237971
* https://bugzilla.suse.com/show_bug.cgi?id=1237972
* https://bugzilla.suse.com/show_bug.cgi?id=1237973
* https://bugzilla.suse.com/show_bug.cgi?id=1237975
* https://bugzilla.suse.com/show_bug.cgi?id=1237976
* https://bugzilla.suse.com/show_bug.cgi?id=1237978
* https://bugzilla.suse.com/show_bug.cgi?id=1237979
* https://bugzilla.suse.com/show_bug.cgi?id=1237980
* https://bugzilla.suse.com/show_bug.cgi?id=1237982
* https://bugzilla.suse.com/show_bug.cgi?id=1237983
* https://bugzilla.suse.com/show_bug.cgi?id=1237984
* https://bugzilla.suse.com/show_bug.cgi?id=1237986
* https://bugzilla.suse.com/show_bug.cgi?id=1237987
* https://bugzilla.suse.com/show_bug.cgi?id=1237990
* https://bugzilla.suse.com/show_bug.cgi?id=1237992
* https://bugzilla.suse.com/show_bug.cgi?id=1237996
* https://bugzilla.suse.com/show_bug.cgi?id=1237997
* https://bugzilla.suse.com/show_bug.cgi?id=1237998
* https://bugzilla.suse.com/show_bug.cgi?id=1237999
* https://bugzilla.suse.com/show_bug.cgi?id=1238000
* https://bugzilla.suse.com/show_bug.cgi?id=1238003
* https://bugzilla.suse.com/show_bug.cgi?id=1238004
* https://bugzilla.suse.com/show_bug.cgi?id=1238005
* https://bugzilla.suse.com/show_bug.cgi?id=1238006
* https://bugzilla.suse.com/show_bug.cgi?id=1238007
* https://bugzilla.suse.com/show_bug.cgi?id=1238009
* https://bugzilla.suse.com/show_bug.cgi?id=1238010
* https://bugzilla.suse.com/show_bug.cgi?id=1238011
* https://bugzilla.suse.com/show_bug.cgi?id=1238012
* https://bugzilla.suse.com/show_bug.cgi?id=1238013
* https://bugzilla.suse.com/show_bug.cgi?id=1238014
* https://bugzilla.suse.com/show_bug.cgi?id=1238016
* https://bugzilla.suse.com/show_bug.cgi?id=1238017
* https://bugzilla.suse.com/show_bug.cgi?id=1238018
* https://bugzilla.suse.com/show_bug.cgi?id=1238019
* https://bugzilla.suse.com/show_bug.cgi?id=1238021
* https://bugzilla.suse.com/show_bug.cgi?id=1238022
* https://bugzilla.suse.com/show_bug.cgi?id=1238024
* https://bugzilla.suse.com/show_bug.cgi?id=1238025
* https://bugzilla.suse.com/show_bug.cgi?id=1238030
* https://bugzilla.suse.com/show_bug.cgi?id=1238032
* https://bugzilla.suse.com/show_bug.cgi?id=1238036
* https://bugzilla.suse.com/show_bug.cgi?id=1238037
* https://bugzilla.suse.com/show_bug.cgi?id=1238041
* https://bugzilla.suse.com/show_bug.cgi?id=1238046
* https://bugzilla.suse.com/show_bug.cgi?id=1238047
* https://bugzilla.suse.com/show_bug.cgi?id=1238048
* https://bugzilla.suse.com/show_bug.cgi?id=1238069
* https://bugzilla.suse.com/show_bug.cgi?id=1238071
* https://bugzilla.suse.com/show_bug.cgi?id=1238077
* https://bugzilla.suse.com/show_bug.cgi?id=1238079
* https://bugzilla.suse.com/show_bug.cgi?id=1238080
* https://bugzilla.suse.com/show_bug.cgi?id=1238083
* https://bugzilla.suse.com/show_bug.cgi?id=1238084
* https://bugzilla.suse.com/show_bug.cgi?id=1238085
* https://bugzilla.suse.com/show_bug.cgi?id=1238086
* https://bugzilla.suse.com/show_bug.cgi?id=1238089
* https://bugzilla.suse.com/show_bug.cgi?id=1238090
* https://bugzilla.suse.com/show_bug.cgi?id=1238091
* https://bugzilla.suse.com/show_bug.cgi?id=1238092
* https://bugzilla.suse.com/show_bug.cgi?id=1238096
* https://bugzilla.suse.com/show_bug.cgi?id=1238097
* https://bugzilla.suse.com/show_bug.cgi?id=1238099
* https://bugzilla.suse.com/show_bug.cgi?id=1238103
* https://bugzilla.suse.com/show_bug.cgi?id=1238105
* https://bugzilla.suse.com/show_bug.cgi?id=1238106
* https://bugzilla.suse.com/show_bug.cgi?id=1238107
* https://bugzilla.suse.com/show_bug.cgi?id=1238108
* https://bugzilla.suse.com/show_bug.cgi?id=1238110
* https://bugzilla.suse.com/show_bug.cgi?id=1238111
* https://bugzilla.suse.com/show_bug.cgi?id=1238112
* https://bugzilla.suse.com/show_bug.cgi?id=1238113
* https://bugzilla.suse.com/show_bug.cgi?id=1238114
* https://bugzilla.suse.com/show_bug.cgi?id=1238115
* https://bugzilla.suse.com/show_bug.cgi?id=1238116
* https://bugzilla.suse.com/show_bug.cgi?id=1238118
* https://bugzilla.suse.com/show_bug.cgi?id=1238120
* https://bugzilla.suse.com/show_bug.cgi?id=1238122
* https://bugzilla.suse.com/show_bug.cgi?id=1238123
* https://bugzilla.suse.com/show_bug.cgi?id=1238125
* https://bugzilla.suse.com/show_bug.cgi?id=1238126
* https://bugzilla.suse.com/show_bug.cgi?id=1238127
* https://bugzilla.suse.com/show_bug.cgi?id=1238128
* https://bugzilla.suse.com/show_bug.cgi?id=1238131
* https://bugzilla.suse.com/show_bug.cgi?id=1238134
* https://bugzilla.suse.com/show_bug.cgi?id=1238135
* https://bugzilla.suse.com/show_bug.cgi?id=1238138
* https://bugzilla.suse.com/show_bug.cgi?id=1238139
* https://bugzilla.suse.com/show_bug.cgi?id=1238140
* https://bugzilla.suse.com/show_bug.cgi?id=1238142
* https://bugzilla.suse.com/show_bug.cgi?id=1238144
* https://bugzilla.suse.com/show_bug.cgi?id=1238146
* https://bugzilla.suse.com/show_bug.cgi?id=1238147
* https://bugzilla.suse.com/show_bug.cgi?id=1238149
* https://bugzilla.suse.com/show_bug.cgi?id=1238150
* https://bugzilla.suse.com/show_bug.cgi?id=1238153
* https://bugzilla.suse.com/show_bug.cgi?id=1238155
* https://bugzilla.suse.com/show_bug.cgi?id=1238156
* https://bugzilla.suse.com/show_bug.cgi?id=1238157
* https://bugzilla.suse.com/show_bug.cgi?id=1238158
* https://bugzilla.suse.com/show_bug.cgi?id=1238160
* https://bugzilla.suse.com/show_bug.cgi?id=1238162
* https://bugzilla.suse.com/show_bug.cgi?id=1238166
* https://bugzilla.suse.com/show_bug.cgi?id=1238167
* https://bugzilla.suse.com/show_bug.cgi?id=1238168
* https://bugzilla.suse.com/show_bug.cgi?id=1238169
* https://bugzilla.suse.com/show_bug.cgi?id=1238170
* https://bugzilla.suse.com/show_bug.cgi?id=1238171
* https://bugzilla.suse.com/show_bug.cgi?id=1238172
* https://bugzilla.suse.com/show_bug.cgi?id=1238175
* https://bugzilla.suse.com/show_bug.cgi?id=1238176
* https://bugzilla.suse.com/show_bug.cgi?id=1238177
* https://bugzilla.suse.com/show_bug.cgi?id=1238178
* https://bugzilla.suse.com/show_bug.cgi?id=1238179
* https://bugzilla.suse.com/show_bug.cgi?id=1238180
* https://bugzilla.suse.com/show_bug.cgi?id=1238181
* https://bugzilla.suse.com/show_bug.cgi?id=1238183
* https://bugzilla.suse.com/show_bug.cgi?id=1238184
* https://bugzilla.suse.com/show_bug.cgi?id=1238187
* https://bugzilla.suse.com/show_bug.cgi?id=1238221
* https://bugzilla.suse.com/show_bug.cgi?id=1238222
* https://bugzilla.suse.com/show_bug.cgi?id=1238226
* https://bugzilla.suse.com/show_bug.cgi?id=1238228
* https://bugzilla.suse.com/show_bug.cgi?id=1238229
* https://bugzilla.suse.com/show_bug.cgi?id=1238231
* https://bugzilla.suse.com/show_bug.cgi?id=1238233
* https://bugzilla.suse.com/show_bug.cgi?id=1238234
* https://bugzilla.suse.com/show_bug.cgi?id=1238235
* https://bugzilla.suse.com/show_bug.cgi?id=1238236
* https://bugzilla.suse.com/show_bug.cgi?id=1238238
* https://bugzilla.suse.com/show_bug.cgi?id=1238239
* https://bugzilla.suse.com/show_bug.cgi?id=1238240
* https://bugzilla.suse.com/show_bug.cgi?id=1238241
* https://bugzilla.suse.com/show_bug.cgi?id=1238242
* https://bugzilla.suse.com/show_bug.cgi?id=1238243
* https://bugzilla.suse.com/show_bug.cgi?id=1238244
* https://bugzilla.suse.com/show_bug.cgi?id=1238246
* https://bugzilla.suse.com/show_bug.cgi?id=1238247
* https://bugzilla.suse.com/show_bug.cgi?id=1238248
* https://bugzilla.suse.com/show_bug.cgi?id=1238249
* https://bugzilla.suse.com/show_bug.cgi?id=1238252
* https://bugzilla.suse.com/show_bug.cgi?id=1238253
* https://bugzilla.suse.com/show_bug.cgi?id=1238255
* https://bugzilla.suse.com/show_bug.cgi?id=1238256
* https://bugzilla.suse.com/show_bug.cgi?id=1238257
* https://bugzilla.suse.com/show_bug.cgi?id=1238260
* https://bugzilla.suse.com/show_bug.cgi?id=1238261
* https://bugzilla.suse.com/show_bug.cgi?id=1238262
* https://bugzilla.suse.com/show_bug.cgi?id=1238263
* https://bugzilla.suse.com/show_bug.cgi?id=1238264
* https://bugzilla.suse.com/show_bug.cgi?id=1238266
* https://bugzilla.suse.com/show_bug.cgi?id=1238267
* https://bugzilla.suse.com/show_bug.cgi?id=1238268
* https://bugzilla.suse.com/show_bug.cgi?id=1238269
* https://bugzilla.suse.com/show_bug.cgi?id=1238270
* https://bugzilla.suse.com/show_bug.cgi?id=1238271
* https://bugzilla.suse.com/show_bug.cgi?id=1238272
* https://bugzilla.suse.com/show_bug.cgi?id=1238274
* https://bugzilla.suse.com/show_bug.cgi?id=1238275
* https://bugzilla.suse.com/show_bug.cgi?id=1238276
* https://bugzilla.suse.com/show_bug.cgi?id=1238277
* https://bugzilla.suse.com/show_bug.cgi?id=1238278
* https://bugzilla.suse.com/show_bug.cgi?id=1238279
* https://bugzilla.suse.com/show_bug.cgi?id=1238281
* https://bugzilla.suse.com/show_bug.cgi?id=1238282
* https://bugzilla.suse.com/show_bug.cgi?id=1238283
* https://bugzilla.suse.com/show_bug.cgi?id=1238284
* https://bugzilla.suse.com/show_bug.cgi?id=1238285
* https://bugzilla.suse.com/show_bug.cgi?id=1238286
* https://bugzilla.suse.com/show_bug.cgi?id=1238287
* https://bugzilla.suse.com/show_bug.cgi?id=1238288
* https://bugzilla.suse.com/show_bug.cgi?id=1238289
* https://bugzilla.suse.com/show_bug.cgi?id=1238291
* https://bugzilla.suse.com/show_bug.cgi?id=1238292
* https://bugzilla.suse.com/show_bug.cgi?id=1238293
* https://bugzilla.suse.com/show_bug.cgi?id=1238295
* https://bugzilla.suse.com/show_bug.cgi?id=1238298
* https://bugzilla.suse.com/show_bug.cgi?id=1238300
* https://bugzilla.suse.com/show_bug.cgi?id=1238301
* https://bugzilla.suse.com/show_bug.cgi?id=1238302
* https://bugzilla.suse.com/show_bug.cgi?id=1238306
* https://bugzilla.suse.com/show_bug.cgi?id=1238307
* https://bugzilla.suse.com/show_bug.cgi?id=1238308
* https://bugzilla.suse.com/show_bug.cgi?id=1238309
* https://bugzilla.suse.com/show_bug.cgi?id=1238311
* https://bugzilla.suse.com/show_bug.cgi?id=1238313
* https://bugzilla.suse.com/show_bug.cgi?id=1238326
* https://bugzilla.suse.com/show_bug.cgi?id=1238327
* https://bugzilla.suse.com/show_bug.cgi?id=1238328
* https://bugzilla.suse.com/show_bug.cgi?id=1238329
* https://bugzilla.suse.com/show_bug.cgi?id=1238331
* https://bugzilla.suse.com/show_bug.cgi?id=1238333
* https://bugzilla.suse.com/show_bug.cgi?id=1238334
* https://bugzilla.suse.com/show_bug.cgi?id=1238335
* https://bugzilla.suse.com/show_bug.cgi?id=1238336
* https://bugzilla.suse.com/show_bug.cgi?id=1238337
* https://bugzilla.suse.com/show_bug.cgi?id=1238338
* https://bugzilla.suse.com/show_bug.cgi?id=1238339
* https://bugzilla.suse.com/show_bug.cgi?id=1238341
* https://bugzilla.suse.com/show_bug.cgi?id=1238343
* https://bugzilla.suse.com/show_bug.cgi?id=1238344
* https://bugzilla.suse.com/show_bug.cgi?id=1238345
* https://bugzilla.suse.com/show_bug.cgi?id=1238372
* https://bugzilla.suse.com/show_bug.cgi?id=1238373
* https://bugzilla.suse.com/show_bug.cgi?id=1238374
* https://bugzilla.suse.com/show_bug.cgi?id=1238376
* https://bugzilla.suse.com/show_bug.cgi?id=1238377
* https://bugzilla.suse.com/show_bug.cgi?id=1238378
* https://bugzilla.suse.com/show_bug.cgi?id=1238381
* https://bugzilla.suse.com/show_bug.cgi?id=1238382
* https://bugzilla.suse.com/show_bug.cgi?id=1238383
* https://bugzilla.suse.com/show_bug.cgi?id=1238385
* https://bugzilla.suse.com/show_bug.cgi?id=1238386
* https://bugzilla.suse.com/show_bug.cgi?id=1238387
* https://bugzilla.suse.com/show_bug.cgi?id=1238388
* https://bugzilla.suse.com/show_bug.cgi?id=1238389
* https://bugzilla.suse.com/show_bug.cgi?id=1238390
* https://bugzilla.suse.com/show_bug.cgi?id=1238391
* https://bugzilla.suse.com/show_bug.cgi?id=1238392
* https://bugzilla.suse.com/show_bug.cgi?id=1238393
* https://bugzilla.suse.com/show_bug.cgi?id=1238394
* https://bugzilla.suse.com/show_bug.cgi?id=1238395
* https://bugzilla.suse.com/show_bug.cgi?id=1238396
* https://bugzilla.suse.com/show_bug.cgi?id=1238397
* https://bugzilla.suse.com/show_bug.cgi?id=1238398
* https://bugzilla.suse.com/show_bug.cgi?id=1238400
* https://bugzilla.suse.com/show_bug.cgi?id=1238401
* https://bugzilla.suse.com/show_bug.cgi?id=1238410
* https://bugzilla.suse.com/show_bug.cgi?id=1238411
* https://bugzilla.suse.com/show_bug.cgi?id=1238413
* https://bugzilla.suse.com/show_bug.cgi?id=1238415
* https://bugzilla.suse.com/show_bug.cgi?id=1238416
* https://bugzilla.suse.com/show_bug.cgi?id=1238417
* https://bugzilla.suse.com/show_bug.cgi?id=1238418
* https://bugzilla.suse.com/show_bug.cgi?id=1238419
* https://bugzilla.suse.com/show_bug.cgi?id=1238420
* https://bugzilla.suse.com/show_bug.cgi?id=1238422
* https://bugzilla.suse.com/show_bug.cgi?id=1238423
* https://bugzilla.suse.com/show_bug.cgi?id=1238424
* https://bugzilla.suse.com/show_bug.cgi?id=1238428
* https://bugzilla.suse.com/show_bug.cgi?id=1238429
* https://bugzilla.suse.com/show_bug.cgi?id=1238430
* https://bugzilla.suse.com/show_bug.cgi?id=1238431
* https://bugzilla.suse.com/show_bug.cgi?id=1238432
* https://bugzilla.suse.com/show_bug.cgi?id=1238433
* https://bugzilla.suse.com/show_bug.cgi?id=1238434
* https://bugzilla.suse.com/show_bug.cgi?id=1238435
* https://bugzilla.suse.com/show_bug.cgi?id=1238436
* https://bugzilla.suse.com/show_bug.cgi?id=1238437
* https://bugzilla.suse.com/show_bug.cgi?id=1238440
* https://bugzilla.suse.com/show_bug.cgi?id=1238441
* https://bugzilla.suse.com/show_bug.cgi?id=1238442
* https://bugzilla.suse.com/show_bug.cgi?id=1238443
* https://bugzilla.suse.com/show_bug.cgi?id=1238444
* https://bugzilla.suse.com/show_bug.cgi?id=1238445
* https://bugzilla.suse.com/show_bug.cgi?id=1238446
* https://bugzilla.suse.com/show_bug.cgi?id=1238447
* https://bugzilla.suse.com/show_bug.cgi?id=1238453
* https://bugzilla.suse.com/show_bug.cgi?id=1238454
* https://bugzilla.suse.com/show_bug.cgi?id=1238458
* https://bugzilla.suse.com/show_bug.cgi?id=1238459
* https://bugzilla.suse.com/show_bug.cgi?id=1238462
* https://bugzilla.suse.com/show_bug.cgi?id=1238463
* https://bugzilla.suse.com/show_bug.cgi?id=1238465
* https://bugzilla.suse.com/show_bug.cgi?id=1238467
* https://bugzilla.suse.com/show_bug.cgi?id=1238469
* https://bugzilla.suse.com/show_bug.cgi?id=1238533
* https://bugzilla.suse.com/show_bug.cgi?id=1238536
* https://bugzilla.suse.com/show_bug.cgi?id=1238538
* https://bugzilla.suse.com/show_bug.cgi?id=1238539
* https://bugzilla.suse.com/show_bug.cgi?id=1238540
* https://bugzilla.suse.com/show_bug.cgi?id=1238542
* https://bugzilla.suse.com/show_bug.cgi?id=1238543
* https://bugzilla.suse.com/show_bug.cgi?id=1238545
* https://bugzilla.suse.com/show_bug.cgi?id=1238546
* https://bugzilla.suse.com/show_bug.cgi?id=1238551
* https://bugzilla.suse.com/show_bug.cgi?id=1238552
* https://bugzilla.suse.com/show_bug.cgi?id=1238556
* https://bugzilla.suse.com/show_bug.cgi?id=1238557
* https://bugzilla.suse.com/show_bug.cgi?id=1238599
* https://bugzilla.suse.com/show_bug.cgi?id=1238600
* https://bugzilla.suse.com/show_bug.cgi?id=1238601
* https://bugzilla.suse.com/show_bug.cgi?id=1238602
* https://bugzilla.suse.com/show_bug.cgi?id=1238605
* https://bugzilla.suse.com/show_bug.cgi?id=1238612
* https://bugzilla.suse.com/show_bug.cgi?id=1238613
* https://bugzilla.suse.com/show_bug.cgi?id=1238615
* https://bugzilla.suse.com/show_bug.cgi?id=1238616
* https://bugzilla.suse.com/show_bug.cgi?id=1238617
* https://bugzilla.suse.com/show_bug.cgi?id=1238618
* https://bugzilla.suse.com/show_bug.cgi?id=1238619
* https://bugzilla.suse.com/show_bug.cgi?id=1238621
* https://bugzilla.suse.com/show_bug.cgi?id=1238623
* https://bugzilla.suse.com/show_bug.cgi?id=1238625
* https://bugzilla.suse.com/show_bug.cgi?id=1238626
* https://bugzilla.suse.com/show_bug.cgi?id=1238630
* https://bugzilla.suse.com/show_bug.cgi?id=1238631
* https://bugzilla.suse.com/show_bug.cgi?id=1238632
* https://bugzilla.suse.com/show_bug.cgi?id=1238633
* https://bugzilla.suse.com/show_bug.cgi?id=1238635
* https://bugzilla.suse.com/show_bug.cgi?id=1238636
* https://bugzilla.suse.com/show_bug.cgi?id=1238638
* https://bugzilla.suse.com/show_bug.cgi?id=1238639
* https://bugzilla.suse.com/show_bug.cgi?id=1238640
* https://bugzilla.suse.com/show_bug.cgi?id=1238641
* https://bugzilla.suse.com/show_bug.cgi?id=1238642
* https://bugzilla.suse.com/show_bug.cgi?id=1238643
* https://bugzilla.suse.com/show_bug.cgi?id=1238645
* https://bugzilla.suse.com/show_bug.cgi?id=1238646
* https://bugzilla.suse.com/show_bug.cgi?id=1238647
* https://bugzilla.suse.com/show_bug.cgi?id=1238648
* https://bugzilla.suse.com/show_bug.cgi?id=1238649
* https://bugzilla.suse.com/show_bug.cgi?id=1238650
* https://bugzilla.suse.com/show_bug.cgi?id=1238653
* https://bugzilla.suse.com/show_bug.cgi?id=1238654
* https://bugzilla.suse.com/show_bug.cgi?id=1238655
* https://bugzilla.suse.com/show_bug.cgi?id=1238658
* https://bugzilla.suse.com/show_bug.cgi?id=1238661
* https://bugzilla.suse.com/show_bug.cgi?id=1238662
* https://bugzilla.suse.com/show_bug.cgi?id=1238663
* https://bugzilla.suse.com/show_bug.cgi?id=1238664
* https://bugzilla.suse.com/show_bug.cgi?id=1238666
* https://bugzilla.suse.com/show_bug.cgi?id=1238668
* https://bugzilla.suse.com/show_bug.cgi?id=1238705
* https://bugzilla.suse.com/show_bug.cgi?id=1238707
* https://bugzilla.suse.com/show_bug.cgi?id=1238710
* https://bugzilla.suse.com/show_bug.cgi?id=1238712
* https://bugzilla.suse.com/show_bug.cgi?id=1238718
* https://bugzilla.suse.com/show_bug.cgi?id=1238719
* https://bugzilla.suse.com/show_bug.cgi?id=1238721
* https://bugzilla.suse.com/show_bug.cgi?id=1238722
* https://bugzilla.suse.com/show_bug.cgi?id=1238727
* https://bugzilla.suse.com/show_bug.cgi?id=1238729
* https://bugzilla.suse.com/show_bug.cgi?id=1238750
* https://bugzilla.suse.com/show_bug.cgi?id=1238787
* https://bugzilla.suse.com/show_bug.cgi?id=1238789
* https://bugzilla.suse.com/show_bug.cgi?id=1238792
* https://bugzilla.suse.com/show_bug.cgi?id=1238799
* https://bugzilla.suse.com/show_bug.cgi?id=1238803
* https://bugzilla.suse.com/show_bug.cgi?id=1238804
* https://bugzilla.suse.com/show_bug.cgi?id=1238805
* https://bugzilla.suse.com/show_bug.cgi?id=1238806
* https://bugzilla.suse.com/show_bug.cgi?id=1238808
* https://bugzilla.suse.com/show_bug.cgi?id=1238809
* https://bugzilla.suse.com/show_bug.cgi?id=1238810
* https://bugzilla.suse.com/show_bug.cgi?id=1238811
* https://bugzilla.suse.com/show_bug.cgi?id=1238814
* https://bugzilla.suse.com/show_bug.cgi?id=1238815
* https://bugzilla.suse.com/show_bug.cgi?id=1238816
* https://bugzilla.suse.com/show_bug.cgi?id=1238817
* https://bugzilla.suse.com/show_bug.cgi?id=1238818
* https://bugzilla.suse.com/show_bug.cgi?id=1238819
* https://bugzilla.suse.com/show_bug.cgi?id=1238820
* https://bugzilla.suse.com/show_bug.cgi?id=1238821
* https://bugzilla.suse.com/show_bug.cgi?id=1238822
* https://bugzilla.suse.com/show_bug.cgi?id=1238823
* https://bugzilla.suse.com/show_bug.cgi?id=1238825
* https://bugzilla.suse.com/show_bug.cgi?id=1238830
* https://bugzilla.suse.com/show_bug.cgi?id=1238834
* https://bugzilla.suse.com/show_bug.cgi?id=1238835
* https://bugzilla.suse.com/show_bug.cgi?id=1238836
* https://bugzilla.suse.com/show_bug.cgi?id=1238838
* https://bugzilla.suse.com/show_bug.cgi?id=1238843
* https://bugzilla.suse.com/show_bug.cgi?id=1238867
* https://bugzilla.suse.com/show_bug.cgi?id=1238868
* https://bugzilla.suse.com/show_bug.cgi?id=1238869
* https://bugzilla.suse.com/show_bug.cgi?id=1238870
* https://bugzilla.suse.com/show_bug.cgi?id=1238871
* https://bugzilla.suse.com/show_bug.cgi?id=1238878
* https://bugzilla.suse.com/show_bug.cgi?id=1238889
* https://bugzilla.suse.com/show_bug.cgi?id=1238892
* https://bugzilla.suse.com/show_bug.cgi?id=1238893
* https://bugzilla.suse.com/show_bug.cgi?id=1238897
* https://bugzilla.suse.com/show_bug.cgi?id=1238898
* https://bugzilla.suse.com/show_bug.cgi?id=1238899
* https://bugzilla.suse.com/show_bug.cgi?id=1238902
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238916
* https://bugzilla.suse.com/show_bug.cgi?id=1238919
* https://bugzilla.suse.com/show_bug.cgi?id=1238925
* https://bugzilla.suse.com/show_bug.cgi?id=1238930
* https://bugzilla.suse.com/show_bug.cgi?id=1238933
* https://bugzilla.suse.com/show_bug.cgi?id=1238936
* https://bugzilla.suse.com/show_bug.cgi?id=1238937
* https://bugzilla.suse.com/show_bug.cgi?id=1238938
* https://bugzilla.suse.com/show_bug.cgi?id=1238939
* https://bugzilla.suse.com/show_bug.cgi?id=1238941
* https://bugzilla.suse.com/show_bug.cgi?id=1238942
* https://bugzilla.suse.com/show_bug.cgi?id=1238943
* https://bugzilla.suse.com/show_bug.cgi?id=1238944
* https://bugzilla.suse.com/show_bug.cgi?id=1238945
* https://bugzilla.suse.com/show_bug.cgi?id=1238946
* https://bugzilla.suse.com/show_bug.cgi?id=1238948
* https://bugzilla.suse.com/show_bug.cgi?id=1238949
* https://bugzilla.suse.com/show_bug.cgi?id=1238950
* https://bugzilla.suse.com/show_bug.cgi?id=1238951
* https://bugzilla.suse.com/show_bug.cgi?id=1238952
* https://bugzilla.suse.com/show_bug.cgi?id=1238953
* https://bugzilla.suse.com/show_bug.cgi?id=1238954
* https://bugzilla.suse.com/show_bug.cgi?id=1238956
* https://bugzilla.suse.com/show_bug.cgi?id=1238957
* https://bugzilla.suse.com/show_bug.cgi?id=1239001
* https://bugzilla.suse.com/show_bug.cgi?id=1239004
* https://bugzilla.suse.com/show_bug.cgi?id=1239016
* https://bugzilla.suse.com/show_bug.cgi?id=1239035
* https://bugzilla.suse.com/show_bug.cgi?id=1239040
* https://bugzilla.suse.com/show_bug.cgi?id=1239041
* https://bugzilla.suse.com/show_bug.cgi?id=1239051
* https://bugzilla.suse.com/show_bug.cgi?id=1239060
* https://bugzilla.suse.com/show_bug.cgi?id=1239070
* https://bugzilla.suse.com/show_bug.cgi?id=1239071
* https://bugzilla.suse.com/show_bug.cgi?id=1239073
* https://bugzilla.suse.com/show_bug.cgi?id=1239076
* https://bugzilla.suse.com/show_bug.cgi?id=1239095
* https://bugzilla.suse.com/show_bug.cgi?id=1239109
* https://bugzilla.suse.com/show_bug.cgi?id=1239115
* https://bugzilla.suse.com/show_bug.cgi?id=1239126
* https://bugzilla.suse.com/show_bug.cgi?id=1239452
* https://bugzilla.suse.com/show_bug.cgi?id=1239454
* https://bugzilla.suse.com/show_bug.cgi?id=1239968
* https://bugzilla.suse.com/show_bug.cgi?id=1239969
* https://bugzilla.suse.com/show_bug.cgi?id=1240133
* https://bugzilla.suse.com/show_bug.cgi?id=1240205
* https://bugzilla.suse.com/show_bug.cgi?id=1240207
* https://bugzilla.suse.com/show_bug.cgi?id=1240208
* https://bugzilla.suse.com/show_bug.cgi?id=1240210
* https://bugzilla.suse.com/show_bug.cgi?id=1240212
* https://bugzilla.suse.com/show_bug.cgi?id=1240213
* https://bugzilla.suse.com/show_bug.cgi?id=1240218
* https://bugzilla.suse.com/show_bug.cgi?id=1240220
* https://bugzilla.suse.com/show_bug.cgi?id=1240227
* https://bugzilla.suse.com/show_bug.cgi?id=1240229
* https://bugzilla.suse.com/show_bug.cgi?id=1240231
* https://bugzilla.suse.com/show_bug.cgi?id=1240242
* https://bugzilla.suse.com/show_bug.cgi?id=1240245
* https://bugzilla.suse.com/show_bug.cgi?id=1240247
* https://bugzilla.suse.com/show_bug.cgi?id=1240250
* https://bugzilla.suse.com/show_bug.cgi?id=1240254
* https://bugzilla.suse.com/show_bug.cgi?id=1240256
* https://bugzilla.suse.com/show_bug.cgi?id=1240264
* https://bugzilla.suse.com/show_bug.cgi?id=1240266
* https://bugzilla.suse.com/show_bug.cgi?id=1240272
* https://bugzilla.suse.com/show_bug.cgi?id=1240275
* https://bugzilla.suse.com/show_bug.cgi?id=1240276
* https://bugzilla.suse.com/show_bug.cgi?id=1240278
* https://bugzilla.suse.com/show_bug.cgi?id=1240279
* https://bugzilla.suse.com/show_bug.cgi?id=1240280
* https://bugzilla.suse.com/show_bug.cgi?id=1240281
* https://bugzilla.suse.com/show_bug.cgi?id=1240282
* https://bugzilla.suse.com/show_bug.cgi?id=1240283
* https://bugzilla.suse.com/show_bug.cgi?id=1240284
* https://bugzilla.suse.com/show_bug.cgi?id=1240286
* https://bugzilla.suse.com/show_bug.cgi?id=1240288
* https://bugzilla.suse.com/show_bug.cgi?id=1240290
* https://bugzilla.suse.com/show_bug.cgi?id=1240292
* https://bugzilla.suse.com/show_bug.cgi?id=1240293
* https://bugzilla.suse.com/show_bug.cgi?id=1240297
* https://bugzilla.suse.com/show_bug.cgi?id=1240304
* https://bugzilla.suse.com/show_bug.cgi?id=1240308
* https://bugzilla.suse.com/show_bug.cgi?id=1240309
* https://bugzilla.suse.com/show_bug.cgi?id=1240317
* https://bugzilla.suse.com/show_bug.cgi?id=1240318
* https://bugzilla.suse.com/show_bug.cgi?id=1240322
SUSE-SU-2025:1178-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:1178-1
Release Date: 2025-04-08T16:32:09Z
Rating: important
References:
* bsc#1207948
* bsc#1215199
* bsc#1215211
* bsc#1218470
* bsc#1221651
* bsc#1222649
* bsc#1223047
* bsc#1224489
* bsc#1224610
* bsc#1225533
* bsc#1225742
* bsc#1225770
* bsc#1226871
* bsc#1227858
* bsc#1228653
* bsc#1229311
* bsc#1229361
* bsc#1230497
* bsc#1230728
* bsc#1230769
* bsc#1230832
* bsc#1231293
* bsc#1231432
* bsc#1232364
* bsc#1232389
* bsc#1232421
* bsc#1232743
* bsc#1232812
* bsc#1232848
* bsc#1232895
* bsc#1233033
* bsc#1233060
* bsc#1233259
* bsc#1233260
* bsc#1233479
* bsc#1233551
* bsc#1233557
* bsc#1233749
* bsc#1234222
* bsc#1234480
* bsc#1234828
* bsc#1234936
* bsc#1235436
* bsc#1235455
* bsc#1235501
* bsc#1235524
* bsc#1235589
* bsc#1235591
* bsc#1235621
* bsc#1235637
* bsc#1235698
* bsc#1235711
* bsc#1235712
* bsc#1235715
* bsc#1235729
* bsc#1235733
* bsc#1235761
* bsc#1235870
* bsc#1235973
* bsc#1236099
* bsc#1236111
* bsc#1236206
* bsc#1236333
* bsc#1236692
* bsc#1237029
* bsc#1237164
* bsc#1237313
* bsc#1237530
* bsc#1237558
* bsc#1237562
* bsc#1237565
* bsc#1237571
* bsc#1237853
* bsc#1237856
* bsc#1237873
* bsc#1237875
* bsc#1237876
* bsc#1237877
* bsc#1237881
* bsc#1237885
* bsc#1237890
* bsc#1237894
* bsc#1237897
* bsc#1237900
* bsc#1237906
* bsc#1237907
* bsc#1237911
* bsc#1237912
* bsc#1237950
* bsc#1238212
* bsc#1238474
* bsc#1238475
* bsc#1238479
* bsc#1238494
* bsc#1238496
* bsc#1238497
* bsc#1238500
* bsc#1238501
* bsc#1238502
* bsc#1238503
* bsc#1238506
* bsc#1238507
* bsc#1238510
* bsc#1238511
* bsc#1238512
* bsc#1238521
* bsc#1238523
* bsc#1238526
* bsc#1238528
* bsc#1238529
* bsc#1238531
* bsc#1238532
* bsc#1238715
* bsc#1238716
* bsc#1238734
* bsc#1238735
* bsc#1238736
* bsc#1238738
* bsc#1238747
* bsc#1238754
* bsc#1238757
* bsc#1238760
* bsc#1238762
* bsc#1238763
* bsc#1238767
* bsc#1238768
* bsc#1238771
* bsc#1238772
* bsc#1238773
* bsc#1238775
* bsc#1238780
* bsc#1238781
* bsc#1238785
* bsc#1238864
* bsc#1238865
* bsc#1238876
* bsc#1238903
* bsc#1238904
* bsc#1238905
* bsc#1238909
* bsc#1238911
* bsc#1238917
* bsc#1238958
* bsc#1238959
* bsc#1238963
* bsc#1238964
* bsc#1238969
* bsc#1238971
* bsc#1238973
* bsc#1238975
* bsc#1238978
* bsc#1238979
* bsc#1238981
* bsc#1238984
* bsc#1238986
* bsc#1238993
* bsc#1238994
* bsc#1238997
* bsc#1239015
* bsc#1239016
* bsc#1239027
* bsc#1239029
* bsc#1239030
* bsc#1239033
* bsc#1239034
* bsc#1239036
* bsc#1239037
* bsc#1239038
* bsc#1239039
* bsc#1239045
* bsc#1239065
* bsc#1239068
* bsc#1239073
* bsc#1239076
* bsc#1239080
* bsc#1239085
* bsc#1239087
* bsc#1239095
* bsc#1239104
* bsc#1239105
* bsc#1239109
* bsc#1239112
* bsc#1239114
* bsc#1239115
* bsc#1239117
* bsc#1239167
* bsc#1239174
* bsc#1239346
* bsc#1239349
* bsc#1239435
* bsc#1239467
* bsc#1239468
* bsc#1239471
* bsc#1239473
* bsc#1239474
* bsc#1239477
* bsc#1239478
* bsc#1239479
* bsc#1239481
* bsc#1239482
* bsc#1239483
* bsc#1239484
* bsc#1239486
* bsc#1239508
* bsc#1239512
* bsc#1239518
* bsc#1239573
* bsc#1239594
* bsc#1239595
* bsc#1239600
* bsc#1239605
* bsc#1239615
* bsc#1239644
* bsc#1239707
* bsc#1239986
* bsc#1239994
* bsc#1240169
* bsc#1240172
* bsc#1240173
* bsc#1240175
* bsc#1240177
* bsc#1240179
* bsc#1240182
* bsc#1240183
* bsc#1240186
* bsc#1240188
* bsc#1240189
* bsc#1240191
* bsc#1240192
* bsc#1240333
* bsc#1240334
* jsc#PED-10701
* jsc#PED-12251
* jsc#PED-12416
Cross-References:
* CVE-2023-52831
* CVE-2023-52926
* CVE-2023-52927
* CVE-2024-26634
* CVE-2024-26873
* CVE-2024-35826
* CVE-2024-35910
* CVE-2024-38606
* CVE-2024-41005
* CVE-2024-41077
* CVE-2024-41149
* CVE-2024-42307
* CVE-2024-43820
* CVE-2024-46736
* CVE-2024-46782
* CVE-2024-46796
* CVE-2024-47408
* CVE-2024-47794
* CVE-2024-49571
* CVE-2024-49924
* CVE-2024-49940
* CVE-2024-49994
* CVE-2024-50056
* CVE-2024-50126
* CVE-2024-50140
* CVE-2024-50152
* CVE-2024-50290
* CVE-2024-52559
* CVE-2024-53057
* CVE-2024-53063
* CVE-2024-53140
* CVE-2024-53163
* CVE-2024-53680
* CVE-2024-54683
* CVE-2024-56638
* CVE-2024-56640
* CVE-2024-56702
* CVE-2024-56703
* CVE-2024-56718
* CVE-2024-56719
* CVE-2024-56751
* CVE-2024-56758
* CVE-2024-56770
* CVE-2024-57807
* CVE-2024-57834
* CVE-2024-57900
* CVE-2024-57947
* CVE-2024-57973
* CVE-2024-57974
* CVE-2024-57978
* CVE-2024-57979
* CVE-2024-57980
* CVE-2024-57981
* CVE-2024-57986
* CVE-2024-57990
* CVE-2024-57993
* CVE-2024-57996
* CVE-2024-57997
* CVE-2024-57999
* CVE-2024-58002
* CVE-2024-58005
* CVE-2024-58006
* CVE-2024-58007
* CVE-2024-58009
* CVE-2024-58011
* CVE-2024-58012
* CVE-2024-58013
* CVE-2024-58014
* CVE-2024-58017
* CVE-2024-58019
* CVE-2024-58020
* CVE-2024-58034
* CVE-2024-58051
* CVE-2024-58052
* CVE-2024-58054
* CVE-2024-58055
* CVE-2024-58056
* CVE-2024-58057
* CVE-2024-58058
* CVE-2024-58061
* CVE-2024-58063
* CVE-2024-58069
* CVE-2024-58072
* CVE-2024-58076
* CVE-2024-58078
* CVE-2024-58079
* CVE-2024-58080
* CVE-2024-58083
* CVE-2024-58085
* CVE-2024-58086
* CVE-2025-21631
* CVE-2025-21635
* CVE-2025-21659
* CVE-2025-21671
* CVE-2025-21693
* CVE-2025-21701
* CVE-2025-21703
* CVE-2025-21704
* CVE-2025-21706
* CVE-2025-21708
* CVE-2025-21711
* CVE-2025-21714
* CVE-2025-21718
* CVE-2025-21723
* CVE-2025-21726
* CVE-2025-21727
* CVE-2025-21731
* CVE-2025-21732
* CVE-2025-21733
* CVE-2025-21734
* CVE-2025-21735
* CVE-2025-21736
* CVE-2025-21738
* CVE-2025-21739
* CVE-2025-21741
* CVE-2025-21742
* CVE-2025-21743
* CVE-2025-21744
* CVE-2025-21745
* CVE-2025-21749
* CVE-2025-21750
* CVE-2025-21753
* CVE-2025-21754
* CVE-2025-21756
* CVE-2025-21759
* CVE-2025-21760
* CVE-2025-21761
* CVE-2025-21762
* CVE-2025-21763
* CVE-2025-21764
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-21772
* CVE-2025-21773
* CVE-2025-21775
* CVE-2025-21776
* CVE-2025-21779
* CVE-2025-21780
* CVE-2025-21781
* CVE-2025-21782
* CVE-2025-21784
* CVE-2025-21785
* CVE-2025-21791
* CVE-2025-21793
* CVE-2025-21794
* CVE-2025-21796
* CVE-2025-21804
* CVE-2025-21810
* CVE-2025-21815
* CVE-2025-21819
* CVE-2025-21820
* CVE-2025-21821
* CVE-2025-21823
* CVE-2025-21825
* CVE-2025-21828
* CVE-2025-21829
* CVE-2025-21830
* CVE-2025-21831
* CVE-2025-21832
* CVE-2025-21835
* CVE-2025-21838
* CVE-2025-21844
* CVE-2025-21846
* CVE-2025-21847
* CVE-2025-21848
* CVE-2025-21850
* CVE-2025-21855
* CVE-2025-21856
* CVE-2025-21857
* CVE-2025-21858
* CVE-2025-21859
* CVE-2025-21861
* CVE-2025-21862
* CVE-2025-21864
* CVE-2025-21865
* CVE-2025-21866
* CVE-2025-21869
* CVE-2025-21870
* CVE-2025-21871
* CVE-2025-21876
* CVE-2025-21877
* CVE-2025-21878
* CVE-2025-21883
* CVE-2025-21885
* CVE-2025-21886
* CVE-2025-21888
* CVE-2025-21890
* CVE-2025-21891
* CVE-2025-21892
CVSS scores:
* CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52926 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52927 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41149 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46736 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46796 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47408 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47794 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49571 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-49924 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49940 ( SUSE ): 6.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50140 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53163 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53680 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-54683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56638 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56702 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56703 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56718 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56719 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56758 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56770 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57807 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57947 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57996 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58012 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58013 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58014 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58017 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58085 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21631 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21635 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21659 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-21671 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21704 ( SUSE ): 4.1
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21708 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21711 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21726 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21738 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21750 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21780 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21782 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21785 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21832 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21844 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21855 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Real Time Module 15-SP6
An update that solves 189 vulnerabilities, contains three features and has 42
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various
security bugfixes.
The following security bugs were fixed:
* CVE-2023-52927: netfilter: allow exp not to be removed in
nf_ct_find_expectation (bsc#1239644).
* CVE-2024-35910: tcp: properly terminate timers for kernel sockets
(bsc#1224489).
* CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active
(bsc#1227858).
* CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769).
* CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal
msg (bsc#1235711).
* CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace
kABI workaround (bsc#1235712).
* CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when
receiving proposal msg (bsc#1235733).
* CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount
underflow (bsc#1232812).
* CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c
(bsc#1232389).
* CVE-2024-50140: net: sched: use RCU read-side critical section in
taprio_dump() (bsc#1233060).
* CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
(bsc#1233551).
* CVE-2024-53140: netlink: terminate outstanding dump on socket close
(bsc#1234222).
* CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in
ip_vs_protocol_init() (bsc#1235715).
* CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).
* CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area
handling under softirq" (bsc#1235524).
* CVE-2024-56640: net/smc: fix LGR and link use-after-free issue
(bsc#1235436).
* CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501).
* CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next
hop churn (bsc#1235455).
* CVE-2024-56718: net/smc: protect link down work from execute after lgr freed
(bsc#1235589).
* CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops
(bsc#1235591).
* CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936).
* CVE-2024-56758: btrfs: check folio mapping after unlock in
relocate_one_folio() (bsc#1235621).
* CVE-2024-56770: net/sched: netem: account for backlog updates from child
qdisc (bsc#1235637).
* CVE-2024-57900: ila: serialize calls to nf_register_net_hooks()
(bsc#1235973).
* CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill
(bsc#1236333).
* CVE-2024-57974: udp: Deal with race between UDP socket address change and
rehash (bsc#1238532).
* CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
* CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
(bsc#1239076).
* CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during
params (bsc#1239104).
* CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message
queue (bsc#1238997).
* CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).
* CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current->nsproxy (bsc#1236111).
* CVE-2025-21659: netdev: prevent accessing NAPI instances from another
namespace (bsc#1236206).
* CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU
hotunplug (bsc#1237029).
* CVE-2025-21701: net: avoid race between device unregistration and ethnl ops
(bsc#1237164).
* CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
(bsc#1237313).
* CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528).
* CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494).
* CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506).
* CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted
transaction (bsc#1237875).
* CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent
after transaction abort (bsc#1238496).
* CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send()
(bsc#1238738).
* CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb()
(bsc#1238763).
* CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info()
(bsc#1238775).
* CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
* CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
(bsc#1237897).
* CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss()
(bsc#1237906).
* CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu()
(bsc#1238754).
* CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
* CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer
(bsc#1238971).
* CVE-2025-21844: smb: client: Add check for next_buffer in
receive_encrypted_standard() (bsc#1239512).
* CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
(bsc#1239479).
* CVE-2025-21856: s390/ism: add release function for struct device
(bsc#1239486).
* CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL
dereference (bsc#1239478).
* CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in
migrate_device_finalize() (bsc#1239483).
* CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).
* CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we
currently drop (bsc#1239482).
* CVE-2025-21865: gtp: Suppress list corruption splat in
gtp_net_exit_batch_rtnl() (bsc#1239481).
* CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH
copiers (bsc#1240191).
* CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
* CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189).
* CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173).
* CVE-2025-21891: ipvlan: ensure network headers are in skb linear part
(bsc#1240186).
The following non-security bugs were fixed:
* accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes).
* accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes).
* acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are
invalid (bsc#1237530).
* acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes).
* af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb()
(bsc#1239435).
* af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash
(bsc#1239435).
* af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334).
* alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes).
* alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes).
* alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes).
* alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable-
fixes).
* alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx
(stable-fixes).
* alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41
HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41
HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using
CS35L41 HDA (stable-fixes).
* alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA
(stable-fixes).
* alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA
(stable-fixes).
* alsa: hda/realtek: Always honor no_shutup_pins (git-fixes).
* alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes).
* alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git-
fixes).
* alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes).
* alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes).
* alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes).
* alsa: hda/realtek: update ALC222 depop optimize (stable-fixes).
* alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git-
fixes).
* alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes).
* alsa: usb-audio: Add quirk for Plantronics headsets to fix control names
(stable-fixes).
* alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes).
* alsa: usx2y: validate nrpacks module parameter on probe (git-fixes).
* arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes)
* arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git-
fixes)
* arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes)
* arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git-
fixes)
* arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git-
fixes)
* arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes)
* arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git-
fixes)
* arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git-
fixes)
* arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes)
* arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes)
* arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes)
* arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git-
fixes)
* arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git-
fixes)
* arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git-
fixes)
* arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git-
fixes)
* arm64: mm: Populate vmemmap at the page level if not section aligned (git-
fixes)
* arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes)
* asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model
(stable-fixes).
* asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable-
fixes).
* asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git-
fixes).
* asoc: cs35l41: check the return value from spi_setup() (git-fixes).
* asoc: ops: Consistently treat platform_max as control value (git-fixes).
* asoc: rt722-sdca: add missing readable registers (git-fixes).
* asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes).
* asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable-
fixes).
* asoc: tas2764: Fix power control mask (stable-fixes).
* asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes).
* asoc: tas2770: Fix volume scale (stable-fixes).
* asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio
compatible (git-fixes).
* ata: ahci: Add mask_port_map module parameter (git-fixes).
* ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git-
fixes).
* ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes).
* ata: libata: Fix NCQ Non-Data log not supported print (git-fixes).
* ata: pata_parport: add custom version of wait_after_reset (git-fixes).
* ata: pata_parport: fit3: implement IDE command set registers (git-fixes).
* ata: pata_serverworks: Do not use the term blacklist (git-fixes).
* ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys()
(git-fixes).
* ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes).
* auxdisplay: panel: Fix an API misuse in panel.c (git-fixes).
* backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()
(git-fixes).
* batman-adv: Ignore own maximum aggregation size during RX (git-fixes).
* bitmap: introduce generic optimized bitmap_size() (git-fixes).
* block: cleanup and fix batch completion adding conditions (git-fixes).
* block: do not revert iter for -EIOCBQUEUED (git-fixes).
* bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes).
* bluetooth: hci_event: Fix connection regression between LE and non-LE
adapters (git-fixes).
* bluetooth: hci_event: Fix enabling passive scanning (git-fixes).
* bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes).
* bluetooth: Improve setsockopt() handling of malformed user input (git-
fixes).
* bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes).
* bpf: Fix a verifier verbose message (git-fixes).
* bpf: prevent r10 register from being marked as precise (git-fixes).
* bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git-
fixes).
* bpf: Use -Wno-error in certain tests when building with GCC (git-fixes).
* broadcom: fix supported flag check in periodic output function (git-fixes).
* btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605).
* btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045).
* btrfs: drop the backref cache during relocation if we commit (bsc#1239605).
* btrfs: remove the mirror_num argument to btrfs_submit_compressed_read
(bsc#1239045).
* btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage
(bsc#1239045).
* btrfs: use a separate end_io handler for extent_buffer writing
(bsc#1239045).
* bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes).
* bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock
(git-fixes).
* bus: qcom-ssc-block-bus: Fix the error handling path of
qcom_ssc_block_bus_probe() (git-fixes).
* bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes).
* bus: simple-pm-bus: fix forced runtime PM use (git-fixes).
* can: flexcan: disable transceiver during system PM (git-fixes).
* can: flexcan: only change CAN state when link up in system PM (git-fixes).
* can: rcar_canfd: Fix page entries in the AFL list (git-fixes).
* can: ucan: fix out of bound read in strscpy() source (git-fixes).
* cdx: Fix possible UAF error in driver_override_show() (git-fixes).
* char: misc: deallocate static minor in error path (git-fixes).
* clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes).
* coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes).
* cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged
(bsc#1237856)
* cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error
(bsc#1237856)
* cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create
(bsc#1237856)
* cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707).
* cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856)
* cpufreq/cppc: Move and rename (bsc#1237856)
* cpumask: add cpumask_weight_andnot() (bsc#1239015).
* cpumask: define cleanup function for cpumasks (bsc#1239015).
* crypto: ccp - Fix check for the primary ASP device (git-fixes).
* crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes).
* crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes).
* crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes).
* crypto: hisilicon/sec2 - fix for sec spec check (git-fixes).
* crypto: iaa - Add global_stats file and remove individual stat files
(jsc#PED-12416).
* crypto: iaa - Change desc->priv to 0 (jsc#PED-12416).
* crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416).
* crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416).
* crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416).
* crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416).
* crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416).
* crypto: iaa - Remove header table code (jsc#PED-12416).
* crypto: iaa - Remove potential infinite loop in check_completion()
(jsc#PED-12416).
* crypto: iaa - Remove unnecessary debugfs_create_dir() error check in
iaa_crypto_debugfs_init() (jsc#PED-12416).
* crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns()
(jsc#PED-12416).
* crypto: iaa - remove unneeded semicolon (jsc#PED-12416).
* crypto: iaa - Test the correct request flag (git-fixes).
* crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416).
* crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy()
(jsc#PED-12416).
* crypto: nx - Fix uninitialised hv_nxc on error (git-fixes).
* crypto: qat - add admin msgs for telemetry (jsc#PED-12416).
* crypto: qat - add auto reset on error (jsc#PED-12416).
* crypto: qat - add bank save and restore flows (jsc#PED-12416).
* crypto: qat - add fatal error notification (jsc#PED-12416).
* crypto: qat - add fatal error notify method (jsc#PED-12416).
* crypto: qat - add heartbeat error simulator (jsc#PED-12416).
* crypto: qat - add interface for live migration (jsc#PED-12416).
* crypto: qat - add support for 420xx devices (jsc#PED-12416).
* crypto: qat - add support for device telemetry (jsc#PED-12416).
* crypto: qat - add support for ring pair level telemetry (jsc#PED-12416).
* crypto: qat - adf_get_etr_base() helper (jsc#PED-12416).
* crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416).
* crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416).
* crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416).
* crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416).
* crypto: qat - Constify struct pm_status_row (jsc#PED-12416).
* crypto: qat - disable arbitration before reset (jsc#PED-12416).
* crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416).
* crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416).
* crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416).
* crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx
(jsc#PED-12416).
* crypto: qat - fix comment structure (jsc#PED-12416).
* crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416).
* crypto: qat - Fix missing destroy_workqueue in adf_init_aer()
(jsc#PED-12416).
* crypto: qat - fix recovery flow for VFs (jsc#PED-12416).
* crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416).
* crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416).
* crypto: qat - Fix typo "accelaration" (jsc#PED-12416).
* crypto: qat - Fix typo (jsc#PED-12416).
* crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416).
* crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416).
* crypto: qat - implement interface for live migration (jsc#PED-12416).
* crypto: qat - improve aer error reset handling (jsc#PED-12416).
* crypto: qat - improve error message in adf_get_arbiter_mapping()
(jsc#PED-12416).
* crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416).
* crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416).
* crypto: qat - limit heartbeat notifications (jsc#PED-12416).
* crypto: qat - make adf_ctl_class constant (jsc#PED-12416).
* crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416).
* crypto: qat - move fw config related structures (jsc#PED-12416).
* crypto: qat - move PFVF compat checker to a function (jsc#PED-12416).
* crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416).
* crypto: qat - re-enable sriov after pf reset (jsc#PED-12416).
* crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416).
* crypto: qat - relocate CSR access code (jsc#PED-12416).
* crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416).
* crypto: qat - remove access to parity register for QAT GEN4 (git-fixes).
* crypto: qat - Remove trailing space after \n newline (jsc#PED-12416).
* crypto: qat - remove unnecessary description from comment (jsc#PED-12416).
* crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416).
* crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416).
* crypto: qat - set parity error mask for qat_420xx (git-fixes).
* crypto: qat - uninitialized variable in adf_hb_error_inject_write()
(jsc#PED-12416).
* crypto: qat - update PFVF protocol for recovery (jsc#PED-12416).
* crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416).
* crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416).
* crypto: qat - validate slices count returned by FW (jsc#PED-12416).
* crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416).
* dlm: prevent NPD when writing a positive value to event_done (git-fixes).
* dm array: fix cursor index when skipping across block boundaries (git-
fixes).
* dm array: fix unreleased btree blocks on closing a faulty array cursor (git-
fixes).
* dm init: Handle minors larger than 255 (git-fixes).
* dm integrity: fix out-of-range warning (git-fixes).
* dm persistent data: fix memory allocation failure (git-fixes).
* dm resume: do not return EINVAL when signalled (git-fixes).
* dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes).
* dm thin: Add missing destroy_work_on_stack() (git-fixes).
* dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit()
(git-fixes).
* dm-crypt: track tag_offset in convert_context (git-fixes).
* dm-delay: fix hung task introduced by kthread mode (git-fixes).
* dm-delay: fix max_delay calculations (git-fixes).
* dm-delay: fix workqueue delay_timer race (git-fixes).
* dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes).
* dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git-
fixes).
* dm-integrity: align the outgoing bio in integrity_recheck (git-fixes).
* dm-integrity: fix a race condition when accessing recalc_sector (git-fixes).
* dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes).
* dm-unstriped: cast an operand to sector_t to prevent potential uint32_t
overflow (git-fixes).
* dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2)
(git-fixes). mwilck: some hand editing because d95e2c34a3ca ("dm verity: Fix
IO priority lost when reading FEC and hash") is missing
* dm: Fix typo in error message (git-fixes).
* dma: kmsan: export kmsan_handle_dma() for modules (git-fixes).
* documentation: qat: fix auto_reset attribute details (git-fixes).
* documentation: qat: fix auto_reset section (git-fixes).
* driver core: Remove needless return in void API device_remove_group() (git-
fixes).
* drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes).
* drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio()
(git-fixes).
* drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl
(git-fixes).
* drm: xlnx: zynqmp: Fix max dma segment size (git-fixes).
* drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable-
fixes).
* drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes).
* drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes).
* drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable-
fixes).
* drm/amd/display: Fix HPD after gpu reset (stable-fixes).
* drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes).
* drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters()
(git-fixes).
* drm/amd/display: Restore correct backlight brightness after a GPU reset
(stable-fixes).
* drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes).
* drm/amdgpu: Check extended configuration space register when system uses
large bar (stable-fixes).
* drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable-
fixes).
* drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes).
* drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid
Priority Inversion in SRIOV (git-fixes).
* drm/amdgpu/umsch: declare umsch firmware (git-fixes).
* drm/amdkfd: Fix Circular Locking Dependency in
'svm_range_cpu_invalidate_pagetables' (git-fixes).
* drm/atomic: Filter out redundant DPMS calls (stable-fixes).
* drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes).
* drm/bridge: it6505: fix HDCP V match check is not performed correctly (git-
fixes).
* drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes).
* drm/dp_mst: Fix drm RAD print (git-fixes).
* drm/dp_mst: Fix locking when skipping CSN before topology probing (git-
fixes).
* drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git-
fixes).
* drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git-
fixes).
* drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes).
* drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes).
* drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes).
* drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes).
* drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git-
fixes).
* drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes).
* drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes).
* drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git-
fixes).
* drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes).
* drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes).
* drm/msm/dpu: do not use active in atomic_check() (git-fixes).
* drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git-
fixes).
* drm/msm/dsi: Use existing per-interface slice count in DSC timing (git-
fixes).
* drm/nouveau: Do not override forced connector status (stable-fixes).
* drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes).
* drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable-
fixes).
* drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git-
fixes).
* drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes).
* drm/repaper: fix integer overflows in repeat functions (git-fixes).
* drm/sched: Fix fence reference count leak (git-fixes).
* drm/ssd130x: ensure ssd132x pitch is correct (git-fixes).
* drm/ssd130x: fix ssd132x encoding (git-fixes).
* drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes).
* drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes).
* drm/vkms: Fix use after free and double free on init error (git-fixes).
* drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes).
* dummycon: fix default rows/cols (git-fixes).
* eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes).
* efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349).
* fbdev: au1100fb: Move a variable assignment behind a null pointer check
(git-fixes).
* fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes).
* fbdev: sm501fb: Add some geometry checks (git-fixes).
* firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before
comparison (git-fixes).
* firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes).
* firmware: cs_dsp: Remove async regmap writes (git-fixes).
* firmware: imx-scu: fix OF node leak in .probe() (git-fixes).
* flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994).
* gpio: aggregator: protect driver attr handlers against module unload (git-
fixes).
* gpio: rcar: Fix missing of_node_put() call (git-fixes).
* gpio: rcar: Use raw_spinlock to protect register access (stable-fixes).
* gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git-
fixes).
* hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes).
* hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes).
* hid: appleir: Fix potential NULL dereference at raw event handle (git-
fixes).
* hid: Enable playstation driver independently of sony driver (git-fixes).
* hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes).
* hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes).
* hid: hid-steam: Fix use-after-free when detaching device (git-fixes).
* hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend
(stable-fixes).
* hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes).
* hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable-
fixes).
* hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git-
fixes).
* hid: intel-ish-hid: Send clock sync message immediately after reset (stable-
fixes).
* hid: remove superfluous (and wrong) Makefile entry for
CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes).
* hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes).
* hwmon: (ad7314) Validate leading zero bits and return error (git-fixes).
* hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes).
* hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes).
* hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git-
fixes).
* i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes).
* i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes).
* i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git-
fixes).
* i2c: omap: fix IRQ storms (git-fixes).
* i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes).
* i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes).
* i3c: master: svc: Fix missing the IBI rules (git-fixes).
* i3c: master: svc: Use readsb helper for reading MDB (git-fixes).
* ib/mad: Check available slots before posting receive WRs (git-fixes)
* ice: Remove and readd netdev during devlink reload (bsc#1230497
bsc#1239518).
* iio: accel: mma8452: Ensure error return on failure to matching oversampling
ratio (git-fixes).
* iio: accel: msa311: Fix failure to release runtime pm if direct mode claim
fails (git-fixes).
* iio: adc: ad4130: Fix comparison of channel setups (git-fixes).
* iio: adc: ad7124: Fix comparison of channel configs (git-fixes).
* iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes).
* iio: dac: ad3552r: clear reset status flag (git-fixes).
* iio: filter: admv8818: Force initialization of SDO (git-fixes).
* include: net: add static inline dst_dev_overhead() to dst.h (git-fixes).
* include/linux/mmzone.h: clean up watermark accessors (bsc#1239600).
* init: add initramfs_internal.h (bsc#1232848).
* initramfs: allocate heap buffers together (bsc#1232848).
* initramfs: fix hardlink hash leak without TRAILER (bsc#1232848).
* input: ads7846 - fix gpiod allocation (git-fixes).
* input: i8042 - add required quirks for missing old boardnames (stable-
fixes).
* input: i8042 - swap old quirk combination with new quirk for more devices
(stable-fixes).
* input: i8042 - swap old quirk combination with new quirk for NHxxRZQ
(stable-fixes).
* input: i8042 - swap old quirk combination with new quirk for several devices
(stable-fixes).
* input: iqs7222 - add support for Azoteq IQS7222D (git-fixes).
* input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes).
* input: iqs7222 - preserve system status register (git-fixes).
* input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE
controllers (stable-fixes).
* input: xpad - add multiple supported devices (stable-fixes).
* input: xpad - add support for TECNO Pocket Go (stable-fixes).
* input: xpad - add support for ZOTAC Gaming Zone (stable-fixes).
* input: xpad - rename QH controller to Legion Go S (stable-fixes).
* intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes).
* intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes).
* intel_th: pci: Add Arrow Lake support (stable-fixes).
* intel_th: pci: Add Panther Lake-H support (stable-fixes).
* intel_th: pci: Add Panther Lake-P/U support (stable-fixes).
* ioam6: improve checks on user data (git-fixes).
* iommu/vt-d: Fix suspicious RCU usage (git-fixes).
* ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).
* ipv4: use RCU protection in inet_select_addr() (bsc#1239994).
* ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).
* ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994).
* ipv4: use RCU protection in rt_is_expired() (bsc#1239994).
* ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes).
* ipv6: avoid atomic fragment on GSO packets (git-fixes).
* ipv6: Ensure natural alignment of const ipv6 loopback and router addresses
(git-fixes).
* ipv6: fib: hide unused 'pn' variable (git-fixes).
* ipv6: fib6_rules: flush route cache when rule is changed (git-fixes).
* ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git-
fixes).
* ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes).
* ipv6: fix potential NULL deref in fib6_add() (git-fixes).
* ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).
* ipv6: introduce dst_rt6_info() helper (git-fixes).
* ipv6: ioam: block BH from ioam6_output() (git-fixes).
* ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes).
* ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
* ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git-
fixes).
* ipv6: sr: add missing seg6_local_exit (git-fixes).
* ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes).
* ipv6: take care of scope when choosing the src addr (git-fixes).
* ipv6: Use RCU in ip6_input() (bsc#1239994).
* jfs: add check read-only before truncation in jfs_truncate_nolock() (git-
fixes).
* jfs: add check read-only before txBeginAnon() call (git-fixes).
* jfs: add index corruption check to DT_GETPAGE() (git-fixes).
* jfs: fix slab-out-of-bounds read in ea_get() (git-fixes).
* jfs: reject on-disk inodes of an unsupported type (git-fixes).
* kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes).
* kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in
RTM_NEWPREFIX (git-fixes).
* kABI fix for netlink: terminate outstanding dump on socket close (git-
fixes).
* kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes)
* kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes).
* kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes).
* kABI workaround for intel-ish-hid (git-fixes).
* kABI workaround for soc_mixer_control changes (git-fixes).
* kbuild: hdrcheck: fix cross build with clang (git-fixes).
* kunit: qemu_configs: sparc: use Zilog console (git-fixes).
* l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes).
* l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt()
function (git-fixes).
* l2tp: fix lockdep splat (git-fixes).
* leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git-
fixes).
* leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git-
fixes).
* lib: 842: Improve error handling in sw842_compress() (git-fixes).
* lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*()
(git-fixes).
* mdacon: rework dependency list (git-fixes).
* media: i2c: adv748x: Fix test pattern selection mask (git-fixes).
* media: i2c: ccs: Set the device's runtime PM status correctly in remove
(git-fixes).
* media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO
(git-fixes).
* media: i2c: ov7251: Set enable GPIO low in probe (git-fixes).
* media: platform: allgro-dvt: unregister v4l2_device on the error path (git-
fixes).
* media: platform: stm32: Add check for clk_enable() (git-fixes).
* media: siano: Fix error handling in smsdvb_module_init() (git-fixes).
* media: streamzap: fix race between device disconnection and urb callback
(git-fixes).
* media: streamzap: prevent processing IR data on URB failure (git-fixes).
* media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git-
fixes).
* media: venus: hfi_parser: add check to avoid out of bound access (git-
fixes).
* media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes).
* media: venus: hfi: add a check to handle OOB in sfr region (git-fixes).
* media: venus: hfi: add check to handle incorrect queue size (git-fixes).
* media: verisilicon: HEVC: Initialize start_bit field (git-fixes).
* media: vim2m: print device name after registering device (git-fixes).
* media: visl: Fix ERANGE error when setting enum controls (git-fixes).
* mei: me: add panther lake P DID (stable-fixes).
* memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). Fix
tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap:
introduce generic optimized bitmap_size() (git-fixes)"
* memory: mtk-smi: Add ostd setting for mt8192 (git-fixes).
* memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove
(git-fixes).
* mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes).
* mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes).
* mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes).
* mfd: syscon: Fix race in device_node_get_regmap() (git-fixes).
* mfd: syscon: Remove extern from function prototypes (stable-fixes).
* mfd: syscon: Use scoped variables with memory allocators to simplify error
paths (stable-fixes).
* mm: accept to promo watermark (bsc#1239600).
* mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600).
* mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600).
* mm: zswap: move allocations during CPU init outside the lock (git-fixes).
* mm/page_alloc: fix memory accept before watermarks gets initialized
(bsc#1239600).
* mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes).
* mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes).
* mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes).
* mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes).
* Move upstreamed nfsd and sunrpc patches into sorted section
* Move upstreamed PCI and initramfs patches into sorted section
* Move upstreamed powerpc and SCSI patches into sorted section
* mtd: Add check for devm_kcalloc() (git-fixes).
* mtd: nand: Fix a kdoc comment (git-fixes).
* mtd: rawnand: brcmnand: fix PM resume warning (git-fixes).
* mtd: Replace kcalloc() with devm_kcalloc() (git-fixes).
* ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).
* ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).
* net l2tp: drop flow hash on forward (git-fixes).
* net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes).
* net_sched: sch_sfq: annotate data-races around q->perturb_period (git-
fixes).
* net_sched: sch_sfq: handle bigger packets (git-fixes).
* net: add dev_net_rcu() helper (bsc#1239994).
* net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes).
* net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes).
* net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes).
* net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes).
* net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes).
* net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes).
* net: ipv6: fix wrong start position when receive hop-by-hop fragment (git-
fixes).
* net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: ioam6: code alignment (git-fixes).
* net: ipv6: ioam6: new feature tunsrc (git-fixes).
* net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git-
fixes).
* net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes).
* net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes).
* net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes).
* net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX
(git-fixes).
* net: mana: add a function to spread IRQs per CPUs (bsc#1239015).
* net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
* net: mana: Allow variable size indirection table (bsc#1239016).
* net: mana: Assigning IRQ affinity on HT cores (bsc#1239015).
* net: mana: Avoid open coded arithmetic (bsc#1239016).
* net: mana: cleanup mana struct after debugfs_remove() (git-fixes).
* net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015).
* net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015).
* net: mana: Support holes in device list reply msg (git-fixes).
* net: usb: usbnet: restore usb%d name exception for local mac addresses
(bsc#1234480).
* net: use unrcu_pointer() helper (git-fixes).
* net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable-
fixes).
* net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions
created by classifiers (git-fixes).
* net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes).
* net/sched: adjust device watchdog timer to detect stopped queue at right
time (git-fixes).
* net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes).
* net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes).
* net/sched: flower: Add lock protection when remove filter handle (git-
fixes).
* net/sched: taprio: make q->picos_per_byte available to fill_sched_entry()
(git-fixes).
* net/sched: tbf: correct backlog statistic for GSO packets (git-fixes).
* nfsd: clear acl_access/acl_default after releasing them (git-fixes).
* nvme-fc: do not ignore connectivity loss during connecting (git-fixes
bsc#1222649).
* nvme-fc: go straight to connecting state when initializing (git-fixes
bsc#1222649).
* nvme-fc: rely on state transitions to handle connectivity loss (git-fixes
bsc#1222649).
* nvme-ioctl: fix leaked requests on mapping error (git-fixes).
* nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes).
* nvme-pci: remove stale comment (git-fixes).
* nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes).
* nvme-tcp: Fix a C2HTermReq error message (git-fixes).
* nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git-
fixes).
* nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes).
* nvme: introduce nvme_disk_is_ns_head helper (git-fixes).
* nvme: move error logging from nvme_end_req() to __nvme_end_req() (git-
fixes).
* nvme: move passthrough logging attribute to head (git-fixes).
* nvme: only allow entering LIVE from CONNECTING state (git-fixes
bsc#1222649).
* nvmet-fc: Remove unused functions (git-fixes).
* nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git-
fixes).
* nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch
(git-fixes).
* nvmet: remove old function prototype (git-fixes).
* ocfs2: check dir i_size in ocfs2_find_entry (git-fixes).
* ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes).
* ocfs2: handle a symlink read error correctly (git-fixes).
* ocfs2: mark dquot as inactive if failed to start trans while releasing dquot
(git-fixes).
* ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes).
* orangefs: fix a oob in orangefs_debug_write (git-fixes).
* packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
* packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251).
* padata: fix sysfs store callback check (git-fixes).
* partitions: mac: fix handling of bogus partition table (git-fixes).
* pci: Avoid reset when disabled via sysfs (git-fixes).
* pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git-
fixes).
* pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes).
* pci: brcmstb: Fix potential premature regulator disabling (git-fixes).
* pci: brcmstb: Set generation limit before PCIe link up (git-fixes).
* pci: brcmstb: Use internal register to change link capability (git-fixes).
* pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data
payload (git-fixes).
* pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes).
* pci: Fix reference leak in pci_alloc_child_bus() (git-fixes).
* pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes).
* pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes).
* pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes).
* pci/acs: Fix 'pci=config_acs=' parameter (git-fixes).
* pci/aspm: Fix link state exit during switch upstream function removal (git-
fixes).
* pci/doe: Poll DOE Busy bit for up to 1 second in pci_doe_send_req()
(bsc#1237853)
* pci/doe: Support discovery version 2 (bsc#1237853)
* pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes).
* pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes).
* pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm()
(git-fixes).
* pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git-
fixes).
* pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes).
* pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes).
* pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes).
* platform/x86: dell-ddv: Fix temperature calculation (git-fixes).
* platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable-
fixes).
* platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e
(stable-fixes).
* platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable-
fixes).
* platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable-
fixes).
* pm: sleep: Adjust check before setting power.must_resume (git-fixes).
* pm: sleep: Fix handling devices with direct_complete set on errors (git-
fixes).
* pnfs/flexfiles: retry getting layout segment for reads (git-fixes).
* power: supply: max77693: Fix wrong conversion of charge input threshold
value (git-fixes).
* powerpc: Stop using no_llseek (bsc#1239573).
* powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573).
* powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS
block (bsc#1239573).
* powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory
(bsc#1239167 ltc#211055).
* rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes).
* rapidio: fix an API misues when rio_add_net() fails (git-fixes).
* ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619).
* rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes)
* rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes)
* rdma/core: Do not expose hw_counters outside of init net namespace (git-
fixes)
* rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes)
* rdma/hns: Fix a missing rollback in error path of
hns_roce_create_qp_common() (git-fixes)
* rdma/hns: Fix missing xa_destroy() (git-fixes)
* rdma/hns: Fix soft lockup during bt pages loop (git-fixes)
* rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git-
fixes)
* rdma/hns: Fix wrong value of max_sge_rd (git-fixes)
* rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
* rdma/mlx5: Fix cache entry update on dereg error (git-fixes)
* rdma/mlx5: Fix calculation of total invalidated pages (git-fixes)
* rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes)
* rdma/mlx5: Fix MR cache initialization error flow (git-fixes)
* rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes)
* rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex()
tests (git-fixes)
* Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948).
* regulator: check that dummy regulator has been probed before using it
(stable-fixes).
* regulator: core: Fix deadlock in create_regulator() (git-fixes).
* regulator: dummy: force synchronous probing (git-fixes).
* Revert "dm: requeue IO if mapping table not yet available" (git-fixes).
* Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection"
(git-fixes).
* Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()"
(stable-fixes).
* Revert "wifi: ath11k: restore country code during resume" (bsc#1207948).
* Revert "wifi: ath11k: support hibernation" (bsc#1207948).
* rndis_host: Flag RNDIS modems as WWAN devices (git-fixes).
* rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf
(bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined
with suse_version check.
* rpm/release-projects: Update the ALP projects again (bsc#1231293).
* s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes
bsc#1239594).
* s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595).
* sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
* selftests: mptcp: close fd_in before returning in main_loop (git-fixes).
* selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes).
* selftests/bpf: add fp-leaking precise subprog result tests (git-fixes).
* selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes).
* selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes).
* selftests/bpf: Prevent client connect before server bind in
test_tc_tunnel.sh (git-fixes).
* selftests/mm/cow: fix the incorrect error handling (git-fixes).
* selftests/x86/syscall: Fix coccinelle WARNING recommending the use of
ARRAY_SIZE() (git-fixes).
* seq_file: add helper macro to define attribute for rw file (jsc#PED-12416).
* slimbus: messaging: Free transaction ID in delayed interrupt scenario (git-
fixes).
* smb: client: destroy cfid_put_wq on module exit (git-fixes).
* soc: imx8m: Remove global soc_uid (stable-fixes).
* soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes).
* soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes).
* soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes).
* soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes).
* soc: qcom: pdr: Fix the potential deadlock (git-fixes).
* soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()
(git-fixes).
* soundwire: slave: fix an OF node reference leak in soundwire slave device
(git-fixes).
* spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes).
* spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes).
* spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes).
* splice: do not checksum AF_UNIX sockets (bsc#1240333).
* sunrpc: convert RPC_TASK_* constants to enum (git-fixes).
* sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes).
* sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes).
* sunrpc: suppress warnings for unused procfs functions (git-fixes).
* supported.conf: add now-included qat_420xx (external, intel)
* tcp: Add memory barrier to tcp_push() (git-fixes).
* tcp: add tcp_done_with_error() helper (git-fixes).
* tcp: Adjust clamping window for applications specifying SO_RCVBUF (git-
fixes).
* tcp: adjust rcvq_space after updating scaling ratio (git-fixes).
* tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes).
* tcp: annotate data-races around tp->window_clamp (git-fixes).
* tcp: avoid premature drops in tcp_add_backlog() (git-fixes).
* tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process
(git-fixes).
* tcp: check mptcp-level constraints for backlog coalescing (git-fixes).
* tcp: check space before adding MPTCP SYN options (git-fixes).
* tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes).
* tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes).
* tcp: Defer ts_recent changes until req is owned (git-fixes).
* tcp: define initial scaling factor value as a macro (git-fixes).
* tcp: derive delack_max from rto_min (git-fixes).
* tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes).
* tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non-
wildcard addresses (git-fixes).
* tcp: fix cookie_init_timestamp() overflows (git-fixes).
* tcp: fix forever orphan socket caused by tcp_abort (git-fixes).
* tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function
(git-fixes).
* tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes).
* tcp: fix mid stream window clamp (git-fixes).
* tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes).
* tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes).
* tcp: fix race in tcp_write_err() (git-fixes).
* tcp: fix races in tcp_abort() (git-fixes).
* tcp: fix races in tcp_v_err() (git-fixes).
* tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git-
fixes).
* tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git-
fixes).
* tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git-
fixes).
* tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes).
* tcp: increase the default TCP scaling ratio (git-fixes).
* tcp: introduce tcp_clock_ms() (git-fixes).
* tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes).
* tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes).
* tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes).
* tcp: replace tcp_time_stamp_raw() (git-fixes).
* tcp: Update window clamping condition (git-fixes).
* thermal: int340x: Add NULL check for adev (git-fixes).
* thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes).
* tools: move alignment-related macros to new <linux/align.h> (git-fixes).
Fix tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap:
introduce generic optimized bitmap_size() (git-fixes)"
* tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind
(git-fixes).
* tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes).
* tpm: do not start chip while suspended (git-fixes).
* tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
* ubi: Add a check for ubi_num (git-fixes).
* ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes).
* ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes).
* ubi: correct the calculation of fastmap size (stable-fixes).
* ubi: eba: properly rollback inside self_check_eba (git-fixes).
* ubi: fastmap: Fix missed ec updating after erasing old fastmap data block
(git-fixes).
* ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists
(git-fixes).
* ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git-
fixes).
* ubi: wl: Put source PEB into correct list if trying locking LEB failed (git-
fixes).
* upstream: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open()
(git-fixes).
* usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes).
* usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes).
* usb: gadget: Check bmAttributes only if configuration is valid (git-fixes).
* usb: gadget: Fix setting self-powered state on suspend (git-fixes).
* usb: gadget: Set self-powered based on MaxPower and bmAttributes (git-
fixes).
* usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git-
fixes).
* usb: hub: lack of clearing xHC resources (git-fixes).
* usb: phy: generic: Use proper helper for property detection (stable-fixes).
* usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader
(stable-fixes).
* usb: renesas_usbhs: Call clk_put() (git-fixes).
* usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes).
* usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes).
* usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes).
* usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes).
* usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes).
* usb: serial: option: match on interface class for Telit FN990B (stable-
fixes).
* usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality
(git-fixes).
* usb: typec: ucsi: Fix NULL pointer access (git-fixes).
* usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes).
* usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes).
* usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes).
* usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes).
* vboxsf: fix building with GCC 15 (stable-fixes).
* wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git-
fixes).
* wifi: ath11k: choose default PM policy for hibernation (bsc#1207948).
* wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in
error path (git-fixes).
* wifi: ath11k: determine PM policy based on machine model (bsc#1207948).
* wifi: ath11k: fix RCU stall while reaping monitor destination ring (git-
fixes).
* wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git-
fixes).
* wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948).
* wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948).
* wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948).
* wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in
error path (git-fixes).
* wifi: ath12k: encode max Tx power in scan channel list command (git-fixes).
* wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes).
* wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes).
* wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes).
* wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes).
* wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes).
* wifi: mt76: Add check for devm_kstrdup() (git-fixes).
* wifi: mt76: mt7915: fix possible integer overflows in
mt7915_muru_stats_show() (git-fixes).
* wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes).
* wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes).
* wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes).
* wifi: mwifiex: Fix premature release of RF calibration data (git-fixes).
* wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git-
fixes).
* wifi: rtw89: fw: correct debug message format in
rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes).
* wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes).
* x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes).
* x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: De-uglify the 2/3 level paging difference in
mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32()
(git-fixes).
* x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes).
* x86/boot/32: Temporarily map initrd for microcode loading (git-fixes).
* x86/coco: Replace 'static const cc_mask' with the newly introduced
cc_get_mask() function (git-fixes).
* x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git-
fixes).
* x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers
(git-fixes).
* x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes).
* x86/fpu: Fix guest FPU state buffer allocation size (git-fixes).
* x86/hyperv: Fix output argument to hypercall that changes page visibility
(git-fixes).
* x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes).
* x86/idle: Disable IBRS when CPU is offline to improve single-threaded
performance (git-fixes).
* x86/microcode: Add per CPU control field (git-fixes).
* x86/microcode: Add per CPU result state (git-fixes).
* x86/microcode: Clarify the late load logic (git-fixes).
* x86/microcode: Clean up mc_cpu_down_prep() (git-fixes).
* x86/microcode: Get rid of the schedule work indirection (git-fixes).
* x86/microcode: Handle "nosmt" correctly (git-fixes).
* x86/microcode: Handle "offline" CPUs correctly (git-fixes).
* x86/microcode: Hide the config knob (git-fixes).
* x86/microcode: Include vendor headers into microcode.h (git-fixes).
* x86/microcode: Make reload_early_microcode() static (git-fixes).
* x86/microcode: Mop up early loading leftovers (git-fixes).
* x86/microcode: Move core specific defines to local header (git-fixes).
* x86/microcode: Prepare for minimal revision check (git-fixes).
* x86/microcode: Protect against instrumentation (git-fixes).
* x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes).
* x86/microcode: Provide new control functions (git-fixes).
* x86/microcode: Remove microcode_mutex (git-fixes).
* x86/microcode: Remove pointless apply() invocation (git-fixes).
* x86/microcode: Rendezvous and load in NMI (git-fixes).
* x86/microcode: Replace the all-in-one rendevous handler (git-fixes).
* x86/microcode: Sanitize __wait_for_cpus() (git-fixes).
* x86/microcode/32: Move early loading after paging enable (git-fixes).
* x86/microcode/amd: Cache builtin microcode too (git-fixes).
* x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes).
* x86/microcode/amd: Use cached microcode for AP load (git-fixes).
* x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes).
* x86/microcode/intel: Add a minimum required revision for late loading (git-
fixes).
* x86/microcode/intel: Cleanup code further (git-fixes).
* x86/microcode/intel: Move microcode functions out of cpu/intel.c (git-
fixes).
* x86/microcode/intel: Remove debug code (git-fixes).
* x86/microcode/intel: Remove pointless mutex (git-fixes).
* x86/microcode/intel: Rename get_datasize() since its used externally (git-
fixes).
* x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes).
* x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes).
* x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes).
* x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git-
fixes).
* x86/microcode/intel: Save the microcode only after a successful late-load
(git-fixes).
* x86/microcode/intel: Simplify and rename generic_load_microcode() (git-
fixes).
* x86/microcode/intel: Simplify early loading (git-fixes).
* x86/microcode/intel: Simplify scan_microcode() (git-fixes).
* x86/microcode/intel: Switch to kvmalloc() (git-fixes).
* x86/microcode/intel: Unify microcode apply() functions (git-fixes).
* x86/mm: Remove unused microcode.h include (git-fixes).
* x86/platform/olpc: Remove unused variable 'len' in
olpc_dt_compatible_match() (git-fixes).
* x86/speculation: Add __update_spec_ctrl() helper (git-fixes).
* x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s
description (git-fixes).
* xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes).
* xhci: Cleanup Candence controller PCI device and vendor ID usage (git-
fixes).
* xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
* xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701).
* xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes).
* xhci: dbc: Convert to use sysfs_streq() (git-fixes).
* xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes).
* xhci: dbc: Fix STALL transfer event handling (git-fixes).
* xhci: dbc: Replace custom return value with proper Linux error code (git-
fixes).
* xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes).
* xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes).
* xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
* xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701).
* xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes).
* xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes).
* xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes).
* xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes).
* xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes).
* xhci: pci: Use standard pattern for device IDs (git-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-1178=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1178=1
* SUSE Real Time Module 15-SP6
zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-1178=1
## Package List:
* openSUSE Leap 15.6 (x86_64)
* kernel-rt-devel-debuginfo-6.4.0-150600.10.34.1
* kernel-rt-vdso-6.4.0-150600.10.34.1
* kernel-rt-devel-6.4.0-150600.10.34.1
* kernel-rt-extra-6.4.0-150600.10.34.1
* kernel-rt_debug-vdso-6.4.0-150600.10.34.1
* kernel-rt-optional-6.4.0-150600.10.34.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.34.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt-extra-debuginfo-6.4.0-150600.10.34.1
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* cluster-md-kmp-rt-6.4.0-150600.10.34.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt-vdso-debuginfo-6.4.0-150600.10.34.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.34.1
* dlm-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt-optional-debuginfo-6.4.0-150600.10.34.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* kselftests-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.34.1
* kernel-rt-livepatch-devel-6.4.0-150600.10.34.1
* kernel-syms-rt-6.4.0-150600.10.34.1
* kselftests-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt-debugsource-6.4.0-150600.10.34.1
* gfs2-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.34.1
* reiserfs-kmp-rt-6.4.0-150600.10.34.1
* ocfs2-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt_debug-devel-6.4.0-150600.10.34.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.34.1
* kernel-source-rt-6.4.0-150600.10.34.1
* openSUSE Leap 15.6 (nosrc x86_64)
* kernel-rt_debug-6.4.0-150600.10.34.1
* kernel-rt-6.4.0-150600.10.34.1
* SUSE Linux Enterprise Live Patching 15-SP6 (x86_64)
* kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource-1-150600.1.5.1
* kernel-livepatch-6_4_0-150600_10_34-rt-1-150600.1.5.1
* kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo-1-150600.1.5.1
* SUSE Real Time Module 15-SP6 (x86_64)
* cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* cluster-md-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt-devel-debuginfo-6.4.0-150600.10.34.1
* gfs2-kmp-rt-6.4.0-150600.10.34.1
* gfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt_debug-devel-6.4.0-150600.10.34.1
* ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* kernel-rt_debug-debugsource-6.4.0-150600.10.34.1
* ocfs2-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt-devel-6.4.0-150600.10.34.1
* kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.34.1
* kernel-syms-rt-6.4.0-150600.10.34.1
* dlm-kmp-rt-6.4.0-150600.10.34.1
* kernel-rt-debugsource-6.4.0-150600.10.34.1
* kernel-rt_debug-debuginfo-6.4.0-150600.10.34.1
* dlm-kmp-rt-debuginfo-6.4.0-150600.10.34.1
* SUSE Real Time Module 15-SP6 (noarch)
* kernel-devel-rt-6.4.0-150600.10.34.1
* kernel-source-rt-6.4.0-150600.10.34.1
* SUSE Real Time Module 15-SP6 (nosrc x86_64)
* kernel-rt_debug-6.4.0-150600.10.34.1
* kernel-rt-6.4.0-150600.10.34.1
## References:
* https://www.suse.com/security/cve/CVE-2023-52831.html
* https://www.suse.com/security/cve/CVE-2023-52926.html
* https://www.suse.com/security/cve/CVE-2023-52927.html
* https://www.suse.com/security/cve/CVE-2024-26634.html
* https://www.suse.com/security/cve/CVE-2024-26873.html
* https://www.suse.com/security/cve/CVE-2024-35826.html
* https://www.suse.com/security/cve/CVE-2024-35910.html
* https://www.suse.com/security/cve/CVE-2024-38606.html
* https://www.suse.com/security/cve/CVE-2024-41005.html
* https://www.suse.com/security/cve/CVE-2024-41077.html
* https://www.suse.com/security/cve/CVE-2024-41149.html
* https://www.suse.com/security/cve/CVE-2024-42307.html
* https://www.suse.com/security/cve/CVE-2024-43820.html
* https://www.suse.com/security/cve/CVE-2024-46736.html
* https://www.suse.com/security/cve/CVE-2024-46782.html
* https://www.suse.com/security/cve/CVE-2024-46796.html
* https://www.suse.com/security/cve/CVE-2024-47408.html
* https://www.suse.com/security/cve/CVE-2024-47794.html
* https://www.suse.com/security/cve/CVE-2024-49571.html
* https://www.suse.com/security/cve/CVE-2024-49924.html
* https://www.suse.com/security/cve/CVE-2024-49940.html
* https://www.suse.com/security/cve/CVE-2024-49994.html
* https://www.suse.com/security/cve/CVE-2024-50056.html
* https://www.suse.com/security/cve/CVE-2024-50126.html
* https://www.suse.com/security/cve/CVE-2024-50140.html
* https://www.suse.com/security/cve/CVE-2024-50152.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-52559.html
* https://www.suse.com/security/cve/CVE-2024-53057.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53140.html
* https://www.suse.com/security/cve/CVE-2024-53163.html
* https://www.suse.com/security/cve/CVE-2024-53680.html
* https://www.suse.com/security/cve/CVE-2024-54683.html
* https://www.suse.com/security/cve/CVE-2024-56638.html
* https://www.suse.com/security/cve/CVE-2024-56640.html
* https://www.suse.com/security/cve/CVE-2024-56702.html
* https://www.suse.com/security/cve/CVE-2024-56703.html
* https://www.suse.com/security/cve/CVE-2024-56718.html
* https://www.suse.com/security/cve/CVE-2024-56719.html
* https://www.suse.com/security/cve/CVE-2024-56751.html
* https://www.suse.com/security/cve/CVE-2024-56758.html
* https://www.suse.com/security/cve/CVE-2024-56770.html
* https://www.suse.com/security/cve/CVE-2024-57807.html
* https://www.suse.com/security/cve/CVE-2024-57834.html
* https://www.suse.com/security/cve/CVE-2024-57900.html
* https://www.suse.com/security/cve/CVE-2024-57947.html
* https://www.suse.com/security/cve/CVE-2024-57973.html
* https://www.suse.com/security/cve/CVE-2024-57974.html
* https://www.suse.com/security/cve/CVE-2024-57978.html
* https://www.suse.com/security/cve/CVE-2024-57979.html
* https://www.suse.com/security/cve/CVE-2024-57980.html
* https://www.suse.com/security/cve/CVE-2024-57981.html
* https://www.suse.com/security/cve/CVE-2024-57986.html
* https://www.suse.com/security/cve/CVE-2024-57990.html
* https://www.suse.com/security/cve/CVE-2024-57993.html
* https://www.suse.com/security/cve/CVE-2024-57996.html
* https://www.suse.com/security/cve/CVE-2024-57997.html
* https://www.suse.com/security/cve/CVE-2024-57999.html
* https://www.suse.com/security/cve/CVE-2024-58002.html
* https://www.suse.com/security/cve/CVE-2024-58005.html
* https://www.suse.com/security/cve/CVE-2024-58006.html
* https://www.suse.com/security/cve/CVE-2024-58007.html
* https://www.suse.com/security/cve/CVE-2024-58009.html
* https://www.suse.com/security/cve/CVE-2024-58011.html
* https://www.suse.com/security/cve/CVE-2024-58012.html
* https://www.suse.com/security/cve/CVE-2024-58013.html
* https://www.suse.com/security/cve/CVE-2024-58014.html
* https://www.suse.com/security/cve/CVE-2024-58017.html
* https://www.suse.com/security/cve/CVE-2024-58019.html
* https://www.suse.com/security/cve/CVE-2024-58020.html
* https://www.suse.com/security/cve/CVE-2024-58034.html
* https://www.suse.com/security/cve/CVE-2024-58051.html
* https://www.suse.com/security/cve/CVE-2024-58052.html
* https://www.suse.com/security/cve/CVE-2024-58054.html
* https://www.suse.com/security/cve/CVE-2024-58055.html
* https://www.suse.com/security/cve/CVE-2024-58056.html
* https://www.suse.com/security/cve/CVE-2024-58057.html
* https://www.suse.com/security/cve/CVE-2024-58058.html
* https://www.suse.com/security/cve/CVE-2024-58061.html
* https://www.suse.com/security/cve/CVE-2024-58063.html
* https://www.suse.com/security/cve/CVE-2024-58069.html
* https://www.suse.com/security/cve/CVE-2024-58072.html
* https://www.suse.com/security/cve/CVE-2024-58076.html
* https://www.suse.com/security/cve/CVE-2024-58078.html
* https://www.suse.com/security/cve/CVE-2024-58079.html
* https://www.suse.com/security/cve/CVE-2024-58080.html
* https://www.suse.com/security/cve/CVE-2024-58083.html
* https://www.suse.com/security/cve/CVE-2024-58085.html
* https://www.suse.com/security/cve/CVE-2024-58086.html
* https://www.suse.com/security/cve/CVE-2025-21631.html
* https://www.suse.com/security/cve/CVE-2025-21635.html
* https://www.suse.com/security/cve/CVE-2025-21659.html
* https://www.suse.com/security/cve/CVE-2025-21671.html
* https://www.suse.com/security/cve/CVE-2025-21693.html
* https://www.suse.com/security/cve/CVE-2025-21701.html
* https://www.suse.com/security/cve/CVE-2025-21703.html
* https://www.suse.com/security/cve/CVE-2025-21704.html
* https://www.suse.com/security/cve/CVE-2025-21706.html
* https://www.suse.com/security/cve/CVE-2025-21708.html
* https://www.suse.com/security/cve/CVE-2025-21711.html
* https://www.suse.com/security/cve/CVE-2025-21714.html
* https://www.suse.com/security/cve/CVE-2025-21718.html
* https://www.suse.com/security/cve/CVE-2025-21723.html
* https://www.suse.com/security/cve/CVE-2025-21726.html
* https://www.suse.com/security/cve/CVE-2025-21727.html
* https://www.suse.com/security/cve/CVE-2025-21731.html
* https://www.suse.com/security/cve/CVE-2025-21732.html
* https://www.suse.com/security/cve/CVE-2025-21733.html
* https://www.suse.com/security/cve/CVE-2025-21734.html
* https://www.suse.com/security/cve/CVE-2025-21735.html
* https://www.suse.com/security/cve/CVE-2025-21736.html
* https://www.suse.com/security/cve/CVE-2025-21738.html
* https://www.suse.com/security/cve/CVE-2025-21739.html
* https://www.suse.com/security/cve/CVE-2025-21741.html
* https://www.suse.com/security/cve/CVE-2025-21742.html
* https://www.suse.com/security/cve/CVE-2025-21743.html
* https://www.suse.com/security/cve/CVE-2025-21744.html
* https://www.suse.com/security/cve/CVE-2025-21745.html
* https://www.suse.com/security/cve/CVE-2025-21749.html
* https://www.suse.com/security/cve/CVE-2025-21750.html
* https://www.suse.com/security/cve/CVE-2025-21753.html
* https://www.suse.com/security/cve/CVE-2025-21754.html
* https://www.suse.com/security/cve/CVE-2025-21756.html
* https://www.suse.com/security/cve/CVE-2025-21759.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21761.html
* https://www.suse.com/security/cve/CVE-2025-21762.html
* https://www.suse.com/security/cve/CVE-2025-21763.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21773.html
* https://www.suse.com/security/cve/CVE-2025-21775.html
* https://www.suse.com/security/cve/CVE-2025-21776.html
* https://www.suse.com/security/cve/CVE-2025-21779.html
* https://www.suse.com/security/cve/CVE-2025-21780.html
* https://www.suse.com/security/cve/CVE-2025-21781.html
* https://www.suse.com/security/cve/CVE-2025-21782.html
* https://www.suse.com/security/cve/CVE-2025-21784.html
* https://www.suse.com/security/cve/CVE-2025-21785.html
* https://www.suse.com/security/cve/CVE-2025-21791.html
* https://www.suse.com/security/cve/CVE-2025-21793.html
* https://www.suse.com/security/cve/CVE-2025-21794.html
* https://www.suse.com/security/cve/CVE-2025-21796.html
* https://www.suse.com/security/cve/CVE-2025-21804.html
* https://www.suse.com/security/cve/CVE-2025-21810.html
* https://www.suse.com/security/cve/CVE-2025-21815.html
* https://www.suse.com/security/cve/CVE-2025-21819.html
* https://www.suse.com/security/cve/CVE-2025-21820.html
* https://www.suse.com/security/cve/CVE-2025-21821.html
* https://www.suse.com/security/cve/CVE-2025-21823.html
* https://www.suse.com/security/cve/CVE-2025-21825.html
* https://www.suse.com/security/cve/CVE-2025-21828.html
* https://www.suse.com/security/cve/CVE-2025-21829.html
* https://www.suse.com/security/cve/CVE-2025-21830.html
* https://www.suse.com/security/cve/CVE-2025-21831.html
* https://www.suse.com/security/cve/CVE-2025-21832.html
* https://www.suse.com/security/cve/CVE-2025-21835.html
* https://www.suse.com/security/cve/CVE-2025-21838.html
* https://www.suse.com/security/cve/CVE-2025-21844.html
* https://www.suse.com/security/cve/CVE-2025-21846.html
* https://www.suse.com/security/cve/CVE-2025-21847.html
* https://www.suse.com/security/cve/CVE-2025-21848.html
* https://www.suse.com/security/cve/CVE-2025-21850.html
* https://www.suse.com/security/cve/CVE-2025-21855.html
* https://www.suse.com/security/cve/CVE-2025-21856.html
* https://www.suse.com/security/cve/CVE-2025-21857.html
* https://www.suse.com/security/cve/CVE-2025-21858.html
* https://www.suse.com/security/cve/CVE-2025-21859.html
* https://www.suse.com/security/cve/CVE-2025-21861.html
* https://www.suse.com/security/cve/CVE-2025-21862.html
* https://www.suse.com/security/cve/CVE-2025-21864.html
* https://www.suse.com/security/cve/CVE-2025-21865.html
* https://www.suse.com/security/cve/CVE-2025-21866.html
* https://www.suse.com/security/cve/CVE-2025-21869.html
* https://www.suse.com/security/cve/CVE-2025-21870.html
* https://www.suse.com/security/cve/CVE-2025-21871.html
* https://www.suse.com/security/cve/CVE-2025-21876.html
* https://www.suse.com/security/cve/CVE-2025-21877.html
* https://www.suse.com/security/cve/CVE-2025-21878.html
* https://www.suse.com/security/cve/CVE-2025-21883.html
* https://www.suse.com/security/cve/CVE-2025-21885.html
* https://www.suse.com/security/cve/CVE-2025-21886.html
* https://www.suse.com/security/cve/CVE-2025-21888.html
* https://www.suse.com/security/cve/CVE-2025-21890.html
* https://www.suse.com/security/cve/CVE-2025-21891.html
* https://www.suse.com/security/cve/CVE-2025-21892.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207948
* https://bugzilla.suse.com/show_bug.cgi?id=1215199
* https://bugzilla.suse.com/show_bug.cgi?id=1215211
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1221651
* https://bugzilla.suse.com/show_bug.cgi?id=1222649
* https://bugzilla.suse.com/show_bug.cgi?id=1223047
* https://bugzilla.suse.com/show_bug.cgi?id=1224489
* https://bugzilla.suse.com/show_bug.cgi?id=1224610
* https://bugzilla.suse.com/show_bug.cgi?id=1225533
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1225770
* https://bugzilla.suse.com/show_bug.cgi?id=1226871
* https://bugzilla.suse.com/show_bug.cgi?id=1227858
* https://bugzilla.suse.com/show_bug.cgi?id=1228653
* https://bugzilla.suse.com/show_bug.cgi?id=1229311
* https://bugzilla.suse.com/show_bug.cgi?id=1229361
* https://bugzilla.suse.com/show_bug.cgi?id=1230497
* https://bugzilla.suse.com/show_bug.cgi?id=1230728
* https://bugzilla.suse.com/show_bug.cgi?id=1230769
* https://bugzilla.suse.com/show_bug.cgi?id=1230832
* https://bugzilla.suse.com/show_bug.cgi?id=1231293
* https://bugzilla.suse.com/show_bug.cgi?id=1231432
* https://bugzilla.suse.com/show_bug.cgi?id=1232364
* https://bugzilla.suse.com/show_bug.cgi?id=1232389
* https://bugzilla.suse.com/show_bug.cgi?id=1232421
* https://bugzilla.suse.com/show_bug.cgi?id=1232743
* https://bugzilla.suse.com/show_bug.cgi?id=1232812
* https://bugzilla.suse.com/show_bug.cgi?id=1232848
* https://bugzilla.suse.com/show_bug.cgi?id=1232895
* https://bugzilla.suse.com/show_bug.cgi?id=1233033
* https://bugzilla.suse.com/show_bug.cgi?id=1233060
* https://bugzilla.suse.com/show_bug.cgi?id=1233259
* https://bugzilla.suse.com/show_bug.cgi?id=1233260
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233551
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233749
* https://bugzilla.suse.com/show_bug.cgi?id=1234222
* https://bugzilla.suse.com/show_bug.cgi?id=1234480
* https://bugzilla.suse.com/show_bug.cgi?id=1234828
* https://bugzilla.suse.com/show_bug.cgi?id=1234936
* https://bugzilla.suse.com/show_bug.cgi?id=1235436
* https://bugzilla.suse.com/show_bug.cgi?id=1235455
* https://bugzilla.suse.com/show_bug.cgi?id=1235501
* https://bugzilla.suse.com/show_bug.cgi?id=1235524
* https://bugzilla.suse.com/show_bug.cgi?id=1235589
* https://bugzilla.suse.com/show_bug.cgi?id=1235591
* https://bugzilla.suse.com/show_bug.cgi?id=1235621
* https://bugzilla.suse.com/show_bug.cgi?id=1235637
* https://bugzilla.suse.com/show_bug.cgi?id=1235698
* https://bugzilla.suse.com/show_bug.cgi?id=1235711
* https://bugzilla.suse.com/show_bug.cgi?id=1235712
* https://bugzilla.suse.com/show_bug.cgi?id=1235715
* https://bugzilla.suse.com/show_bug.cgi?id=1235729
* https://bugzilla.suse.com/show_bug.cgi?id=1235733
* https://bugzilla.suse.com/show_bug.cgi?id=1235761
* https://bugzilla.suse.com/show_bug.cgi?id=1235870
* https://bugzilla.suse.com/show_bug.cgi?id=1235973
* https://bugzilla.suse.com/show_bug.cgi?id=1236099
* https://bugzilla.suse.com/show_bug.cgi?id=1236111
* https://bugzilla.suse.com/show_bug.cgi?id=1236206
* https://bugzilla.suse.com/show_bug.cgi?id=1236333
* https://bugzilla.suse.com/show_bug.cgi?id=1236692
* https://bugzilla.suse.com/show_bug.cgi?id=1237029
* https://bugzilla.suse.com/show_bug.cgi?id=1237164
* https://bugzilla.suse.com/show_bug.cgi?id=1237313
* https://bugzilla.suse.com/show_bug.cgi?id=1237530
* https://bugzilla.suse.com/show_bug.cgi?id=1237558
* https://bugzilla.suse.com/show_bug.cgi?id=1237562
* https://bugzilla.suse.com/show_bug.cgi?id=1237565
* https://bugzilla.suse.com/show_bug.cgi?id=1237571
* https://bugzilla.suse.com/show_bug.cgi?id=1237853
* https://bugzilla.suse.com/show_bug.cgi?id=1237856
* https://bugzilla.suse.com/show_bug.cgi?id=1237873
* https://bugzilla.suse.com/show_bug.cgi?id=1237875
* https://bugzilla.suse.com/show_bug.cgi?id=1237876
* https://bugzilla.suse.com/show_bug.cgi?id=1237877
* https://bugzilla.suse.com/show_bug.cgi?id=1237881
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237890
* https://bugzilla.suse.com/show_bug.cgi?id=1237894
* https://bugzilla.suse.com/show_bug.cgi?id=1237897
* https://bugzilla.suse.com/show_bug.cgi?id=1237900
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1237907
* https://bugzilla.suse.com/show_bug.cgi?id=1237911
* https://bugzilla.suse.com/show_bug.cgi?id=1237912
* https://bugzilla.suse.com/show_bug.cgi?id=1237950
* https://bugzilla.suse.com/show_bug.cgi?id=1238212
* https://bugzilla.suse.com/show_bug.cgi?id=1238474
* https://bugzilla.suse.com/show_bug.cgi?id=1238475
* https://bugzilla.suse.com/show_bug.cgi?id=1238479
* https://bugzilla.suse.com/show_bug.cgi?id=1238494
* https://bugzilla.suse.com/show_bug.cgi?id=1238496
* https://bugzilla.suse.com/show_bug.cgi?id=1238497
* https://bugzilla.suse.com/show_bug.cgi?id=1238500
* https://bugzilla.suse.com/show_bug.cgi?id=1238501
* https://bugzilla.suse.com/show_bug.cgi?id=1238502
* https://bugzilla.suse.com/show_bug.cgi?id=1238503
* https://bugzilla.suse.com/show_bug.cgi?id=1238506
* https://bugzilla.suse.com/show_bug.cgi?id=1238507
* https://bugzilla.suse.com/show_bug.cgi?id=1238510
* https://bugzilla.suse.com/show_bug.cgi?id=1238511
* https://bugzilla.suse.com/show_bug.cgi?id=1238512
* https://bugzilla.suse.com/show_bug.cgi?id=1238521
* https://bugzilla.suse.com/show_bug.cgi?id=1238523
* https://bugzilla.suse.com/show_bug.cgi?id=1238526
* https://bugzilla.suse.com/show_bug.cgi?id=1238528
* https://bugzilla.suse.com/show_bug.cgi?id=1238529
* https://bugzilla.suse.com/show_bug.cgi?id=1238531
* https://bugzilla.suse.com/show_bug.cgi?id=1238532
* https://bugzilla.suse.com/show_bug.cgi?id=1238715
* https://bugzilla.suse.com/show_bug.cgi?id=1238716
* https://bugzilla.suse.com/show_bug.cgi?id=1238734
* https://bugzilla.suse.com/show_bug.cgi?id=1238735
* https://bugzilla.suse.com/show_bug.cgi?id=1238736
* https://bugzilla.suse.com/show_bug.cgi?id=1238738
* https://bugzilla.suse.com/show_bug.cgi?id=1238747
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238757
* https://bugzilla.suse.com/show_bug.cgi?id=1238760
* https://bugzilla.suse.com/show_bug.cgi?id=1238762
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1238767
* https://bugzilla.suse.com/show_bug.cgi?id=1238768
* https://bugzilla.suse.com/show_bug.cgi?id=1238771
* https://bugzilla.suse.com/show_bug.cgi?id=1238772
* https://bugzilla.suse.com/show_bug.cgi?id=1238773
* https://bugzilla.suse.com/show_bug.cgi?id=1238775
* https://bugzilla.suse.com/show_bug.cgi?id=1238780
* https://bugzilla.suse.com/show_bug.cgi?id=1238781
* https://bugzilla.suse.com/show_bug.cgi?id=1238785
* https://bugzilla.suse.com/show_bug.cgi?id=1238864
* https://bugzilla.suse.com/show_bug.cgi?id=1238865
* https://bugzilla.suse.com/show_bug.cgi?id=1238876
* https://bugzilla.suse.com/show_bug.cgi?id=1238903
* https://bugzilla.suse.com/show_bug.cgi?id=1238904
* https://bugzilla.suse.com/show_bug.cgi?id=1238905
* https://bugzilla.suse.com/show_bug.cgi?id=1238909
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238917
* https://bugzilla.suse.com/show_bug.cgi?id=1238958
* https://bugzilla.suse.com/show_bug.cgi?id=1238959
* https://bugzilla.suse.com/show_bug.cgi?id=1238963
* https://bugzilla.suse.com/show_bug.cgi?id=1238964
* https://bugzilla.suse.com/show_bug.cgi?id=1238969
* https://bugzilla.suse.com/show_bug.cgi?id=1238971
* https://bugzilla.suse.com/show_bug.cgi?id=1238973
* https://bugzilla.suse.com/show_bug.cgi?id=1238975
* https://bugzilla.suse.com/show_bug.cgi?id=1238978
* https://bugzilla.suse.com/show_bug.cgi?id=1238979
* https://bugzilla.suse.com/show_bug.cgi?id=1238981
* https://bugzilla.suse.com/show_bug.cgi?id=1238984
* https://bugzilla.suse.com/show_bug.cgi?id=1238986
* https://bugzilla.suse.com/show_bug.cgi?id=1238993
* https://bugzilla.suse.com/show_bug.cgi?id=1238994
* https://bugzilla.suse.com/show_bug.cgi?id=1238997
* https://bugzilla.suse.com/show_bug.cgi?id=1239015
* https://bugzilla.suse.com/show_bug.cgi?id=1239016
* https://bugzilla.suse.com/show_bug.cgi?id=1239027
* https://bugzilla.suse.com/show_bug.cgi?id=1239029
* https://bugzilla.suse.com/show_bug.cgi?id=1239030
* https://bugzilla.suse.com/show_bug.cgi?id=1239033
* https://bugzilla.suse.com/show_bug.cgi?id=1239034
* https://bugzilla.suse.com/show_bug.cgi?id=1239036
* https://bugzilla.suse.com/show_bug.cgi?id=1239037
* https://bugzilla.suse.com/show_bug.cgi?id=1239038
* https://bugzilla.suse.com/show_bug.cgi?id=1239039
* https://bugzilla.suse.com/show_bug.cgi?id=1239045
* https://bugzilla.suse.com/show_bug.cgi?id=1239065
* https://bugzilla.suse.com/show_bug.cgi?id=1239068
* https://bugzilla.suse.com/show_bug.cgi?id=1239073
* https://bugzilla.suse.com/show_bug.cgi?id=1239076
* https://bugzilla.suse.com/show_bug.cgi?id=1239080
* https://bugzilla.suse.com/show_bug.cgi?id=1239085
* https://bugzilla.suse.com/show_bug.cgi?id=1239087
* https://bugzilla.suse.com/show_bug.cgi?id=1239095
* https://bugzilla.suse.com/show_bug.cgi?id=1239104
* https://bugzilla.suse.com/show_bug.cgi?id=1239105
* https://bugzilla.suse.com/show_bug.cgi?id=1239109
* https://bugzilla.suse.com/show_bug.cgi?id=1239112
* https://bugzilla.suse.com/show_bug.cgi?id=1239114
* https://bugzilla.suse.com/show_bug.cgi?id=1239115
* https://bugzilla.suse.com/show_bug.cgi?id=1239117
* https://bugzilla.suse.com/show_bug.cgi?id=1239167
* https://bugzilla.suse.com/show_bug.cgi?id=1239174
* https://bugzilla.suse.com/show_bug.cgi?id=1239346
* https://bugzilla.suse.com/show_bug.cgi?id=1239349
* https://bugzilla.suse.com/show_bug.cgi?id=1239435
* https://bugzilla.suse.com/show_bug.cgi?id=1239467
* https://bugzilla.suse.com/show_bug.cgi?id=1239468
* https://bugzilla.suse.com/show_bug.cgi?id=1239471
* https://bugzilla.suse.com/show_bug.cgi?id=1239473
* https://bugzilla.suse.com/show_bug.cgi?id=1239474
* https://bugzilla.suse.com/show_bug.cgi?id=1239477
* https://bugzilla.suse.com/show_bug.cgi?id=1239478
* https://bugzilla.suse.com/show_bug.cgi?id=1239479
* https://bugzilla.suse.com/show_bug.cgi?id=1239481
* https://bugzilla.suse.com/show_bug.cgi?id=1239482
* https://bugzilla.suse.com/show_bug.cgi?id=1239483
* https://bugzilla.suse.com/show_bug.cgi?id=1239484
* https://bugzilla.suse.com/show_bug.cgi?id=1239486
* https://bugzilla.suse.com/show_bug.cgi?id=1239508
* https://bugzilla.suse.com/show_bug.cgi?id=1239512
* https://bugzilla.suse.com/show_bug.cgi?id=1239518
* https://bugzilla.suse.com/show_bug.cgi?id=1239573
* https://bugzilla.suse.com/show_bug.cgi?id=1239594
* https://bugzilla.suse.com/show_bug.cgi?id=1239595
* https://bugzilla.suse.com/show_bug.cgi?id=1239600
* https://bugzilla.suse.com/show_bug.cgi?id=1239605
* https://bugzilla.suse.com/show_bug.cgi?id=1239615
* https://bugzilla.suse.com/show_bug.cgi?id=1239644
* https://bugzilla.suse.com/show_bug.cgi?id=1239707
* https://bugzilla.suse.com/show_bug.cgi?id=1239986
* https://bugzilla.suse.com/show_bug.cgi?id=1239994
* https://bugzilla.suse.com/show_bug.cgi?id=1240169
* https://bugzilla.suse.com/show_bug.cgi?id=1240172
* https://bugzilla.suse.com/show_bug.cgi?id=1240173
* https://bugzilla.suse.com/show_bug.cgi?id=1240175
* https://bugzilla.suse.com/show_bug.cgi?id=1240177
* https://bugzilla.suse.com/show_bug.cgi?id=1240179
* https://bugzilla.suse.com/show_bug.cgi?id=1240182
* https://bugzilla.suse.com/show_bug.cgi?id=1240183
* https://bugzilla.suse.com/show_bug.cgi?id=1240186
* https://bugzilla.suse.com/show_bug.cgi?id=1240188
* https://bugzilla.suse.com/show_bug.cgi?id=1240189
* https://bugzilla.suse.com/show_bug.cgi?id=1240191
* https://bugzilla.suse.com/show_bug.cgi?id=1240192
* https://bugzilla.suse.com/show_bug.cgi?id=1240333
* https://bugzilla.suse.com/show_bug.cgi?id=1240334
* https://jira.suse.com/browse/PED-10701
* https://jira.suse.com/browse/PED-12251
* https://jira.suse.com/browse/PED-12416