Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:21064-1
Release Date: 2025-11-25T18:51:32Z
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2023-53538 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53538 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53539 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53539 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53540 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53540 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53541 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53541 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2023-53543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53545 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53548 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53550 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53558 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53563 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-53575 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53575 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2023-53577 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53580 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53581 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53581 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53583 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2023-53583 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N
  • CVE-2023-53585 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53585 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53588 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2023-53593 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53593 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53599 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53600 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53602 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53602 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53603 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53616 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53616 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2023-53617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53618 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53619 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-53621 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53622 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53622 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53632 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53633 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53633 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53638 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53649 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53650 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2023-53652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2023-53653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53654 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53654 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53656 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53656 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53657 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53658 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53659 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-53660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53662 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53663 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53663 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  • CVE-2023-53665 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53665 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53666 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53668 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2023-53670 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53670 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53672 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53673 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-53674 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53674 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53681 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53681 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53686 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53687 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53687 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53693 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53697 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53697 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53698 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53698 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53699 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53699 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53703 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53703 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2023-53704 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53704 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53707 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53708 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53711 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  • CVE-2023-53711 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2023-53713 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53713 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-53718 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53718 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53721 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53721 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2023-53722 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2023-53725 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2023-53725 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2023-53726 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  • CVE-2023-53726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2023-53727 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53728 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53728 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53729 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53729 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  • CVE-2023-53730 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53731 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2023-53731 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2023-53733 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
  • CVE-2023-53733 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  • CVE-2025-38008 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38008 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  • CVE-2025-38008 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-38539 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38539 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-38552 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38552 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-38653 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38653 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-38699 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-38700 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-38700 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-38718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39794 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39797 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-39812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
  • CVE-2025-39813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39828 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  • CVE-2025-39828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  • CVE-2025-39841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39866 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39866 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39895 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39898 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39898 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39902 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39902 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39937 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39938 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39945 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39947 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39947 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39948 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-39948 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-39949 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39949 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-39952 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39952 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-39955 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39955 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-39957 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-39957 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-39965 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-39968 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-39969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-39969 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  • CVE-2025-39970 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39970 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-39971 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39971 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-39972 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39972 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-39973 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39978 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39981 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-39982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-39997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40005 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-40010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40013 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40016 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  • CVE-2025-40016 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  • CVE-2025-40018 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2025-40020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40020 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-40029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40032 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40032 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40043 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40043 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-40044 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  • CVE-2025-40049 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40049 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-40051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40056 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40056 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-40058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40085 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  • CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • CVE-2025-40088 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40088 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  • CVE-2025-40096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40096 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  • CVE-2025-40100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  • CVE-2025-40100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
  • SUSE Linux Micro 6.1

An update that solves 191 vulnerabilities and has 23 fixes can now be installed.

Description:

The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939).
  • CVE-2025-38539: trace/fgraph: Fix the warning caused by missing unregister notifier (bsc#1248211).
  • CVE-2025-38552: mptcp: plug races between subflow fail and subflow creation (bsc#1248230).
  • CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630).
  • CVE-2025-38699: scsi: bfa: Double-free fix (bsc#1249224).
  • CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182).
  • CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161).
  • CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320).
  • CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302).
  • CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286).
  • CVE-2025-39697: nfs: remove dead code for the old swap over NFS implementation (bsc#1249319).
  • CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317).
  • CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512).
  • CVE-2025-39794: ARM: tegra: Use I/O memcpy to write to IRAM (bsc#1249595).
  • CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202).
  • CVE-2025-39813: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump (bsc#1250032).
  • CVE-2025-39828: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control() (bsc#1250205).
  • CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296).
  • CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455).
  • CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400).
  • CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379).
  • CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721).
  • CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742).
  • CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702).
  • CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704).
  • CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
  • CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114).
  • CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232).
  • CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
  • CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177).
  • CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804).
  • CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
  • CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044).
  • CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051).
  • CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
  • CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039).
  • CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
  • CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
  • CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062).
  • CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349).
  • CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
  • CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
  • CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826).
  • CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848).
  • CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789).
  • CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).
  • CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918).

The following non-security bugs were fixed:

  • ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path (stable-fixes).
  • ACPI: battery: Add synchronization between interface updates (git-fixes).
  • ACPI: battery: Check for error code from devm_mutex_init() call (git-fixes).
  • ACPI: battery: allocate driver data through devm_ APIs (stable-fixes).
  • ACPI: battery: initialize mutexes through devm_ APIs (stable-fixes).
  • ACPI: button: Call input_free_device() on failing input device registration (git-fixes).
  • ACPI: property: Add code comments explaining what is going on (stable-fixes).
  • ACPI: property: Disregard references in data-only subnode lists (stable-fixes).
  • ACPI: property: Do not pass NULL handles to acpi_attach_data() (stable-fixes git-fixes).
  • ACPI: video: Fix use-after-free in acpi_video_switch_brightness() (git-fixes).
  • ACPI: x86: Move acpi_quirk_skip_serdev_enumeration() out of CONFIG_X86_ANDROID_TABLETS (stable-fixes).
  • ACPICA: Allow to skip Global Lock initialization (stable-fixes).
  • ALSA: firewire: amdtp-stream: fix enum kernel-doc warnings (git-fixes).
  • ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card (git-fixes).
  • ALSA: usb-audio: fix control pipe direction (git-fixes).
  • ASoC: Intel: avs: Unprepare a stream when XRUN occurs (git-fixes).
  • ASoC: SOF: ipc3-topology: Fix multi-core and static pipelines tear down (git-fixes).
  • ASoC: SOF: ipc4-topology: Correct the minimum host DMA buffer size (git-fixes).
  • ASoC: amd: acp: Adjust pdm gain value (stable-fixes).
  • ASoC: codecs: Fix gain setting ranges for Renesas IDT821034 codec (git-fixes).
  • ASoC: fsl_sai: fix bit order for DSD format (git-fixes).
  • ASoC: nau8821: Add DMI quirk to bypass jack debounce circuit (git-fixes).
  • ASoC: nau8821: Cancel jdet_work before handling jack ejection (git-fixes).
  • ASoC: nau8821: Generalize helper to clear IRQ status (git-fixes).
  • ASoC: qdsp6: q6asm: do not sleep while atomic (git-fixes).
  • ASoC: rt5682s: Adjust SAR ADC button mode to fix noise issue (stable-fixes).
  • Bluetooth: btmtksdio: Add pmctrl handling for BT closed state during reset (git-fixes).
  • Bluetooth: btusb: Add USB ID 2001:332a for D-Link AX9U rev. A1 (stable-fixes).
  • Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once (git-fixes).
  • HID: hid-input: only ignore 0 battery events for digitizers (git-fixes).
  • HID: multitouch: fix name of Stylus input devices (git-fixes).
  • Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak (git-fixes).
  • KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199).
  • KVM: SEV: Read save fields from GHCB exactly once (git-fixes).
  • KVM: SEV: Rename kvm_ghcb_get_sw_exit_code() to kvm_get_cached_sw_exit_code() (git-fixes).
  • KVM: SEV: Validate XCR0 provided by guest in GHCB (git-fixes).
  • KVM: SVM: Inject #GP if memory operand for INVPCID is non-canonical (git-fixes).
  • KVM: SVM: Pass through GHCB MSR if and only if VM is an SEV-ES guest (git-fixes).
  • KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow (git-fixes).
  • KVM: x86/mmu: Prevent installing hugepages when mem attributes are changing (git-fixes).
  • KVM: x86: Bypass register cache when querying CPL from kvm_sched_out() (git-fixes).
  • KVM: x86: Clear pv_unhalted on all transitions to KVM_MP_STATE_RUNNABLE (git-fixes).
  • KVM: x86: Do not bleed PVCLOCK_GUEST_STOPPED across PV clocks (git-fixes).
  • KVM: x86: Do not inject PV async #PF if SEND_ALWAYS=0 and guest state is protected (git-fixes).
  • KVM: x86: Introduce kvm_set_mp_state() (git-fixes).
  • KVM: x86: Introduce kvm_x86_call() to simplify static calls of kvm_x86_ops (git-fixes).
  • KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update() (git-fixes).
  • KVM: x86: Process "guest stopped request" once per guest time update (git-fixes).
  • KVM: x86: Replace static_call_cond() with static_call() (git-fixes).
  • KVM: x86: Set PVCLOCK_GUEST_STOPPED only for kvmclock, not for Xen PV clock (git-fixes).
  • KVM: x86: Snapshot the host's DEBUGCTL after disabling IRQs (git-fixes).
  • KVM: x86: Snapshot the host's DEBUGCTL in common x86 (git-fixes).
  • KVM: x86: Take irqfds.lock when adding/deleting IRQ bypass producer (git-fixes).
  • NFSD: Define a proc_layoutcommit for the FlexFiles layout type (git-fixes).
  • NFSD: Fix crash in nfsd4_read_release() (git-fixes).
  • NFSD: Fix destination buffer size in nfsd4_ssc_setup_dul() (git-fixes).
  • NFSD: Minor cleanup in layoutcommit processing (git-fixes).
  • NFSD: Rework encoding and decoding of nfsd4_deviceid (git-fixes).
  • PCI/AER: Support errors introduced by PCIe r6.0 (stable-fixes).
  • PCI: Add PCI_VDEVICE_SUB helper macro (stable-fixes).
  • PCI: endpoint: Remove surplus return statement from pci_epf_test_clean_dma_chan() (stable-fixes).
  • PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release (git-fixes).
  • PCI: j721e: Enable ACSPCIE Refclk if "ti,syscon-acspcie-proxy-ctrl" exists (stable-fixes).
  • PCI: j721e: Fix programming sequence of "strap" settings (git-fixes).
  • PM: runtime: Add new devm functions (stable-fixes).
  • Revert "KVM: VMX: Move LOAD_IA32_PERF_GLOBAL_CTRL errata handling out of setup_vmcs_config()" (git-fixes).
  • USB: serial: option: add SIMCom 8230C compositions (git-fixes).
  • USB: serial: option: add SIMCom 8230C compositions (stable-fixes).
  • accel/ivpu: Add missing MODULE_FIRMWARE metadata (git-fixes).
  • accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() (git-fixes).
  • add bug reference to existing hv_netvsc change (bsc#1252265)
  • arm64, mm: avoid always making PTE dirty in pte_mkwrite() (git-fixes)
  • arm64: cputype: Add Neoverse-V3AE definitions (git-fixes)
  • arm64: errata: Apply workarounds for Neoverse-V3AE (git-fixes)
  • arm64: mte: Do not flag the zero page as PG_mte_tagged (git-fixes)
  • bpf: Allow helper bpf_get_[ns_]current_pid_tgid() for all prog types (bsc#1252364).
  • bpf: Avoid RCU context warning when unpinning htab with internal structs (git-fixes).
  • bpf: Check link_create.flags parameter for multi_kprobe (git-fixes).
  • bpf: Check link_create.flags parameter for multi_uprobe (git-fixes).
  • bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} (git-fixes).
  • bpf: Use preempt_count() directly in bpf_send_signal_common() (git-fixes).
  • btrfs: avoid potential out-of-bounds in btrfs_encode_fh() (git-fixes).
  • btrfs: fix clearing of BTRFS_FS_RELOC_RUNNING if relocation already running (git-fixes).
  • btrfs: fix the incorrect max_bytes value for find_lock_delalloc_range() (git-fixes).
  • can: bxcan: bxcan_start_xmit(): use can_dev_dropped_skb() instead of can_dropped_invalid_skb() (git-fixes).
  • can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled (stable-fixes).
  • can: netlink: can_changelink(): allow disabling of automatic restart (git-fixes).
  • can: rcar_canfd: Fix controller mode setting (stable-fixes).
  • clk: at91: peripheral: fix return value (git-fixes).
  • clk: mediatek: clk-mux: Do not pass flags to clk_mux_determine_rate_flags() (git-fixes).
  • clk: mediatek: mt8195-infra_ao: Fix parent for infra_ao_hdmi_26m (git-fixes).
  • clk: tegra: do not overallocate memory for bpmp clocks (git-fixes).
  • cpufreq: CPPC: fix perf_to_khz/khz_to_perf conversion exception (git-fixes).
  • cpufreq: armada-8k: Fix off by one in armada_8k_cpufreq_free_table() (stable-fixes git-fixes).
  • cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (stable-fixes git-fixes).
  • cpufreq: scmi: Account for malformed DT in scmi_dev_used_by_cpus() (git-fixes).
  • cpufreq: scmi: Skip SCMI devices that are not used by the CPUs (stable-fixes).
  • cpufreq: tegra186: Set target frequency for all cpus in policy (git-fixes).
  • cpuidle: governors: menu: Avoid using invalid recent intervals data (git-fixes).
  • cpuidle: menu: Avoid discarding useful information (stable-fixes).
  • cpuidle: qcom-spm: fix device and OF node leaks at probe (git-fixes).
  • crypto: essiv - Check ssize for decryption and in-place encryption (git-fixes).
  • crypto: rng - Ensure set_ent is always present (git-fixes).
  • driver core/PM: Set power.no_callbacks along with power.no_pm (stable-fixes).
  • drivers/perf: arm_spe: Use perf_allow_kernel() for permissions (git-fixes).
  • drm/amd/display: Add missing DCE6 SCL_HORZ_FILTER_INIT* SRIs (git-fixes).
  • drm/amd/display: Disable scaling on DCE6 for now (git-fixes).
  • drm/amd/display: Properly clear SCL_*_FILTER_CONTROL on DCE6 (git-fixes).
  • drm/amd/display: Properly disable scaling on DCE6 (git-fixes).
  • drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Fiji (git-fixes).
  • drm/amd/pm/powerplay/smumgr: Fix PCIeBootLinkLevel value on Iceland (git-fixes).
  • drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes).
  • drm/amd/powerplay: Fix CIK shutdown temperature (git-fixes).
  • drm/amd: Check whether secure display TA loaded successfully (stable-fixes).
  • drm/amdgpu: Add additional DCE6 SCL registers (git-fixes).
  • drm/amdgpu: use atomic functions with memory barriers for vm fault info (git-fixes).
  • drm/bridge: lt9211: Drop check for last nibble of version register (git-fixes).
  • drm/etnaviv: fix flush sequence logic (git-fixes).
  • drm/exynos: exynos7_drm_decon: fix uninitialized crtc reference in functions (stable-fixes).
  • drm/exynos: exynos7_drm_decon: properly clear channels during bind (stable-fixes).
  • drm/i915/guc: Skip communication warning on reset in progress (git-fixes).
  • drm/mediatek: Fix device use-after-free on unbind (git-fixes).
  • drm/msm/a6xx: Fix GMU firmware parser (git-fixes).
  • drm/msm/adreno: De-spaghettify the use of memory barriers (stable-fixes).
  • drm/msm/dpu: Fix pixel extension sub-sampling (git-fixes).
  • drm/nouveau: fix bad ret code in nouveau_bo_move_prep (git-fixes).
  • drm/panel: kingdisplay-kd097d04: Disable EoTp (git-fixes).
  • drm/panel: sitronix-st7789v: fix sync flags for t28cp45tn89 (git-fixes).
  • drm/rockchip: vop2: use correct destination rectangle height check (git-fixes).
  • drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies (git-fixes).
  • drm/vmwgfx: Fix Use-after-free in validation (git-fixes).
  • drm/vmwgfx: Fix a null-ptr access in the cursor snooper (git-fixes).
  • drm/vmwgfx: Fix copy-paste typo in validation (git-fixes).
  • ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() (git-fixes).
  • ext4: check fast symlink for ea_inode correctly (git-fixes).
  • ext4: do not convert the unwritten extents if data writeback fails (git-fixes).
  • ext4: do not try to clear the orphan_present feature block device is r/o (git-fixes).
  • ext4: ensure i_size is smaller than maxbytes (git-fixes).
  • ext4: factor out ext4_get_maxbytes() (git-fixes).
  • ext4: fix calculation of credits for extent tree modification (git-fixes).
  • ext4: fix checks for orphan inodes (bsc#1250119).
  • ext4: fix fsmap end of range reporting with bigalloc (git-fixes).
  • ext4: fix hole length calculation overflow in non-extent inodes (git-fixes).
  • ext4: fix largest free orders lists corruption on mb_optimize_scan switch (git-fixes).
  • ext4: fix reserved gdt blocks handling in fsmap (git-fixes).
  • ext4: fix zombie groups in average fragment size lists (git-fixes).
  • ext4: preserve SB_I_VERSION on remount (git-fixes).
  • ext4: reorder capability check last (git-fixes).
  • fbdev: Fix logic error in "offb" name match (git-fixes).
  • fbdev: atyfb: Check if pll_ops->init_pll failed (git-fixes).
  • fbdev: valkyriefb: Fix reference count leak in valkyriefb_init (git-fixes).
  • firmware: arm_scmi: Fix premature SCMI_XFER_FLAG_IS_RAW clearing in raw mode (git-fixes).
  • fs: udf: fix OOB read in lengthAllocDescs handling (git-fixes).
  • ftrace: fix incorrect hash size in register_ftrace_direct() (git-fixes).
  • gpio: wcd934x: mark the GPIO controller as sleeping (git-fixes).
  • hfs: validate record offset in hfsplus_bmap_alloc (git-fixes).
  • hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() (git-fixes).
  • hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (git-fixes).
  • hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (git-fixes).
  • hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes).
  • hfsplus: return EIO when type of hidden directory mismatch in hfsplus_fill_super() (git-fixes).
  • hid: fix I2C read buffer overflow in raw_event() for mcp2221 (stable-fixes).
  • i2c: ocores: use devm_ managed clks (git-fixes).
  • iomap: Fix iomap_adjust_read_range for plen calculation (git-fixes).
  • iomap: handle a post-direct I/O invalidate race in iomap_write_delalloc_release (git-fixes).
  • iommu/vt-d: Disallow dirty tracking if incoherent page walk (git-fixes).
  • iommu/vt-d: PRS isn't usable if PDS isn't supported (git-fixes).
  • isofs: Verify inode mode when loading from disk (git-fixes).
  • jbd2: do not try to recover wiped journal (git-fixes).
  • kABI fix for KVM: x86: Snapshot the host's DEBUGCTL in common x86 (git-fixes).
  • kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939).
  • kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930).
  • lib/crypto/curve25519-hacl64: Disable KASAN with clang-17 and older (stable-fixes).
  • locking/mutex: Introduce devm_mutex_init() (stable-fixes).
  • locking/mutex: Mark devm_mutex_init() as __must_check (stable-fixes).
  • mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop (git-fixes).
  • mailbox: zynqmp-ipi: Remove dev.parent check in zynqmp_ipi_free_mboxes (git-fixes).
  • mailbox: zynqmp-ipi: Remove redundant mbox_controller_unregister() call (git-fixes).
  • media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe (git-fixes).
  • media: nxp: imx8-isi: Drop unused argument to mxc_isi_channel_chain() (stable-fixes).
  • media: solo6x10: replace max(a, min(b, c)) by clamp(b, a, c) (git-fixes).
  • media: tuner: xc5000: Fix use-after-free in xc5000_release (git-fixes).
  • media: tunner: xc5000: Refactor firmware load (stable-fixes).
  • mfd: intel_soc_pmic_chtdc_ti: Drop unneeded assignment for cache_type (stable-fixes).
  • mfd: intel_soc_pmic_chtdc_ti: Fix invalid regmap-config max_register value (stable-fixes).
  • mfd: intel_soc_pmic_chtdc_ti: Set use_single_read regmap_config flag (git-fixes).
  • misc: fastrpc: Add missing dev_err newlines (stable-fixes).
  • misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup (git-fixes).
  • misc: fastrpc: Fix fastrpc_map_lookup operation (git-fixes).
  • misc: fastrpc: Save actual DMA size in fastrpc_map structure (git-fixes).
  • misc: fastrpc: Skip reference for DMA handles (git-fixes).
  • misc: fastrpc: fix possible map leak in fastrpc_put_args (git-fixes).
  • mmc: core: SPI mode remove cmd7 (stable-fixes).
  • most: usb: Fix use-after-free in hdm_disconnect (git-fixes).
  • most: usb: hdm_probe: Fix calling put_device() before device initialization (git-fixes).
  • mtd: rawnand: fsmc: Default to autodetect buswidth (stable-fixes).
  • net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754).
  • net: phy: dp83869: fix STRAP_OPMODE bitmask (git-fixes).
  • net: sysfs: Fix /sys/class/net/<iface> path (git-fixes).
  • net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock (git-fixes).
  • net: usb: asix_devices: Check return value of usbnet_get_endpoints (git-fixes).
  • net: usb: lan78xx: Add error handling to lan78xx_init_mac_address (git-fixes).
  • net: usb: lan78xx: fix use of improperly initialized dev->chipid in lan78xx_reset (git-fixes).
  • net: usb: rtl8150: Fix frame padding (git-fixes).
  • netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
  • nfsd: nfserr_jukebox in nlm_fopen should lead to a retry (git-fixes).
  • nvme-multipath: Skip nr_active increments in RETRY disposition (git-fixes).
  • nvme-pci: Add TUXEDO IBS Gen8 to Samsung sleep quirk (git-fixes).
  • nvme/tcp: handle tls partially sent records in write_space() (git-fixes).
  • overlayfs: set ctime when setting mtime and atime (stable-fixes).
  • ovl: Always reevaluate the file signature for IMA (stable-fixes).
  • ovl: fix file reference leak when submitting aio (stable-fixes).
  • ovl: fix incorrect fdput() on aio completion (stable-fixes).
  • perf/amd/ibs: Fix ->config to sample period calculation for OP PMU (git-fixes).
  • perf/amd/ibs: Fix perf_ibs_op.cnt_mask for CurCnt (git-fixes).
  • perf/amd: Prevent grouping of IBS events (git-fixes).
  • perf/aux: Fix pending disable flow when the AUX ring buffer overruns (git-fixes).
  • perf/bpf: Robustify perf_event_free_bpf_prog() (git-fixes).
  • perf/core: Fix WARN in perf_cgroup_switch() (git-fixes).
  • perf/core: Fix broken throttling when max_samples_per_tick=1 (git-fixes).
  • perf/core: Fix child_total_time_enabled accounting bug at task exit (git-fixes).
  • perf/core: Fix low freq setting via IOC_PERIOD (git-fixes).
  • perf/core: Fix pmus_lock vs. pmus_srcu ordering (git-fixes).
  • perf/core: Fix small negative period being ignored (git-fixes).
  • perf/core: Fix the WARN_ON_ONCE is out of lock protected region (git-fixes).
  • perf/hw_breakpoint: Return EOPNOTSUPP for unsupported breakpoint type (git-fixes).
  • perf/ring_buffer: Allow the EPOLLRDNORM flag for poll (git-fixes).
  • perf/x86/amd: Warn only on new bits set (git-fixes).
  • perf/x86/intel/ds: Unconditionally drain PEBS DS when changing PEBS_DATA_CFG (git-fixes).
  • perf/x86/intel/pt: Fix sampling synchronization (git-fixes).
  • perf/x86/intel/uncore: Fix the scale of IIO free running counters on ICX (git-fixes).
  • perf/x86/intel/uncore: Fix the scale of IIO free running counters on SNR (git-fixes).
  • perf/x86/intel/uncore: Fix the scale of IIO free running counters on SPR (git-fixes).
  • perf/x86/intel: Allow to setup LBR for counting event for BPF (git-fixes).
  • perf/x86/intel: Allow to update user space GPRs from PEBS records (git-fixes).
  • perf/x86/intel: Apply static call for drain_pebs (git-fixes).
  • perf/x86/intel: Avoid disable PMU if !cpuc->enabled in sample read (git-fixes).
  • perf/x86/intel: Fix crash in icl_update_topdown_event() (git-fixes).
  • perf/x86/intel: Only check the group flag for X86 leader (git-fixes).
  • perf/x86/intel: Use better start period for frequency mode (git-fixes).
  • perf/x86: Fix low freqency setting issue (git-fixes).
  • perf/x86: Fix non-sampling (counting) events on certain x86 platforms (git-fixes).
  • perf: Ensure bpf_perf_link path is properly serialized (git-fixes).
  • perf: Extract a few helpers (git-fixes).
  • perf: Fix cgroup state vs ERROR (git-fixes).
  • phy: cadence: cdns-dphy: Fix PLL lock and O_CMN_READY polling (git-fixes).
  • phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes).
  • phy: cdns-dphy: Store hs_clk_rate and return it (stable-fixes).
  • platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (stable-fixes).
  • platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (stable-fixes).
  • powerpc/boot: Fix build with gcc 15 (bsc#1215199).
  • powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199).
  • powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199).
  • powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199).
  • powerpc: export MIN RMA size (bsc#1236743 ltc#211409).
  • powerpc: floppy: Add missing checks after DMA map (bsc#1215199).
  • powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743 ltc#211409 bsc#1252269 ltc#215957).
  • proc: fix missing pde_set_flags() for net proc files (bsc#1248630)
  • proc: fix type confusion in pde_set_flags() (bsc#1248630)
  • r8152: add error handling in rtl8152_driver_init (git-fixes).
  • r8169: fix packet truncation after S4 resume on RTL8168H/RTL8111H (git-fixes).
  • regmap: slimbus: fix bus_context pointer in regmap init calls (git-fixes).
  • regulator: bd718x7: Fix voltages scaled by resistor divider (git-fixes).
  • rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too (bsc#1250946).
  • rtc: interface: Ensure alarm irq is enabled when UIE is enabled (stable-fixes).
  • rtc: interface: Fix long-standing race when setting alarm (stable-fixes).
  • rtc: optee: fix memory leak on driver removal (git-fixes).
  • rtc: x1205: Fix Xicor X1205 vendor prefix (git-fixes).
  • s390: Initialize psw mask in perf_arch_fetch_caller_regs() (git-fixes).
  • samples/bpf: Fix compilation failure for samples/bpf on LoongArch Fedora (git-fixes).
  • sched/fair: set_load_weight() must also call reweight_task() (git-fixes)
  • sched/idle: Conditionally handle tick broadcast in default_idle_call() (bsc#1248517).
  • selftests/bpf: Add test for unpinning htab with internal timer struct (git-fixes).
  • selftests/bpf: Fix C++ compile error from missing _Bool type (git-fixes).
  • selftests/bpf: Fix a fd leak in error paths in open_netns (git-fixes).
  • selftests/bpf: Fix backtrace printing for selftests crashes (git-fixes).
  • selftests/bpf: Fix compile error from rlim_t in sk_storage_map.c (git-fixes).
  • selftests/bpf: Fix compile if backtrace support missing in libc (git-fixes).
  • selftests/bpf: Fix compiling core_reloc.c with musl-libc (git-fixes).
  • selftests/bpf: Fix compiling flow_dissector.c with musl-libc (git-fixes).
  • selftests/bpf: Fix compiling kfree_skb.c with musl-libc (git-fixes).
  • selftests/bpf: Fix compiling parse_tcp_hdr_opt.c with musl-libc (git-fixes).
  • selftests/bpf: Fix compiling tcp_rtt.c with musl-libc (git-fixes).
  • selftests/bpf: Fix cross-compiling urandom_read (git-fixes).
  • selftests/bpf: Fix error compiling bpf_iter_setsockopt.c with musl libc (git-fixes).
  • selftests/bpf: Fix error compiling tc_redirect.c with musl libc (git-fixes).
  • selftests/bpf: Fix error compiling test_lru_map.c (git-fixes).
  • selftests/bpf: Fix errors compiling cg_storage_multi.h with musl libc (git-fixes).
  • selftests/bpf: Fix errors compiling decap_sanity.c with musl libc (git-fixes).
  • selftests/bpf: Fix errors compiling lwt_redirect.c with musl libc (git-fixes).
  • selftests/bpf: Fix redefinition errors compiling lwt_reroute.c (git-fixes).
  • selftests/bpf: Fix umount cgroup2 error in test_sockmap (git-fixes).
  • selftests/bpf: Use bpf_link__destroy in fill_link_info tests (git-fixes).
  • selftests/tracing: Fix event filter test to retry up to 10 times (git-fixes).
  • selinux: fix selinux_xfrm_alloc_user() to set correct ctx_len (git-fixes).
  • serial: 8250_dw: handle reset control deassert error (git-fixes).
  • serial: jsm: fix NPE during jsm_uart_port_init (git fixes, bsc#1246244).
  • skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
  • smb: client: fix crypto buffers in non-linear memory (bsc#1250491, boo#1239206).
  • smb: client: fix potential cfid UAF in smb2_query_info_compound (bsc#1248886).
  • spi: spi-nxp-fspi: add extra delay after dll locked (git-fixes).
  • staging: axis-fifo: fix TX handling on copy_from_user() failure (git-fixes).
  • staging: axis-fifo: fix maximum TX packet length check (git-fixes).
  • staging: axis-fifo: flush RX FIFO on read errors (git-fixes).
  • sunrpc: fix null pointer dereference on zero-length checksum (git-fixes).
  • tcp: Do not call reqsk_fastopen_remove() in tcp_conn_request() (git-fixes).
  • tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
  • tools/resolve_btfids: Fix build when cross compiling kernel with clang (git-fixes).
  • tpm_tis: Fix incorrect arguments in tpm_tis_probe_irq_single (git-fixes).
  • tracing/selftests: Fix kprobe event name test for .isra. functions (git-fixes).
  • tracing: Correct the refcount if the hist/hist_debug file fails to open (git-fixes).
  • tracing: Fix filter string testing (git-fixes).
  • tracing: Remove unneeded goto out logic (bsc#1249286).
  • udf: Make sure i_lenExtents is uptodate on inode eviction (git-fixes).
  • udf: Verify partition map count (git-fixes).
  • usb: hub: Fix flushing and scheduling of delayed work that tunes runtime pm (git-fixes).
  • usb: hub: Fix flushing of delayed work used for post resume purposes (git-fixes).
  • usb: hub: fix detection of high tier USB3 devices behind suspended hubs (git-fixes).
  • usb: phy: twl6030: Fix incorrect type for ret (git-fixes).
  • usb: xhci: Avoid queuing redundant Stop Endpoint commands (git-fixes).
  • usb: xhci: Limit Stop Endpoint retries (git-fixes).
  • usbnet: Fix using smp_processor_id() in preemptible code warnings (git-fixes).
  • usbnet: Prevents free active kevent (git-fixes).
  • wifi: ath10k: Fix memory leak on unsupported WMI command (git-fixes).
  • wifi: ath11k: Add missing platform IDs for quirk table (git-fixes).
  • wifi: ath12k: free skb during idr cleanup callback (git-fixes).
  • wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode (git-fixes).
  • wifi: mac80211: reset FILS discovery and unsol probe resp intervals (git-fixes).
  • wifi: mt76: mt7921u: Add VID/PID for Netgear A7500 (stable-fixes).
  • wifi: rtlwifi: rtl8192cu: Do not claim USB ID 07b8:8188 (stable-fixes).
  • x86/idle: Sanitize X86_BUG_AMD_E400 handling (bsc#1248517).
  • xfs: rename the old_crc variable in xlog_recover_process (git-fixes).
  • xhci: dbc: enable back DbC in resume if it was enabled before suspend (git-fixes).
  • xhci: retry Stop Endpoint on buggy NEC controllers (git-fixes).

Special Instructions and Notes:

  • Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Micro 6.1
    zypper in -t patch SUSE-SLE-Micro-6.1-kernel-206=1

Package List:

  • SUSE Linux Micro 6.1 (noarch)
    • kernel-devel-rt-6.4.0-38.1
    • kernel-source-rt-6.4.0-38.1
  • SUSE Linux Micro 6.1 (aarch64 nosrc x86_64)
    • kernel-rt-6.4.0-38.1
  • SUSE Linux Micro 6.1 (aarch64 x86_64)
    • kernel-rt-debugsource-6.4.0-38.1
    • kernel-rt-debuginfo-6.4.0-38.1
    • kernel-rt-devel-6.4.0-38.1
  • SUSE Linux Micro 6.1 (x86_64)
    • kernel-rt-devel-debuginfo-6.4.0-38.1
    • kernel-rt-livepatch-6.4.0-38.1

References: